Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) What does RIPv2 use to prevent routing loops?

a. CIDR
b. Split horizon
c. Authentication
d. Classless masking
e. Holddown timers

A. 1 and 3
B. 2, 3 and 5
C. 2 and 5
D. 3 and 4

problem 2) Which two of the following are true regarding distance-vector and link-state routing protocols?

a. Link state sends its whole routing table out all active interfaces on periodic time intervals.
b. Distance vector sends its whole routing table out all active interfaces on periodic time intervals.
c. Link state sends updates containing the state of its own links to all routers in the internetwork.
d. Distance vector sends updates containing the state of its own links to all routers in internetwork.

A. 1 only
B. 3 only
C. 2 and 3 only
D. None of the above

problem 3) IGRP uses which of the following as default parameters for finding the best path to remote network?

a. Hop count
b. MTU
c. Cumulative interface delay
d. STP
e. Path bandwidth value

A. 1 and 3
B. 3 and 5
C. 2, 3 and 5
D. All of the above

problem 4) Network 206.143.5.0 was assigned to Acme Company to connect to its ISP. The administrator of Acme will like to configure one router with commands to access the Internet. Which commands can be configured on the Gateway router to permit Internet access to the entire network?

a. Gateway(config)# ip route 0.0.0.0 0.0.0.0 206.143.5.2
b. Gateway(config)# router rip
c. Gateway(config-router)# network 206.143.5.0
d. Gateway(config-router)# network 206.143.5.0 default

A. 1 only
B. 3 only
C. 1, 2 and 4
D. 1 and 4

problem 5) What is the function of Spanning Tree Protocol in a switched LAN?

A. To provide the mechanism for network monitoring in switched environments
B. To prevent routing loops in networks with redundant paths
C. To prevent switching loops in networks with redundant switched paths
D. To manage VLAN database across multiple switches
E. To create collision domains

problem 6) Which statement describe a spanning-tree network that has converged?

A. All switch and bridge ports are in forwarding state.
B. All switch and bridge ports are assigned as either root or designated ports.
C. All switch and bridge ports are in either the forwarding or blocking state.
D. All switch and bridge ports are either blocking or looping.

problem 7) What does a switch do when a frame is received on an interface and the destination hardware address is unknown or not in the filter table?

A. Forwards the switch to the first available link
B. Drops the frame
C. Floods the network with the frame looking for the device
D. Sends back a message to the originating station asking for a name resolution

problem 8) In which circumstance are multiple copies of the same unicast frame likely to be transmitted in the switched LAN?

A. During high-traffic periods
B. After broken links are reestablished
C. When upper-layer protocols require high reliability
D. In the improperly implemented redundant topology

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95153
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question? 


Related Questions in Computer Network & Security

Computer scienceunauthorized access to networks and the

Computer Science Unauthorized access to networks and the information they contain can present significant problems to an organization. Part of a good network improvement includes a review of system security and identific ...

I have one question and need a response to the other

I have one question and need a response to the other part.  The question needs to be at least two paragraphs with in text references and the other response need to be at least one paragraph and no references. Part 1 - Q1 ...

Assignmentyou are hired as a chief technology officer cto

Assignment You are hired as a Chief Technology Officer (CTO) of a startup company, which has two branches; one Los Angeles and one in San Francisco. The company hired employees to begin working on the design of the produ ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

Assignment network programmingassignmentbuild a chat

Assignment: Network Programming Assignment: Build a chat programme using socket level programming. This can be done at various levels of sophistication and the marks available at each level are indicated below. Tutorials ...

Project assignment software defined networks1introductionin

Project Assignment: Software Defined Networks 1 Introduction In this assignment you will learn how to use the OpenFlow protocol to program an SDN controller in a Mininet emulated network using POX. The following sections ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

Security frameworks or policy paperwrite one to two pages

Security Frameworks or Policy Paper Write one to two pages on ONE of the following topics: Security Framework • How does a security framework assist or affect in the design and implementation of a security infrastructure ...

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen