Computer Networking
If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?

access-list 110 deny 200.200.10.0 to network 200.199.11.0 eq ftpaccess-list 111 permit ip any 0.0.0.0 255.255.255.255
access-list 198 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftpaccess-list 198 permit ip any 0.0.0.0 255.255.255.255
access-list 100 deny tcp 200.200.10.0 0.0.0.255 200.199.11.0 0.0.0.255 eq ftp
access-list 1 deny ftp 200.200.10.0 200.199.11.0 any any

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is a stub network?

A network that has only one entry and exit point.
A network with more than one exit and entry point.
A network with only one entry and no exit point.
A network with more than one exit point.

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
What is the purpose of Spanning Tree Protocol in a switched LAN?

To manage the VLAN database across multiple switches
To provide a mechanism for network monitoring in switched environments
To create collision domains
To prevent routing loops in networks with redundant paths
To prevent switching loops in networks with redundant switched paths

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
Which of the following is true when describing a unicast address?

These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4.
These are like private addresses in IPv4 in that they are not meant to be routed.
These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap.
Packets addressed to a unicast address are delivered to a single interface.

ANSWER DOWNLOAD EXAMIANS APP