Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which protocol does DHCP use at Transport layer?

A) IP
B) TCP
C) UDP   
D) ARP

problem 2) Which command is used to find out if the IP access list is enabled on particular interface?

A) show access-lists
B) show interface
C) show ip interface
D) show interface access-lists

problem 3) Where is a hub specified in a OSI model?

A) Session layer
B) Physical layer
C) Data Link layer
D) Application layer

problem 4) What does the passive command provide to dynamic routing protocols?

A) Stops a interface from sending or receiving periodic dynamic updates.
B) Stops a interface from sending periodic dynamic updates but not from receiving updates.
C) Stops a router from receiving any dynamic updates.
D) Stops a router from sending any dynamic updates.

problem 5) Which protocol is used to send the destination network unknown message back to originating hosts?

A) TCP
B) ARP
C) ICMP   
D) BootP

problem 6) How often are BPDUs sent from the layer 2 device?

A) Never
B) Every 2 seconds
C) Every 10 minutes
D) Every 30 seconds

problem7)  How many broadcast domains are created when you segment the network with a 12-port switch?

A) 1
B) 2
C) 5
D) 12

problem 8) What does the command routerA(config)#line cons 0 permit you to perform next?

A) Set the Telnet password.
B) Shut down the router.
C) Set your console password.
D) Disable console connections.

problem 9) Which router command permit you to view the whole contents of all access lists?

A) show all access-lists
B) show access-lists
C) show ip interface
D) show interface

problem 10) Which class of IP address has the most host addresses available by default?

A) A
B) B
C) C
D) A and B

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95117

Have any Question? 


Related Questions in Computer Network & Security

Assignment give an answer to the following topicswhat are

Assignment: Give an answer to the following topics: What are the security issues with wireless LANs and WANs in a data processing environment? What are the recommended solutions to the issues identified? What are the sec ...

Module case studythe purpose of this assignment is for

Module Case Study The purpose of this assignment is for students to write a case study based on a common information security scenario. Prompt: You are the senior information security manager for a federal agency. You re ...

Q1 the rijndael algorithm was chosen for the advanced

Q1: The Rijndael algorithm was chosen for the Advanced Encryption Standard (AES). Using either the attached tutorial, or your own sources of information, pick one (or more) steps of the algorithm and explain it in some d ...

Term paper planning an it infrastructure audit for

Term Paper: Planning an IT Infrastructure Audit for Compliance Note: Chapter 5 of the required textbook may be helpful in the completion of the assignment. The audit planning process directly affects the quality of the o ...

Assignmentsummarize the principles of public-key

Assignment Summarize the principles of public-key encryption. In what way is an unprotected idle PC a danger to the internet? Suppose a PC owner leaves the PC connected to the Internet where it ultimately is used by anot ...

Assignmentin this project we will design a network solution

Assignment In this project we will design a network solution that is suitable for a small business. Our business is located in an office park in one floor of a new office building. Our office has all of the modern featur ...

Assignment designing compliance within the lan-to-wan

Assignment: Designing Compliance within the LAN-to-WAN Domain Note: Review the page requirements and formatting instructions for this assignment closely. Graphically depicted solutions, as well as the standardized format ...

Computer sciencenetworks are not perfect and errors will

Computer Science Networks are not perfect, and errors will occur because of software and hardware problems. Network downtime is costly to business operations and should be minimized where economically possible. Part of t ...

Assignmentnetwork architecture paper using either the osi

Assignment Network Architecture Paper: Using either the OSI Reference Model or the TCP/IP Protocol Suite, describe how each layer of the Model/Suite represents the communication flow between organizational levels and acr ...

Assignmentyou have been asked by a local charity retail

Assignment You have been asked by a local charity retail organization to install a network in its downtown office. It currently has seven PCs running Windows XP Home Edition. They are configured as follows: Pentium 4 at ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro

Describe what you learned about the impact of economic

Describe what you learned about the impact of economic, social, and demographic trends affecting the US labor environmen