Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) What does RIPv2 use to prevent routing loops?

a. CIDR
b. Split horizon
c. Authentication
d. Classless masking
e. Holddown timers

A. 1 and 3
B. 2, 3 and 5
C. 2 and 5
D. 3 and 4

problem 2) Which two of the following are true regarding distance-vector and link-state routing protocols?

a. Link state sends its whole routing table out all active interfaces on periodic time intervals.
b. Distance vector sends its whole routing table out all active interfaces on periodic time intervals.
c. Link state sends updates containing the state of its own links to all routers in the internetwork.
d. Distance vector sends updates containing the state of its own links to all routers in internetwork.

A. 1 only
B. 3 only
C. 2 and 3 only
D. None of the above

problem 3) IGRP uses which of the following as default parameters for finding the best path to remote network?

a. Hop count
b. MTU
c. Cumulative interface delay
d. STP
e. Path bandwidth value

A. 1 and 3
B. 3 and 5
C. 2, 3 and 5
D. All of the above

problem 4) Network 206.143.5.0 was assigned to Acme Company to connect to its ISP. The administrator of Acme will like to configure one router with commands to access the Internet. Which commands can be configured on the Gateway router to permit Internet access to the entire network?

a. Gateway(config)# ip route 0.0.0.0 0.0.0.0 206.143.5.2
b. Gateway(config)# router rip
c. Gateway(config-router)# network 206.143.5.0
d. Gateway(config-router)# network 206.143.5.0 default

A. 1 only
B. 3 only
C. 1, 2 and 4
D. 1 and 4

problem 5) What is the function of Spanning Tree Protocol in a switched LAN?

A. To provide the mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage VLAN database across multiple switches
E. To create collision domains

problem 6) Which statement describe a spanning-tree network that has converged?

A. All switch and bridge ports are in forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.

problem 7) What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution

problem 8) In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the switched LAN?

A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In the improperly implemented redundant topology

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95153
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Assignmentthis assignment requires you to use presentation

Assignment This assignment requires you to use presentation tools and allows you to be creative. The presentation subject is to be network security on the Boeing 787 Dreamliner. To begin, get familiar with the topic by r ...

Explain the key differences between symmetric and

Explain the key differences between symmetric and asymmetric encryption. Which can the computer process faster? Which lowers the costs associated with key management? What is a VPN? Why are VPNs widely used?

1a briefly explain how an integrity check value icv may be

1. (a) Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors. (b) When using an ICV, explain why (i) a message might be transmitted correctly but the receiver believes t ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Network securitythe focus of the reseach paper is host

Network Security The focus of the reseach paper is Host Intrusion Detection Systems (HIDS) or AntiVirus Systems. Computer Virus creates major headaches for most organizations, as this list of 10 worst PC virus outbreaks ...

Cloud networking and service provisioning - standard

Cloud Networking and Service Provisioning - Standard project: Auction System in the Cloud 1. Introduction The project consists of designing and implementing an auction system (AS) which offers its services as SaaS to end ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro