Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) In the network with dozens of switches, how many root bridges will you have?

A. 1   
B. 2
C. 5
D. 12

problem 2) What PPP protocol provides dynamic addressing, authentication, and multilink?

A. NCP   
C. LCP   
D. X.25

problem 3) What is a stub network?

A. A network with more than one exit point.
B. A network with more than one exit and entry point.
C. A network with only one entry and no exit point.
D. A network that has only one entry and exit point.

problem 4) If your router is facilitating the CSU/DSU, which of the following commands do you require to use to provide router with the 64000bps serial link?

A. RouterA(config)#bandwidth 64
B. RouterA(config-if)#bandwidth 64000
C. RouterA(config-if)#clock rate 64
D. RouterA(config-if)#clock rate 64000

problem 5) Which one of the following is true regarding VLANs?

A. Two VLANs are configured by default on all Cisco switches.
B. VLANs only work if you have complete Cisco switched internetwork. No off-brand switches are allowed.
C. You must not have more than 10 switches in the same VTP domain.
D. VTP is used to send VLAN information to switches in a configured VTP domain.

problem 6) What does a VLAN do?

A. Acts as the fastest port to all servers.
B. Provides multiple collision domains on one switch port.
C. Breaks up broadcast domains in a layer 2 switch internetwork.
D. Provides multiple broadcast domains within a single collision domain.

problem 7) What is the major reason the OSI model was created?

A. To create the layered model larger than the DoD model.
B. So application developers could change only one layer's protocols at a time.
C. So different networks can communicate.
D. So Cisco could use the model.

problem 8) How many collision domains are created when you segment the network with a 12-port switch?

A. 1   
B. 2
C. 5   
D. 12

problem 9) What command would display a line, protocol, DLCI, and LMI information of the interface?

A. sh pvc
B. show interface
C. show frame-relay pvc
D. show run

problem 10) Which protocol does Ping use?

A. TCP   
C. ICMP   
D. BootP

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95121

Have any Question? 

Related Questions in Computer Network & Security

Develop a network security policy for a global organization

Develop a network security policy for a global organization. The security was violated in different situations. There are various elements in which need to be discussed and researched to design and outline the policy. Di ...

The handbook must be original student content and workin

The handbook must be original student content and work. In addition to describing the company to which the employee handbook applies, also address the issues of privacy, employee or applicant testing, and performance eva ...

You are to write your own connectionless udp client print

You are to write your own connectionless (UDP) client. Print out everything. You can start with any open-source UDP client as a template and may want to include some parts of the template from Program 1. UDP packets will ...

1overviewthe learning objective of this assignment is for

1 Overview The learning objective of this assignment is for students to get familiar with the concepts in the security techniques such as symmetric and asymmetric encryption, hashing and certificates in Public Key Infras ...

Task sheettask scenarioan information security management

Task Sheet TASK SCENARIO: An information security management system (ISMS) represents a systematic approach to designing, implementing, maintaining, and auditing an organization's information system security objectives. ...

Problem 1 consider the following protocol there exists a

Problem 1: Consider the following protocol. There exists a trusted server, T, that shares a secret key with any participant in the network. That is, for a participant A, A and T share a secret key K A . The protocol allo ...

Assignment submissionyour assignment must be in microsoft

Assignment Submission Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1 -Cryptographic Operations with GPG Objective: gain experience ...

Wb and data securitysubject web and data securitytopic

Web and Data Security Subject: Web and Data Security Topic: various types of Utility and its use to secure the data 8 pages start with executive summary, introduction, examples, its use in data security and conclusion.

Ten immutable laws of security please respond to the

"Ten Immutable Laws of Security" Please respond to the following: • From the e-Activity, read the full article posted at titled "Ten Immutable Laws of Security (V ...

Goals1 to understand the challenges of protocol design2 to

Goals: 1. To understand the challenges of protocol design. 2. To discover and appreciate the challenges of developing complex, real-world network applications. 3. Make sense of real-world sockets programming APIs. 4. To ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate