Computer Networking
Which of the following is an example of a standard IP access list?

access-list 1 permit 172.16.10.1 255.255.0.0
access-list standard 1.1.1.1
access-list 1 deny 172.16.10.1 0.0.0.0
access-list 110 permit host 1.1.1.1

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following technique is used for fragment?

All of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP