Ask Question, Ask an Expert


Ask Computer Network & Security Expert

problem 1) Which command is used to upgrade the IOS on Cisco router?

A. copy tftp flash
B. copy tftp start
C. config net
D.copy tftp run

problem 2) If you want to delete configuration stored in NVRAM, what will you type?

A. delete nvram
B. erase nvram
C. erase startup
D. erase running

problem 3) What protocols are used to configure trunking on the switch?

C. VLAN Trunking Protocol
D. 802.1Q

problem 4) Which of the following services use TCP:

e. FTP

A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4

problem 5) What layer in a TCP/IP stack is equivalent to Transport layer of OSI model?

A. Application
B. Host-to-Host
C. Network Access
D. Internet

problem 6) Which of the following describe DHCP Discover message?

a. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
b. It uses UDP as the Transport layer protocol.
c. It uses TCP as the Transport layer protocol.
d. It doesn’t use a layer 2 destination address.

A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only

problem 7) You want to implement a mechanism which automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?


problem 8) Which of the following is private IP address?


A. 1 only
B. 3 and 4
C. 1 and 2
D. 2 only

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95125

Have any Question? 

Related Questions in Computer Network & Security

1 what attributes do organizations seek in a candidate when

1. What attributes do organizations seek in a candidate when hiring InfoSec professionals? Prioritize this list of attributes and justify your ranking 2. What are the critical actions that management must consider taking ...

Assignmentthe vice president of sales for your company has

Assignment The Vice President of Sales for your company has asked you for more information on cloud-based office productivity suites. He tells you that the Sales team is often remote and needs to be able to stay connecte ...

Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

Introduction to information systems securityphysical

Introduction to Information Systems Security Physical Security Paper Research the following topic: Physical Security • What types of physical controls can be implemented to protect the perimeter of a building? • What typ ...

Cloud computing assignmentq1 you need to prepare a short

Cloud Computing Assignment Q1. You need to prepare a short report that describes the benefits of Cloud Computing for smartphone-like devices apps development and growing in the marketplace. Your discussion should be 400- ...

Part-1given the following design for a money transfer

Part-1 Given the following design for a money transfer protocol which utilizes public key cryptography to assure confidentiality and authenticity of the transmission. Issuing a Check: 1. Payee (A) will contact the bank r ...

Or the purpose of the first part of this project you are

Or the purpose of the first part of this Project, you are still the InfoSec Specialist for the Greenwood Company. Consider this project a continuation of the work you performed in Projects 1 and 2. After seeing you searc ...

Firewall fundamentalsactions for firewall

Firewall Fundamentals Actions for 'Firewall Fundamentals Firewalls are considered the key element in securing networks. A firewall is usually a computer that sits on two different networks and passes allowed traffic betw ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Case studyyour company security professionals inc has been

Case study Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal. The perimeter assessment / current state is included as "Case # 2 - W ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro