Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In the network with dozens of switches, how many root bridges will you have?

A. 1   
B. 2
C. 5
D. 12

problem 2) What PPP protocol provides dynamic addressing, authentication, and multilink?

A. NCP   
B. HDLC
C. LCP   
D. X.25

problem 3) What is a stub network?

A. A network with more than one exit point.
B. A network with more than one exit and entry point.
C. A network with only one entry and no exit point.
D. A network that has only one entry and exit point.

problem 4) If your router is facilitating the CSU/DSU, which of the following commands do you require to use to provide router with the 64000bps serial link?

A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
D. RouterA(config-if)#clock rate 64000

problem 5) Which one of the following is true regarding VLANs?

A. Two VLANs are configured by default on all Cisco switches.
B. VLANs only work if you have complete Cisco switched internetwork. No off-brand switches are allowed.
C. You must not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.

problem 6) What does a VLAN do?

A. Acts as the fastest port to all servers.
B. Provides multiple collision domains on one switch port.
C. Breaks up broadcast domains in a layer 2 switch internetwork.
D. Provides multiple broadcast domains within a single collision domain.

problem 7) What is the major reason the OSI model was created?

A. To create the layered model larger than the DoD model.
B. So application developers could change only one layer's protocols at a time.
C. So different networks can communicate.
D. So Cisco could use the model.

problem 8) How many collision domains are created when you segment the network with a 12-port switch?

A. 1   
B. 2
C. 5   
D. 12

problem 9) What command would display a line, protocol, DLCI, and LMI information of the interface?

A. sh pvc
B. show interface
C. show frame-relay pvc
D. show run

problem 10) Which protocol does Ping use?

A. TCP   
B. ARP
C. ICMP   
D. BootP

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95121

Have any Question? 


Related Questions in Computer Network & Security

Assignmentmr smith is the director of it at a law firm

Assignment Mr. Smith is the Director of IT at a law firm located in downtown Chicago. He needs to plan for a network upgrade. He has decided that he would like to have a network analysis done before the upgrade so that h ...

Network and internet security assignmentproblem 1 - network

NETWORK AND INTERNET SECURITY ASSIGNMENT PROBLEM 1 - Network Access Control 1) Suppose you are a network administrator and are concerned about unauthorized networked devices being plugged into your system. You have read ...

Cloud computing assignmentq1 you need to prepare a short

Cloud Computing Assignment Q1. You need to prepare a short report that describes the benefits of Cloud Computing for smartphone-like devices apps development and growing in the marketplace. Your discussion should be 400- ...

Short paperwan technologies paper research point-to-point

Short Paper WAN Technologies Paper: Research Point-to-Point (dedicated), Packet Switched, and Circuit Switched WAN protocols/circuits/types. Define each protocol and describe at least two data transmission technologies a ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Questions1 describe three factors that help to influence

Questions: 1. Describe three factors that help to influence our nation's focus on natural or man-made disasters. 2. What issues have been raised concerning some of the authorities granted to government agencies in the PA ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro