Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which statement describes a spanning-tree network that has converged?

All switch and bridge ports are in the forwarding state.
All switch and bridge ports are assigned as either root or designated ports.
All switch and bridge ports are in either the forwarding or blocking state.
All switch and bridge ports are either blocking or looping.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Error detecting code is

a code in which each expression conforms to specify rules of construction, so that if certain errors occur in an expression, the resulting expression will not conform to the rules of construction and
an error-detecting code based on a summation operation performed on the bits to be checked
None of these
a check bit appended to an array of binary digits to make the sum of all the binary digits.
the ratio of the data units in error to the total number of data units

ANSWER DOWNLOAD EXAMIANS APP