Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which command is used to upgrade the IOS on Cisco router?

A. copy tftp flash
B. copy tftp start
C. config net
D.copy tftp run

problem 2) If you want to delete configuration stored in NVRAM, what will you type?

A. delete nvram
B. erase nvram
C. erase startup
D. erase running

problem 3) What protocols are used to configure trunking on the switch?

A. ISL
B. VLAN
C. VLAN Trunking Protocol
D. 802.1Q

problem 4) Which of the following services use TCP:

a. DHCP
b. SMTP
c. HTTP
d. TFTP
e. FTP

A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4

problem 5) What layer in a TCP/IP stack is equivalent to Transport layer of OSI model?

A. Application
B. Host-to-Host
C. Network Access
D. Internet

problem 6) Which of the following describe DHCP Discover message?

a. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
b. It uses UDP as the Transport layer protocol.
c. It uses TCP as the Transport layer protocol.
d. It doesn’t use a layer 2 destination address.

A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only

problem 7) You want to implement a mechanism which automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

A. ARP
B. SNMP
C. DHCP
D. SMTP

problem 8) Which of the following is private IP address?

a. 12.0.0.1
b. 192.168.24.43
c. 172.15.14.36   
d. 168.172.19.39

A. 1 only
B. 3 and 4
C. 1 and 2
D. 2 only

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95125

Have any Question? 


Related Questions in Computer Network & Security

Wireless and remote access securitykey assignment

Wireless and Remote Access Security Key Assignment Draft Great progress has been made on the design of the network with the addition of the client and server security models in the previous assignment. With the increasin ...

Select one of the following topics in which you will base

Select one of the following topics in which you will base your responses in the form of a term paper: • Network Neutrality • Web2.0 • Wireless Technology • Broadband Convergence • U.S. Telecommunication Policy • Internet ...

Discussion boardprimary task response within the discussion

Discussion Board Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discus ...

Assignment descriptionassignment overviewfor this

Assignment Description Assignment Overview For this assignment you will evaluate a Network Security Software. Marks will be awarded based on the sophistication and the difficulties the demonstration explored. Your task i ...

Networking trendsnetworking trends paper in this paper you

Networking trends. Networking Trends Paper: In this paper, you will research and report on network design and management trends over the last three years (present year minus 2) in the areas of virtualization, security, h ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

1 assume a system with two processors in series where each

1. Assume a system with two processors in series where each processor has an unlimited queue in front of it; also assume FIFO queue disciplines for both servers. We need to collect data on individual entity total time in ...

Technical paper risk assessmentglobal finance inc network

Technical Paper: Risk Assessment Global Finance, Inc. Network Diagram Above is the Global Finance, Inc. (GFI) network diagram. A hypothetical company, GFI has grown rapidly this past year and implemented a number of netw ...

Assignment network programmingassignmentbuild a chat

Assignment: Network Programming Assignment: Build a chat programme using socket level programming. This can be done at various levels of sophistication and the marks available at each level are indicated below. Tutorials ...

Learning team recommend pki technologythe head network

Learning Team: Recommend PKI Technology The head network engineer at ACME Corp. is concerned about nefarious parties being able to freely plug in devices to the company LAN. Even though he is skilled at network administr ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro