Computer Networking If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid? access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255 access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In cyclic redundancy checking, the divisor is _____ the CRC. one bit more than one bit less than the same size as None of these two bits more one bit more than one bit less than the same size as None of these two bits more ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The application layer of a network All of these None of these establishes, maintains, and terminates virtual circuits consists of software being run on the computer connected to the network defines the user's port into the network All of these None of these establishes, maintains, and terminates virtual circuits consists of software being run on the computer connected to the network defines the user's port into the network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data link layer retransmits the damaged frames in most networks. If the probability of a frame's being damaged is p, what is the mean number of transmissions required to send a frame if acknowledgements are never lost. 1/ (1 - F) P I (K + 1) K I (K - P) KIK (1 + F) None of these 1/ (1 - F) P I (K + 1) K I (K - P) KIK (1 + F) None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of flow control? To regulate the size of each segment. To ensure that data is retransmitted if an acknowledgment is not received. To reassemble segments in the correct order at the destination device. To provide a means for the receiver to govern the amount of data sent by the sender. To regulate the size of each segment. To ensure that data is retransmitted if an acknowledgment is not received. To reassemble segments in the correct order at the destination device. To provide a means for the receiver to govern the amount of data sent by the sender. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. ICMP guarantees datagram delivery.2. ICMP can provide hosts with information about network problems.3. ICMP is encapsulated within IP datagrams.4. ICMP is encapsulated within UDP datagrams. 1 only 2 and 3 All of these 1 and 4 1 only 2 and 3 All of these 1 and 4 ANSWER DOWNLOAD EXAMIANS APP