Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) Which of the following permits a router to respond to the ARP request that is intended for a remote host?

A. Inverse ARP (IARP)
B. Reverse ARP (RARP)
C. Proxy ARP
D. Gateway DP

problem 2) The DoD model (also called the TCP/IP stack) has four layers. Which layer of DoD model is equivalent to Network layer of OSI model?

A. Application
B. Host-to-Host
C. Internet
D. Network Access

problem 3) Which of the following services use UDP?

d) FTP

A. 1, 3 and 6
B.  All of the above
C. 1, 2 and 4
D. 2 and 4

problem 4) Which class of IP address gives the maximum of only 254 host addresses per network ID?

A. Class D
B. Class B
C. Class C
D. Class A

problem 5) If you use either Telnet or FTP, which is the highest layer you are using to transmit data:

A. Application   
B. Presentation
C.  Session   
D. Transport

problem 6) Which of the following is the decimal and hexadecimal equivalents of the binary number 10011101?

A. 185, 0xB9
B. 157, 0x9D
C. 159, 0x9F
D. 155, 0x9B

problem 7) Which statements are true regarding the ICMP packets?

a) They acknowledge receipt of the TCP segment.
b) They guarantee datagram delivery.
c) They could provide hosts with information about the network problems.
d) They are encapsulated within the IP datagrams.

A. 2, 3 and 4
B. 2 and 3
C. 3 and 4
D. 1 only

problem 8) Which of the following are layers in TCP/IP model?

a. Data Link
b. Session
c. Transport
d. Internet
e. Application
f. Physical

A. 3, 4 and 5
B. 1, 3 and 4
C. 2, 3 and 5
D. 1 and 2

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95130

Have any Question? 

Related Questions in Computer Network & Security

Assignment overviewpurpose of the assessmentthe purpose of

Assignment Overview Purpose of the assessment: The purpose of this assignment is to develop skills to identify appropriate network security tools for various operating systems. Students will also have opportunity to expl ...

Project effect of legislation on organizationsthe purpose

Project: Effect of Legislation on Organizations The purpose of this is assignment is to 1) conduct research related to the impact of legislation on the HHS security program and 2) write a research paper. Learning Objecti ...

Cybersecurity in business and industry industry

Cybersecurity in Business and Industry Industry Profile Introduction - Provided an excellent overview of the cybersecurity industry as a whole. Answered the questions: (a) Why does this industry exist? and (b) How does t ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

Discussionvalue please respond to the followingbullassess

Discussion "Value" Please respond to the following: • Assess BCP as a process that adds business value. Give your opinion on whether or not the argument that states BCP adds value is a credible argument. Explain why or w ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

You are to write your own connectionless udp client print

You are to write your own connectionless (UDP) client. Print out everything. You can start with any open-source UDP client as a template and may want to include some parts of the template from Program 1. UDP packets will ...

A cipher can be created by using a keyword for example if

A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows: Method I. Write the word "statistic" without the repeated letters. Then complet ...

Context this assignment involves preparation of a report

Context This assignment involves PREPARATION OF A REPORT. The report relates to the Scenario given below. Aim: You have been asked to present a proposal for an Internet/Intranet solution for a college. The college is esp ...

The project requires a significant amount of work on

The project requires a significant amount of work on research, design and implementation. It is advised that you should start the project as soon as possible. A Simple File Transfer Protocol Design and implement a simple ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate