Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In the network with dozens of switches, how many root bridges will you have?

A. 1   
B. 2
C. 5
D. 12

problem 2) What PPP protocol provides dynamic addressing, authentication, and multilink?

A. NCP   
B. HDLC
C. LCP   
D. X.25

problem 3) What is a stub network?

A. A network with more than one exit point.
B. A network with more than one exit and entry point.
C. A network with only one entry and no exit point.
D. A network that has only one entry and exit point.

problem 4) If your router is facilitating the CSU/DSU, which of the following commands do you require to use to provide router with the 64000bps serial link?

A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
D. RouterA(config-if)#clock rate 64000

problem 5) Which one of the following is true regarding VLANs?

A. Two VLANs are configured by default on all Cisco switches.
B. VLANs only work if you have complete Cisco switched internetwork. No off-brand switches are allowed.
C. You must not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.

problem 6) What does a VLAN do?

A. Acts as the fastest port to all servers.
B. Provides multiple collision domains on one switch port.
C. Breaks up broadcast domains in a layer 2 switch internetwork.
D. Provides multiple broadcast domains within a single collision domain.

problem 7) What is the major reason the OSI model was created?

A. To create the layered model larger than the DoD model.
B. So application developers could change only one layer's protocols at a time.
C. So different networks can communicate.
D. So Cisco could use the model.

problem 8) How many collision domains are created when you segment the network with a 12-port switch?

A. 1   
B. 2
C. 5   
D. 12

problem 9) What command would display a line, protocol, DLCI, and LMI information of the interface?

A. sh pvc
B. show interface
C. show frame-relay pvc
D. show run

problem 10) Which protocol does Ping use?

A. TCP   
B. ARP
C. ICMP   
D. BootP

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95121

Have any Question? 


Related Questions in Computer Network & Security

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

Assignment case study handmade furniture ltdthis case study

Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the f ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

Topic 1 wireless technologiescreate a short essay 1 to 3

Topic 1: Wireless Technologies Create a short essay (1 to 3 pages) that describes how you will set up a wireless network for the Nardi Pardy Corporation (a fictitious company). In this simple scenario, the company office ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Security configuration managementkey assignmentsignificant

Security Configuration Management Key Assignment Significant work has been completed over the past few weeks on the Network Security Architecture Design document, including the following: • Security Requirements • Perime ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

Learning team recommend pki technologythe head network

Learning Team: Recommend PKI Technology The head network engineer at ACME Corp. is concerned about nefarious parties being able to freely plug in devices to the company LAN. Even though he is skilled at network administr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro