Computer Networking
Which of the following technique is used for fragment?

All of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
None of these
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You get a call from a network administrator who tells you that he typed the following into his router:Router (config) #router ospf 1Router (config-router) #network 10.0.0.0 255.0.0.0 area 0He tells you he still can't see any routes in the routing table. What configuration error did the administrator make?

The wildcard mask is incorrect.
The OSPF area is wrong.
The AS configuration is wrong.
The OSPF Process ID is incorrect.

ANSWER DOWNLOAD EXAMIANS APP