Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) What does RIPv2 use to prevent routing loops?

b. Split horizon
c. Authentication
d. Classless masking
e. Holddown timers

A. 1 and 3
B. 2, 3 and 5
C. 2 and 5
D. 3 and 4

problem 2) Which two of the following are true regarding distance-vector and link-state routing protocols?

a. Link state sends its whole routing table out all active interfaces on periodic time intervals.
b. Distance vector sends its whole routing table out all active interfaces on periodic time intervals.
c. Link state sends updates containing the state of its own links to all routers in the internetwork.
d. Distance vector sends updates containing the state of its own links to all routers in internetwork.

A. 1 only
B. 3 only
C. 2 and 3 only
D. None of the above

problem 3) IGRP uses which of the following as default parameters for finding the best path to remote network?

a. Hop count
b. MTU
c. Cumulative interface delay
d. STP
e. Path bandwidth value

A. 1 and 3
B. 3 and 5
C. 2, 3 and 5
D. All of the above

problem 4) Network was assigned to Acme Company to connect to its ISP. The administrator of Acme will like to configure one router with commands to access the Internet. Which commands can be configured on the Gateway router to permit Internet access to the entire network?

a. Gateway(config)# ip route
b. Gateway(config)# router rip
c. Gateway(config-router)# network
d. Gateway(config-router)# network default

A. 1 only
B. 3 only
C. 1, 2 and 4
D. 1 and 4

problem 5) What is the function of Spanning Tree Protocol in a switched LAN?

A. To provide the mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage VLAN database across multiple switches
E. To create collision domains

problem 6) Which statement describe a spanning-tree network that has converged?

A. All switch and bridge ports are in forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.

problem 7) What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution

problem 8) In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the switched LAN?

A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In the improperly implemented redundant topology

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95153
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question? 

Related Questions in Computer Network & Security

Assignment services in your arearesearch dsl and cable

Assignment: Services in Your Area Research DSL and cable modem services available closest to your community. You may use neighboring communities or regions if your community does not have access to DSL or cable modem ser ...

Networking trends papernbsp in this paper you will research

Networking Trends Paper:  In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network m ...

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Assessment project network securityyou have been recently

Assessment Project Network Security You have been recently hired as a network security analyst for a small accounting firm. The firm is realizing that they need help to secure their network and customer's data. With your ...

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

Assignment case study handmade furniture ltdthis case study

Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the f ...

Assignment description1overview of the assessmentthe

Assignment Description 1 Overview of the assessment: The purpose of this assignment is to develop skills to independently think of a situation and Apply skills to analyze complex problems in network security under superv ...

Topic 1 wireless technologiescreate a short essay 1 to 3

Topic 1: Wireless Technologies Create a short essay (1 to 3 pages) that describes how you will set up a wireless network for the Nardi Pardy Corporation (a fictitious company). In this simple scenario, the company office ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

The us government has put in place ipv6-compliance mandates

The U.S. government has put in place IPv6-compliance mandates to help with the IPv4-to-IPv6 transition. Such mandates require government agencies to have their websites, email and other services available over IPv6. Let' ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro