Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The application layer of a network

All of these
None of these
establishes, maintains, and terminates virtual circuits
consists of software being run on the computer connected to the network
defines the user's port into the network

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is the purpose of flow control?

To regulate the size of each segment.
To ensure that data is retransmitted if an acknowledgment is not received.
To reassemble segments in the correct order at the destination device.
To provide a means for the receiver to govern the amount of data sent by the sender.

ANSWER DOWNLOAD EXAMIANS APP