Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which command is used to upgrade the IOS on Cisco router?

A. copy tftp flash
B. copy tftp start
C. config net
D.copy tftp run

problem 2) If you want to delete configuration stored in NVRAM, what will you type?

A. delete nvram
B. erase nvram
C. erase startup
D. erase running

problem 3) What protocols are used to configure trunking on the switch?

A. ISL
B. VLAN
C. VLAN Trunking Protocol
D. 802.1Q

problem 4) Which of the following services use TCP:

a. DHCP
b. SMTP
c. HTTP
d. TFTP
e. FTP

A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4

problem 5) What layer in a TCP/IP stack is equivalent to Transport layer of OSI model?

A. Application
B. Host-to-Host
C. Network Access
D. Internet

problem 6) Which of the following describe DHCP Discover message?

a. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
b. It uses UDP as the Transport layer protocol.
c. It uses TCP as the Transport layer protocol.
d. It doesn’t use a layer 2 destination address.

A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only

problem 7) You want to implement a mechanism which automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

A. ARP
B. SNMP
C. DHCP
D. SMTP

problem 8) Which of the following is private IP address?

a. 12.0.0.1
b. 192.168.24.43
c. 172.15.14.36   
d. 168.172.19.39

A. 1 only
B. 3 and 4
C. 1 and 2
D. 2 only

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95125

Have any Question? 


Related Questions in Computer Network & Security

Select one of the following topics in which you will base

Select one of the following topics in which you will base your responses in the form of a term paper: • Network Neutrality • Web2.0 • Wireless Technology • Broadband Convergence • U.S. Telecommunication Policy • Internet ...

There are a number of cellular phone companies each serving

There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the pros and cons 3G and 4G technolo ...

Networking trends papernbsp in this paper you will research

Networking Trends Paper:  In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, hardware, network m ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Learning team apply encryption standardsyour team was

Learning Team: Apply Encryption Standards Your team was invited to present to a high school IT class to explain how cryptography works. In order to explain the basics, you decide to show the class a tool called, CrypTool ...

Presentation - tool comparisonat this point you have been

Presentation - Tool Comparison At this point, you have been introduced to various security tools (Network Discovery, Network Scanning, DLP, Firewalls, and HIDS). You are to take one of the five identified categories of t ...

There are many arguments about cloud based information

There are many arguments about cloud based information services and/or offering IT as a cloud-based service. Some say cloud computing is nothing more than outsourcing IT and creating a dependency that will trap the organ ...

Lab questions1 when running snort ids why might there be no

Lab Questions 1. When running Snort IDS why might there be no alerts? 2. If we only went to a few web sites, why are there so many alerts? 3. What are the advantages of logging more information to the alerts file? 4. Wha ...

Assignment standards researchthe following website may be

Assignment: Standards Research The following Website may be used for reference to complete this assignment. The Website represents an electronic document titled "Standards Organizations" written by William Stallings (200 ...

Go to csrcnistgov and locate federal information processing

Go to csrc.nist.gov and locate "Federal Information Processing Standard (FIPS) 197." What encryption standard does the address use? Examine the contents of this publication and describe the algorithm discussed. How stron ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen