Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) How long is the IPv6 address?

A) 32 bits
B) 128 bytes
C) 64 bits
D) 128 bits

problem 2) What flavour of Network Address Translation could be used to have one IP address permit many users to connect to global Internet?

A) NAT   
B) Static
C) Dynamic   
D) PAT

problem 3) What are the two main types of access control lists (ACLs)?

a) Standard
b) IEEE
c) Extended
d) Specialized

A) 1 and 3
B) 2 and 4
C) 3 and 4
D) 1 and 2

problem 4) What command is used to create a backup configuration?

A) copy running backup
B) copy running-config startup-config
C) config mem
D) wr mem

problem 5) You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?

A) 100 kbps
B) 1 Mbps
C) 2 Mbps
D) 10 Mbps

problem 6) Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?

A) A
B) B
C) G   
D) N

problem 7) Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?

A) 192.168.168.129-190   
B) 192.168.168.129-191
C) 192.168.168.128-190
D) 192.168.168.128-192

problem 8) To back up an IOS, what command will you use?

A) backup IOS disk
B) copy ios tftp
C) copy tftp flash
D) copy flash tftp

problem 9) What protocol does PPP use to identify the Network layer protocol?

A) NCP
B) ISDN
C) HDLC   
D) LCP

problem 10) Which of the following commands will allow you to set your Telnet password on a Cisco router?

A) line telnet 0 4
B) line aux 0 4
C) line vty 0 4
D) line con 0

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95113

Have any Question? 


Related Questions in Computer Network & Security

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Web and data securitybullyour company security

Web and Data Security • Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as ...

Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

Objectivesthis assignment is designed to assess students

OBJECTIVES This assignment is designed to assess students' ability to: - Produce a concise detailed report about the importance of information security audit policy and its components - To have excellent understanding re ...

Assignmentpart 1the new network administrator at health

Assignment Part 1 The new network administrator at Health Care HQ wants to be clear about your duties as the system administrator. In 1 paragraph, you will provide the following: • Explain your job duties to the new netw ...

Scenario additional detailshealth care hq has a

Scenario: Additional Details Health Care HQ has a client-server network architecture. The chief information officer (CIO) wants to understand the difference between a client-server and a peer-to-peer network. She also wa ...

Cloud computing assignmentq1 you need to prepare a short

Cloud Computing Assignment Q1. You need to prepare a short report that describes the benefits of Cloud Computing for smartphone-like devices apps development and growing in the marketplace. Your discussion should be 400- ...

Assignmentyou are hired as a chief technology officer cto

Assignment You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the produ ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro