Computer Networking
An error-detecting code inserted as a field in a block of data to be transmitted is known as

Error detecting code
Checksum
flow control
None of these
Frame check sequence

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer

The network becomes less efficient
The network becomes more efficient
After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device
The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500
An additional token is added for every 1,000 nodes

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following characteristic(s) is/are suited to the PSS applications?

Multiple remote host or applications accessed by a single local access circuit terminal and circuit
bursty traffic and low communications intensity
All of these
None of these
widely dispersed terminals and access to international packets switched services

ANSWER DOWNLOAD EXAMIANS APP