Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which protocol does DHCP use at Transport layer?

A) IP
B) TCP
C) UDP   
D) ARP

problem 2) Which command is used to find out if the IP access list is enabled on particular interface?

A) show access-lists
B) show interface
C) show ip interface
D) show interface access-lists

problem 3) Where is a hub specified in a OSI model?

A) Session layer
B) Physical layer
C) Data Link layer
D) Application layer

problem 4) What does the passive command provide to dynamic routing protocols?

A) Stops a interface from sending or receiving periodic dynamic updates.
B) Stops a interface from sending periodic dynamic updates but not from receiving updates.
C) Stops a router from receiving any dynamic updates.
D) Stops a router from sending any dynamic updates.

problem 5) Which protocol is used to send the destination network unknown message back to originating hosts?

A) TCP
B) ARP
C) ICMP   
D) BootP

problem 6) How often are BPDUs sent from the layer 2 device?

A) Never
B) Every 2 seconds
C) Every 10 minutes
D) Every 30 seconds

problem7)  How many broadcast domains are created when you segment the network with a 12-port switch?

A) 1
B) 2
C) 5
D) 12

problem 8) What does the command routerA(config)#line cons 0 permit you to perform next?

A) Set the Telnet password.
B) Shut down the router.
C) Set your console password.
D) Disable console connections.

problem 9) Which router command permit you to view the whole contents of all access lists?

A) show all access-lists
B) show access-lists
C) show ip interface
D) show interface

problem 10) Which class of IP address has the most host addresses available by default?

A) A
B) B
C) C
D) A and B

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95117

Have any Question? 


Related Questions in Computer Network & Security

Network security - web security threatsassume that you are

Network Security - Web Security Threats Assume that you are the lead network security expert in your organization. Because of the recent rise in web security issues and the development of the global marketplace, your org ...

You need to paraphrase the filesnbsp1 You need to paraphrase the files.  1. Introduction

You need to paraphrase the files.  1. Introduction Organizations can utilize internet as well as intranet framework for providing an information network. Educational institutions may use internet in order to share inform ...

Task - provide short answers to the following six

Task - Provide short answers to the following six questions: Question 1: Discuss the advantages and disadvantages of star, bus, and mesh physical topologies. Provide real examples of each type. Question 2: Explain why th ...

Assignment big switch network designbig switch is a

Assignment: Big Switch Network Design Big Switch is a medium-sized sales organization with 100 employees with annual revenue of $10 million. Big Switch has a central office of 30 employees that supports a sales force con ...

Project effect of legislation on organizationsthe purpose

Project: Effect of Legislation on Organizations The purpose of this is assignment is to 1) conduct research related to the impact of legislation on the HHS security program and 2) write a research paper. Learning Objecti ...

Summarize what pki is and how it works include the use of a

Summarize what PKI is and how it works. Include the use of a CA and also include why the backing up of these keys is so important. Directions: Your completed assignment should be at least 2 FULL double-spaced pages in le ...

Pcap challenge 1 objectivethe objective of this lab is

PCAP Challenge 1 Objective The objective of this lab is simple (although some of the questions will prove quite challenging), all you need to do is use the pcap file provided and investigate what transpired between 2 or ...

Context this assignment involves preparation of a report

Context This assignment involves PREPARATION OF A REPORT. The report relates to the Scenario given below. Aim: You have been asked to present a proposal for an Internet/Intranet solution for a college. The college is esp ...

Assessing and securing systems on a wide area network

Assessing and securing systems on a wide area network (WAN) Research paper; Ten pages, however no more than fifteen pages, 12 point font, Times New Roman and double spaced. Your name should appear in the header along wit ...

Password challengeobjectivethe objective of this lab is to

Password Challenge Objective The objective of this lab is to put your password hash cracking and text decoding skills to the test. This lab uses various encoding and hashing algorithms that you'll need to figure out. It ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

A cola-dispensing machine is set to dispense 9 ounces of

A cola-dispensing machine is set to dispense 9 ounces of cola per cup, with a standard deviation of 1.0 ounce. The manuf

What is marketingbullwhat is marketing think back to your

What is Marketing? • "What is marketing"? Think back to your impressions before you started this class versus how you

Question -your client david smith runs a small it

QUESTION - Your client, David Smith runs a small IT consulting business specialising in computer software and techno

Inspection of a random sample of 22 aircraft showed that 15

Inspection of a random sample of 22 aircraft showed that 15 needed repairs to fix a wiring problem that might compromise

Effective hrmquestionhow can an effective hrm system help

Effective HRM Question How can an effective HRM system help facilitate the achievement of an organization's strate