Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which of the following permits a router to respond to the ARP request that is intended for a remote host?

A. Inverse ARP (IARP)
B. Reverse ARP (RARP)
C. Proxy ARP
D. Gateway DP

problem 2) The DoD model (also called the TCP/IP stack) has four layers. Which layer of DoD model is equivalent to Network layer of OSI model?

A. Application
B. Host-to-Host
C. Internet
D. Network Access

problem 3) Which of the following services use UDP?

a) HTTP
b) SMTP
c) SNMP
d) FTP
e) DHCP
d) TFTP

A. 1, 3 and 6
B.  All of the above
C. 1, 2 and 4
D. 2 and 4

problem 4) Which class of IP address gives the maximum of only 254 host addresses per network ID?

A. Class D
B. Class B
C. Class C
D. Class A

problem 5) If you use either Telnet or FTP, which is the highest layer you are using to transmit data:

A. Application   
B. Presentation
C.  Session   
D. Transport

problem 6) Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101?

A. 185, 0xB9
B. 157, 0x9D
C. 159, 0x9F
D. 155, 0x9B

problem 7) Which statements are true regarding the ICMP packets?

a) They acknowledge receipt of the TCP segment.
b) They guarantee datagram delivery.
c) They could provide hosts with information about the network problems.
d) They are encapsulated within the IP datagrams.

A. 2, 3 and 4
B. 2 and 3
C. 3 and 4
D. 1 only

problem 8) Which of the following are layers in TCP/IP model?

a. Data Link
b. Session
c. Transport
d. Internet
e. Application
f. Physical

A. 3, 4 and 5
B. 1, 3 and 4
C. 2, 3 and 5
D. 1 and 2

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95130

Have any Question? 


Related Questions in Computer Network & Security

Module discussion questionpersonal factors such as anger

Module Discussion Question Personal factors, such as anger, revenge, and lack of rewards and recognition, may increase the risk of someone stealing from or spying against employees. Organizations should apply adequate se ...

Network simulation projectsimulation projectobjectivesbull

Network Simulation Project Simulation Project Objectives • Design and analyze the performance of a network under different traffic conditions. • Design and analyze the performance of a wide area network. • Investigates t ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

Analyzing network trafficone of our goals for this week is

Analyzing Network Traffic One of our goals for this week is to install and run a packet-capture utility, such as Wireshark. If you are successful with this task, run the packet capture while you do a familiar online task ...

Assignmentinstructions1you just received a brand new

Assignment Instructions 1. You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing net ...

Network management paper in this paper you will research

Network Management Paper: In this paper, you will research and report on network management tools associated with (1) policy compliance, (2) bandwidth management, and (3) asset management. Compare and contrast, at least, ...

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Assignment network programmingassignmentbuild a chat

Assignment: Network Programming Assignment: Build a chat programme using socket level programming. This can be done at various levels of sophistication and the marks available at each level are indicated below. Tutorials ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro