Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) How long is the IPv6 address?

A) 32 bits
B) 128 bytes
C) 64 bits
D) 128 bits

problem 2) What flavour of Network Address Translation could be used to have one IP address permit many users to connect to global Internet?

A) NAT   
B) Static
C) Dynamic   
D) PAT

problem 3) What are the two main types of access control lists (ACLs)?

a) Standard
b) IEEE
c) Extended
d) Specialized

A) 1 and 3
B) 2 and 4
C) 3 and 4
D) 1 and 2

problem 4) What command is used to create a backup configuration?

A) copy running backup
B) copy running-config startup-config
C) config mem
D) wr mem

problem 5) You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?

A) 100 kbps
B) 1 Mbps
C) 2 Mbps
D) 10 Mbps

problem 6) Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?

A) A
B) B
C) G   
D) N

problem 7) Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?

A) 192.168.168.129-190   
B) 192.168.168.129-191
C) 192.168.168.128-190
D) 192.168.168.128-192

problem 8) To back up an IOS, what command will you use?

A) backup IOS disk
B) copy ios tftp
C) copy tftp flash
D) copy flash tftp

problem 9) What protocol does PPP use to identify the Network layer protocol?

A) NCP
B) ISDN
C) HDLC   
D) LCP

problem 10) Which of the following commands will allow you to set your Telnet password on a Cisco router?

A) line telnet 0 4
B) line aux 0 4
C) line vty 0 4
D) line con 0

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95113

Have any Question? 


Related Questions in Computer Network & Security

Select one of the following topics in which you will base

Select one of the following topics in which you will base your responses in the form of a term paper: • Network Neutrality • Web2.0 • Wireless Technology • Broadband Convergence • U.S. Telecommunication Policy • Internet ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

A company in manhattan still keeps to the traditional

A company in Manhattan still keeps to the traditional mailing approaches even though the nature of their business strictly involves confidential documents that need to be sent to clients. Tell this Manhattan Company why ...

Network securitythe focus of the reseach paper is host

Network Security The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems. Computer Virus creates major headaches for most organizations, as this list of 10 worst PC virus outbreaks ...

Information securityfor this weeks discussion consider the

Information Security For this week's discussion, consider the following prompts: A cipher can be created by using a keyword. For example, if we choose "statistic" as our keyword, our cipher would be determined as follows ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

Assignmentintroductionin this assignment you will use

Assignment Introduction In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tool ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Assignmentwan technologies paper research point-to-point

Assignment WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies as ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen