Computer Networking
The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model?

Internet
Host-to-Host
Application
Network Access

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following are benefits of VLANs?1. They increase the size of collision domains.2. They allow logical grouping of users by function.3. They can enhance network security.4. They increase the size of broadcast domains while decreasing the number of collision domains.5. They simplify switch administration.6. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

2, 3 and 6
1 and 5
2 and 4
1, 3 and 5

ANSWER DOWNLOAD EXAMIANS APP