Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called?

Electronic newspaper
Global network
Electronic mail
Paperless office
None of these

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
When setting up Frame Relay for point-to-point subinterfaces, which of the following must not be configured?

An IP address on the physical interface
PAP
The subinterface type as point-to-point
The local DLCI on each subinterface
The Frame Relay encapsulation on the physical interface

ANSWER DOWNLOAD EXAMIANS APP