Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which command is used to upgrade the IOS on Cisco router?

A. copy tftp flash
B. copy tftp start
C. config net
D.copy tftp run

problem 2) If you want to delete configuration stored in NVRAM, what will you type?

A. delete nvram
B. erase nvram
C. erase startup
D. erase running

problem 3) What protocols are used to configure trunking on the switch?

A. ISL
B. VLAN
C. VLAN Trunking Protocol
D. 802.1Q

problem 4) Which of the following services use TCP:

a. DHCP
b. SMTP
c. HTTP
d. TFTP
e. FTP

A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4

problem 5) What layer in a TCP/IP stack is equivalent to Transport layer of OSI model?

A. Application
B. Host-to-Host
C. Network Access
D. Internet

problem 6) Which of the following describe DHCP Discover message?

a. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
b. It uses UDP as the Transport layer protocol.
c. It uses TCP as the Transport layer protocol.
d. It doesn’t use a layer 2 destination address.

A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only

problem 7) You want to implement a mechanism which automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

A. ARP
B. SNMP
C. DHCP
D. SMTP

problem 8) Which of the following is private IP address?

a. 12.0.0.1
b. 192.168.24.43
c. 172.15.14.36   
d. 168.172.19.39

A. 1 only
B. 3 and 4
C. 1 and 2
D. 2 only

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95125

Have any Question? 


Related Questions in Computer Network & Security

Security management assessmentimplementing basic security

Security Management Assessment Implementing basic security management is an important task for system administrators, as security is important to today's organizations. IT specialists are on the front lines of protecting ...

Learning team recommend pki technologythe head network

Learning Team: Recommend PKI Technology The head network engineer at ACME Corp. is concerned about nefarious parties being able to freely plug in devices to the company LAN. Even though he is skilled at network administr ...

Assignmentyour boss has had an intrusion or so she says on

Assignment Your boss has had an intrusion (or so she says) on his home network. She has brought in a packet capture file for you to analyze. She says: "Something has happened on my home network. I use my network for inte ...

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Securritypost for elprofessoripart 1based on your teams

Securrity Post for elprofessori Part 1 Based on your team's Week Five Learning Team Collaborative discussion, write the Network Security Policy section of the Information Security Policy. Include the following: • Network ...

Introduction to information systems securityphysical

Introduction to Information Systems Security Physical Security Paper Research the following topic: Physical Security • What types of physical controls can be implemented to protect the perimeter of a building? • What typ ...

1 list and describe the four types of computer networks

1. List and describe the four types of computer networks from largest to smallest.  2. Define client/server computing, packet switching, and TCP/IP.  Explain how these three things make the Internet so powerful and robus ...

Assignmentyou have been hired as the chief security officer

Assignment You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that a ...

Networking and server landscape of rays foodusing the

Networking and server landscape of Ray's Food. Using the Configuration Scenario Instructions, create a 1-page Systems Diagram in Microsoft Visio, or another diagramming tool, that shows the technical networking and serve ...

Case study cyber security in business Case Study: Cyber Security in Business

Case Study: Cyber Security in Business Organizations Protecting organizational assets and information within the company has become a top priority for many organizational leaders. Review the article titled "Missed Alarms ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen