Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) How long is the IPv6 address?

A) 32 bits
B) 128 bytes
C) 64 bits
D) 128 bits

problem 2) What flavour of Network Address Translation could be used to have one IP address permit many users to connect to global Internet?

A) NAT   
B) Static
C) Dynamic   
D) PAT

problem 3) What are the two main types of access control lists (ACLs)?

a) Standard
b) IEEE
c) Extended
d) Specialized

A) 1 and 3
B) 2 and 4
C) 3 and 4
D) 1 and 2

problem 4) What command is used to create a backup configuration?

A) copy running backup
B) copy running-config startup-config
C) config mem
D) wr mem

problem 5) You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?

A) 100 kbps
B) 1 Mbps
C) 2 Mbps
D) 10 Mbps

problem 6) Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?

A) A
B) B
C) G   
D) N

problem 7) Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?

A) 192.168.168.129-190   
B) 192.168.168.129-191
C) 192.168.168.128-190
D) 192.168.168.128-192

problem 8) To back up an IOS, what command will you use?

A) backup IOS disk
B) copy ios tftp
C) copy tftp flash
D) copy flash tftp

problem 9) What protocol does PPP use to identify the Network layer protocol?

A) NCP
B) ISDN
C) HDLC   
D) LCP

problem 10) Which of the following commands will allow you to set your Telnet password on a Cisco router?

A) line telnet 0 4
B) line aux 0 4
C) line vty 0 4
D) line con 0

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95113

Have any Question? 


Related Questions in Computer Network & Security

Your assignment must be in microsoft word formatnote your

Your assignment must be in Microsoft Word format Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1: Firewall Rule Design The fo ...

Learning team recommend pki technologythe head network

Learning Team: Recommend PKI Technology The head network engineer at ACME Corp. is concerned about nefarious parties being able to freely plug in devices to the company LAN. Even though he is skilled at network administr ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

System reference guide - diagrammingyou have been called

System Reference Guide - Diagramming You have been called upon to put together some reference materials for other groups to follow, since up until now they have not created any formal architectural documents. As a contin ...

Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Assignmentintroductionin this assignment you will use

Assignment Introduction In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tool ...

What is a dmz is this really a good name for the function

What is a DMZ? Is this really a good name for the function that this type of subnet performs? What is RADIUS? What advantage does it have over TACACS? How does a network-based IDPS differ from a host-based IDPS? What is ...

Pros amp cons of very simple vs very planned networkwrite a

Pros & Cons of Very Simple Vs Very Planned Network Write a 3-5 page report that discusses the pros and cons of very simple plans versus detailed plans, although the standards mandate very specific requirements for the pl ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen