Computer Networking
The X.25 standard specifies a

None of these
technique for start-stop data
technique for dial access
data bit rate
DTE/DCE interface

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Why does the data communication industry use the layered OSI reference model?1. It divides the network communication process into smaller and simpler components, thus aiding component development, design, and troubleshooting.2. It enables equipment from different vendors to use the same electronic components, thus saving research and development funds.3. It supports the evolution of multiple competing standards and thus provides business opportunities for equipment manufacturers.4. It encourages industry standardization by defining what functions occur at each layer of the model.

1 and 4
1 only
2 and 3
3 only

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Baseband is

the simultaneous transmission of data to a number of stations
transmission of signals without modulation
a signal all of whose energy is contained within a finite frequency range
None of these
All of these

ANSWER DOWNLOAD EXAMIANS APP