Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) In the network with dozens of switches, how many root bridges will you have?

A. 1   
B. 2
C. 5
D. 12

problem 2) What PPP protocol provides dynamic addressing, authentication, and multilink?

A. NCP   
C. LCP   
D. X.25

problem 3) What is a stub network?

A. A network with more than one exit point.
B. A network with more than one exit and entry point.
C. A network with only one entry and no exit point.
D. A network that has only one entry and exit point.

problem 4) If your router is facilitating the CSU/DSU, which of the following commands do you require to use to provide router with the 64000bps serial link?

A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
D. RouterA(config-if)#clock rate 64000

problem 5) Which one of the following is true regarding VLANs?

A. Two VLANs are configured by default on all Cisco switches.
B. VLANs only work if you have complete Cisco switched internetwork. No off-brand switches are allowed.
C. You must not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.

problem 6) What does a VLAN do?

A. Acts as the fastest port to all servers.
B. Provides multiple collision domains on one switch port.
C. Breaks up broadcast domains in a layer 2 switch internetwork.
D. Provides multiple broadcast domains within a single collision domain.

problem 7) What is the major reason the OSI model was created?

A. To create the layered model larger than the DoD model.
B. So application developers could change only one layer's protocols at a time.
C. So different networks can communicate.
D. So Cisco could use the model.

problem 8) How many collision domains are created when you segment the network with a 12-port switch?

A. 1   
B. 2
C. 5   
D. 12

problem 9) What command would display a line, protocol, DLCI, and LMI information of the interface?

A. sh pvc
B. show interface
C. show frame-relay pvc
D. show run

problem 10) Which protocol does Ping use?

A. TCP   
C. ICMP   
D. BootP

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95121

Have any Question? 

Related Questions in Computer Network & Security

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Imagine you are an Information Systems Security Officer for a medium-sized financial services firm that has operations in four (4) states (Virginia, Florida, ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

Problem -an advanced drinks vending machine allows a mobile

Problem - An advanced drinks vending machine allows a mobile user to pay for a drink using a mobile phone billing account based on his/her fingerprint. The user is assumed to have data related to one of his/her fingerpri ...

Discussionip basic concepts please respond to the

Discussion "IP Basic Concepts" Please respond to the following: - Suppose that you work for a company that has been using IPv4 in each of its networks. After hearing a discussion about the differences between IPv4 and IP ...

Cryptography assignment1 decrypt the following message

Cryptography Assignment 1. Decrypt the following message. Assume direct letter substitution. blf szev yvvm z tivzg xozhh. I drhs blf zoo hfxxvhh zmw hzkkrmvhh. 2. Research the RSA cryptographic algorithm. a. If the Publi ...

Perimeter securitythe project deliverables are as

Perimeter Security The project deliverables are as follows: • Update the Information Network Security Architecture Design document title page with a new date and project name. • Update your previously completed sections ...

This assignment assumes that you are one of the network

This assignment assumes that you are one of the Network Engineer of a small Company which has two branch offices, Branch 1 (BR1), Branch 2 (BR2) and a Headquarter (HQ). The branches need to be interconnected to the Headq ...

Short papercompare and contrast cat 6 unshielded twisted

Short Paper Compare and contrast cat. 6 unshielded twisted pair (UTP), coaxial, and single mode fiber optic cabling types. Describe one or two of the advantages and/or disadvantages associated with using each cable type ...

Network security paper in this paper you will define the

Network Security Paper: In this paper, you will define the security strategies of Defense in Depth and Layered Security along with comparing and contrasting the strategies by explaining, at least, two advantages and disa ...

Assignmentthis assignment requires you to use presentation

Assignment This assignment requires you to use presentation tools and allows you to be creative. The presentation subject is to be network security on the Boeing 787 Dreamliner. To begin, get familiar with the topic by r ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro