Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) In the network with dozens of switches, how many root bridges will you have?

A. 1   
B. 2
C. 5
D. 12

problem 2) What PPP protocol provides dynamic addressing, authentication, and multilink?

A. NCP   
B. HDLC
C. LCP   
D. X.25

problem 3) What is a stub network?

A. A network with more than one exit point.
B. A network with more than one exit and entry point.
C. A network with only one entry and no exit point.
D. A network that has only one entry and exit point.

problem 4) If your router is facilitating the CSU/DSU, which of the following commands do you require to use to provide router with the 64000bps serial link?

A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
D. RouterA(config-if)#clock rate 64000

problem 5) Which one of the following is true regarding VLANs?

A. Two VLANs are configured by default on all Cisco switches.
B. VLANs only work if you have complete Cisco switched internetwork. No off-brand switches are allowed.
C. You must not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.

problem 6) What does a VLAN do?

A. Acts as the fastest port to all servers.
B. Provides multiple collision domains on one switch port.
C. Breaks up broadcast domains in a layer 2 switch internetwork.
D. Provides multiple broadcast domains within a single collision domain.

problem 7) What is the major reason the OSI model was created?

A. To create the layered model larger than the DoD model.
B. So application developers could change only one layer's protocols at a time.
C. So different networks can communicate.
D. So Cisco could use the model.

problem 8) How many collision domains are created when you segment the network with a 12-port switch?

A. 1   
B. 2
C. 5   
D. 12

problem 9) What command would display a line, protocol, DLCI, and LMI information of the interface?

A. sh pvc
B. show interface
C. show frame-relay pvc
D. show run

problem 10) Which protocol does Ping use?

A. TCP   
B. ARP
C. ICMP   
D. BootP

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95121

Have any Question? 


Related Questions in Computer Network & Security

Case study wireless and mobile technologiesin this very

Case Study: Wireless and Mobile Technologies In this very competitive climate, many companies are seeking ways to connect with customers in ways that add value. Mobile and wireless computing have become key focal points ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

Assignment standards researchthe following website may be

Assignment: Standards Research The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled "Standards Organizations" written by William Stallings (200 ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

Discussion questions -optimizing your network design please

Discussion Questions - "Optimizing Your Network Design" Please respond to the following: Select and describe one (1) of the queuing methods described in the readings. Present a real-world example of the method you select ...

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro