Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which protocol does DHCP use at Transport layer?

A) IP
B) TCP
C) UDP   
D) ARP

problem 2) Which command is used to find out if the IP access list is enabled on particular interface?

A) show access-lists
B) show interface
C) show ip interface
D) show interface access-lists

problem 3) Where is a hub specified in a OSI model?

A) Session layer
B) Physical layer
C) Data Link layer
D) Application layer

problem 4) What does the passive command provide to dynamic routing protocols?

A) Stops a interface from sending or receiving periodic dynamic updates.
B) Stops a interface from sending periodic dynamic updates but not from receiving updates.
C) Stops a router from receiving any dynamic updates.
D) Stops a router from sending any dynamic updates.

problem 5) Which protocol is used to send the destination network unknown message back to originating hosts?

A) TCP
B) ARP
C) ICMP   
D) BootP

problem 6) How often are BPDUs sent from the layer 2 device?

A) Never
B) Every 2 seconds
C) Every 10 minutes
D) Every 30 seconds

problem7)  How many broadcast domains are created when you segment the network with a 12-port switch?

A) 1
B) 2
C) 5
D) 12

problem 8) What does the command routerA(config)#line cons 0 permit you to perform next?

A) Set the Telnet password.
B) Shut down the router.
C) Set your console password.
D) Disable console connections.

problem 9) Which router command permit you to view the whole contents of all access lists?

A) show all access-lists
B) show access-lists
C) show ip interface
D) show interface

problem 10) Which class of IP address has the most host addresses available by default?

A) A
B) B
C) C
D) A and B

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95117

Have any Question? 


Related Questions in Computer Network & Security

Q1 the first transcontinental telephone service was

Q1. The first transcontinental telephone service was established in the 1940s. a. true b. false Q2. The Internet was started by the U.S. Department of defense in 1969 as a network of four computers called ARPANET. a. tru ...

Assignmentintroductionin this assignment you will use

Assignment Introduction In this assignment you will use several network tools to look at the protocols and data exchanged between network components. We will be only scratching the surface of the usefulness of these tool ...

Data information decision please respond to the

"Data Information Decision" Please respond to the following: · With the obvious pace of current technology development, data continues to grow daily. Imagine that you are a Database Administrator for a large organization ...

What is the typical relationship between the untrusted

What is the typical relationship between the untrusted network, the firewall, and the trusted network? How is an application-layer firewall different from a packet filtering firewall? Why is an application-layer firewall ...

Network security- as a corporate network administrator the

"Network Security" - As a corporate network administrator the industry standard suggests your job is to maintain the confidentiality, availability, and integrity of all network resources. Choose an attack that affects on ...

Topic one discuss fisma and its relevance to cybersecurity

TOPIC One: Discuss FISMA and its relevance to cybersecurity. (must be 200 words with references) Topic Two: (must be 200 words with references) Define the terms below and describe the environment in which each access con ...

Assignment wireless technologythere are a number of

Assignment: Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Threat management and disaster recovery final paper this is

Threat Management and Disaster Recovery Final Paper This is a two part assignment that will be submitted as one final paper Part 1 I would like you to complete a limited Risk Assessment for a fictional enterprise. This a ...

Develop a wlan plan for acme graphic design based on a

Develop a WLAN plan for Acme Graphic Design based on a chosen Blueprint and security to the owner. Write a 700- to 1,750-word document using Microsoft® Word finalizing describing your final network design incorporating y ...

1 list and describe the four types of computer networks

1. List and describe the four types of computer networks from largest to smallest.  2. Define client/server computing, packet switching, and TCP/IP.  Explain how these three things make the Internet so powerful and robus ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro