Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) How long is the IPv6 address?

A) 32 bits
B) 128 bytes
C) 64 bits
D) 128 bits

problem 2) What flavour of Network Address Translation could be used to have one IP address permit many users to connect to global Internet?

A) NAT   
B) Static
C) Dynamic   
D) PAT

problem 3) What are the two main types of access control lists (ACLs)?

a) Standard
b) IEEE
c) Extended
d) Specialized

A) 1 and 3
B) 2 and 4
C) 3 and 4
D) 1 and 2

problem 4) What command is used to create a backup configuration?

A) copy running backup
B) copy running-config startup-config
C) config mem
D) wr mem

problem 5) You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?

A) 100 kbps
B) 1 Mbps
C) 2 Mbps
D) 10 Mbps

problem 6) Which WLAN IEEE specification allows up to 54Mbps at 2.4GHz?

A) A
B) B
C) G   
D) N

problem 7) Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?

A) 192.168.168.129-190   
B) 192.168.168.129-191
C) 192.168.168.128-190
D) 192.168.168.128-192

problem 8) To back up an IOS, what command will you use?

A) backup IOS disk
B) copy ios tftp
C) copy tftp flash
D) copy flash tftp

problem 9) What protocol does PPP use to identify the Network layer protocol?

A) NCP
B) ISDN
C) HDLC   
D) LCP

problem 10) Which of the following commands will allow you to set your Telnet password on a Cisco router?

A) line telnet 0 4
B) line aux 0 4
C) line vty 0 4
D) line con 0

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95113

Have any Question? 


Related Questions in Computer Network & Security

Provide at least three methods or tools used to attack web

Provide at least three methods or tools used to attack web servers as well as provide how each of these three methods can be protected against. Directions: Your completed assignment should be at least 2 FULL double-space ...

The project requires a significant amount of work on

The project requires a significant amount of work on research, design and implementation. It is advised that you should start the project as soon as possible. A Simple File Transfer Protocol Design and implement a simple ...

I encourage you to use latex but even if you dont please

I encourage you to use Latex, but even if you don't, please type your answers or hand write nicely. Explain your argument in a brief and precise way. 1. In a symmetric cryptosystem, Alice and Bob both know the e-key and ...

Assignment submissionyour assignment must be in microsoft

Assignment Submission Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1 -Cryptographic Operations with GPG Objective: gain experience ...

Tcpip network assignmentneed 8 ppt slides with at least 2

TCP/IP Network Assignment Need 8 ppt slides with at least 2 references. Your manager has tasked you to create two network diagrams that illustrate the Remote Employee Connection options for VPN connectivity. These diagra ...

Problem 1 consider the following protocol there exists a

Problem 1: Consider the following protocol. There exists a trusted server, T, that shares a secret key with any participant in the network. That is, for a participant A, A and T share a secret key K A . The protocol allo ...

Taskprovide short answers to the following six questions

Task Provide short answers to the following six questions. Your answers should be clear, concise and to the point. Prepare a single document (MS Word or PDF, NOT both) along with title page and submit it online using EAS ...

Discussionvalue please respond to the followingbullassess

Discussion "Value" Please respond to the following: • Assess BCP as a process that adds business value. Give your opinion on whether or not the argument that states BCP adds value is a credible argument. Explain why or w ...

Introductionthis case study has been divided into six

Introduction This case study has been divided into six components. You are to design a network, research and source appropriate devices justifying choices (feasibility, efficiency, etc), subnet the network using VLSM, an ...

You will be given an ip address block 183200100024 your

You will be given an IP address block 183.200.100.0/24. Your task is to devise a feasible network addressing scheme for a large company with a number of geographically distributed offices around the country. There are fi ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate