Computer Networking
Which of the following technique is used for Time-To-Line (TTL)?

None of these
One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size.
All of these
a technique used in best-effort delivery system to avoid endlessly looping packets.
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is the purpose of Spanning Tree Protocol in a switched LAN?

To prevent switching loops in networks with redundant switched paths
To provide a mechanism for network monitoring in switched environments
To prevent routing loops in networks with redundant paths
To manage the VLAN database across multiple switches
To create collision domains

ANSWER DOWNLOAD EXAMIANS APP