Computer Networking
Which of the following technique is used for fragment?

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
None of these
All of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any

ANSWER DOWNLOAD EXAMIANS APP