Computer Networking
Which of the following technique is used for fragment?

a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size
All of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Contention is

a collection of interconnected functional units that provides a data communications service among stations attached to the network
a continuous frequency capable of being modulated or impressed with a second signal
the condition when two or more stations attempt to use the same channel at the same time
None of these
One or more conductors that serve as a common connection for a related group of devices

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?

access-list 100 deny tcp any 192.168.10.0 0.0.0.255 eq 23
access-list 100 deny tcp 192.168.10.0 255.255.255.0 eq telnet
access-list 100 deny 192.168.10.0 0.0.0.255 any eq 23
access-list 100 deny tcp 192.168.10.0 0.255.255.255 eq telnet

ANSWER DOWNLOAD EXAMIANS APP