Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which command is used to upgrade the IOS on Cisco router?

A. copy tftp flash
B. copy tftp start
C. config net
D.copy tftp run

problem 2) If you want to delete configuration stored in NVRAM, what will you type?

A. delete nvram
B. erase nvram
C. erase startup
D. erase running

problem 3) What protocols are used to configure trunking on the switch?

A. ISL
B. VLAN
C. VLAN Trunking Protocol
D. 802.1Q

problem 4) Which of the following services use TCP:

a. DHCP
b. SMTP
c. HTTP
d. TFTP
e. FTP

A. 1 and 2
B. 2, 3 and 5
C. 1, 2 and 4
D. 1, 3 and 4

problem 5) What layer in a TCP/IP stack is equivalent to Transport layer of OSI model?

A. Application
B. Host-to-Host
C. Network Access
D. Internet

problem 6) Which of the following describe DHCP Discover message?

a. It uses FF:FF:FF:FF:FF:FF as a layer 2 broadcast.
b. It uses UDP as the Transport layer protocol.
c. It uses TCP as the Transport layer protocol.
d. It doesn’t use a layer 2 destination address.

A. 1 only
B. 1 and 2
C. 3 and 4
D. 4 only

problem 7) You want to implement a mechanism which automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

A. ARP
B. SNMP
C. DHCP
D. SMTP

problem 8) Which of the following is private IP address?

a. 12.0.0.1
b. 192.168.24.43
c. 172.15.14.36   
d. 168.172.19.39

A. 1 only
B. 3 and 4
C. 1 and 2
D. 2 only

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95125

Have any Question? 


Related Questions in Computer Network & Security

Pros amp cons of very simple vs very planned networkwrite a

Pros & Cons of Very Simple Vs Very Planned Network Write a 3-5 page report that discusses the pros and cons of very simple plans versus detailed plans, although the standards mandate very specific requirements for the pl ...

Term paper chief security officeryou have been hired as the

Term Paper: Chief Security Officer You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security ...

Lab assignment- assessment questions1 explain the two

Lab Assignment- Assessment Questions 1. Explain the two different types of attacks that can be performed in Cain and Abel to crack user account passwords. Which do you think is the most effective and why? 2. Compare and ...

Cryptool lab-first download and install cryptool from the

Cryptool lab- First, download and install Cryptool from the website at http://cryptool.com - If using a windows PC, installed crytool1 - If using a MAC PC, install jcryptool Part1.1 a. Identify the digital signature sche ...

Assignmentplanning is an important aspect with any

Assignment Planning is an important aspect with any enterprise network structure. However, planning must encompass several aspects including not only the assessment of the technology required, but also keeping the stakeh ...

Your assignment must be in microsoft word formatnote your

Your assignment must be in Microsoft Word format Note: Your assignment must be in Microsoft Word format, and must be submitted electronically by the due date via the Moodle website Question 1: Firewall Rule Design The fo ...

Develop a network security plan for a medical record

Develop a Network Security Plan for a Medical Record Company. As a network administrator you are required to develop a brand new security plan. The medical record company consists of the following individuals: Doctors, N ...

Write one paragraph only for each questions1- can a

Write one paragraph only for each questions. 1- Can a business survive in today's world without a website or a poorly maintained website? Why or Why not? 2- What's your biggest fear about using the Internet? Why? Can you ...

Computer securitycryptography is the practice and study of

Computer Security Cryptography is the practice and study of techniques for secure communication in the presence of third parties called adversaries, and it is about constructing and analyzing protocols that prevent third ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen