2023 1 Question TCO 2 is the layer in hierarchical network design that is concerned with switching | Assignment Collections

Computer Science 2023 NETW208 QUIZ

2023 1 Question TCO 2 is the layer in hierarchical network design that is concerned with switching | Assignment Collections

 1.    Question :    (TCO 2) _____ is the layer in hierarchical network design that is concerned with switching packets as fast as possible.

     Select          Access Layer

                Core Layer

               Access Link

               Core Link
 

     Instructor Explanation:    Chapter 1

        

 2.    Question :    (TCO 2) The point at which the customer turns over control to the WAN service provider refers to the _____.

     Select          data circuit-terminating equipment

               data terminal equipment

               last mile

                demarcation point
 

     Instructor Explanation:    Chapter 1

 3.    Question :    (TCO 2) _____ is an industry-standard, switched data-link-layer protocol that handles multiple virtual circuits using HDLC encapsulation between connected devices.

     Select          Basic Rate Interface

               Primary Rate Interface

                Frame Relay

               Cell
 

     Instructor Explanation:    Chapter 1

   

 4.    Question :    (TCO 6) Asymmetric encryption is utilized in VPNs to

     Select           encrypt and decrypt using different keys.

               encrypt and decrypt using a shared secret key.

               create a number generated from a string of text, sometimes calledmessage digest.
               utilize only numbers to secure information.

     Instructor Explanation:    Chapter 6

        

 5.    Question :    (TCO 6) What contributes to data integrity and authentication by ensuring that unauthorized persons do not tamper with transmitted messages?

     Select          Encryption

               Descryption

                Hash

               Tunneling
 

     Instructor Explanation:    Chapter 6

        

 6.    Question :    (TCO 6) IEEE 802.16 is defined as

     Select          the IEEE WLAN standard for 11 Mbps at 2.4 GHz.

                the IEEE WiMAX standard for 70 Mbps at ranges up to 30 miles in the 2–6 GHZ spectrum.
               the IEEE WLAN standard for 54 Mbps at 2.4 GHz.

                the IEEE WLAN standard for 248 Mbps at 2.4 or 5 GHZ.

     Instructor Explanation:    Chapter 6

        

 7.    Question :    (TCO 3) _____ is used to establish and configure different network layer protocols.

     Select          Frame Relay

               X.25

               LCP

                NCP

     Instructor Explanation:    Chapter 2 page 95

        

 8.    Question :    (TCO 3) _____ is one of the PPP LCP options that peer routers use to identify fault conditions.

     Select          Compression

                Error detection

               Multilink

               Authentication

     Instructor Explanation:    Chapter 2 page 89

   

 9.    Question :    (TCO 3) The third phase of PPP establishment is

     Select          to test link quality.

               to send link-establishment frames to negotiate options such as MTU size, compression, and authentication.
                to negotiate Layer 3 protocol options.

               to send confirmation-acknowledgement frames.

     Instructor Explanation:    Chapter 2 page 88

   

 10.    Question :    (TCO 3) Which of the following is a characteristic of PAP?

     Select          Uses a one-way hash function

               Periodic verification

               Three-way handshake

                Two-way handshake

     Instructor Explanation:    Chapter 2 page 110

   

1.    Question :    (TCO 4) What is the command that verifies that Frame Relay is running correctly?

     Select           show interfaces

               encapsulation frame-relay

               show frame-relay map

                debug frame-relay

     Instructor Explanation:    Chapter 3

        

 2.    Question :    (TCO 4) Frame Relay can partition a physical interface into multiple virtual interfaces called _____.

     Select           subinterfaces

               multilinks

               split horizons

               broadcasts

     Instructor Explanation:    Chapter 3

   

 3.    Question :    (TCO 4) The difference between a star topology and a frame relay star topology is that the latter has _____.

     Select          more routers

               servers

                VCs

               more hubs

     Instructor Explanation:    Chapter 3

   

 4.    Question :    (TCO 4) Which one of these answers is not an advantage of Frame Relay?

     Select          Greater bandwidth

               Reliability

               Less equipment

                More complex

     Instructor Explanation:    Chapter 3

   

 5.    Question :    (TCO 7) This person uses e-mail or another means to lure others into providing sensitive information, such as credit card numbers or passwords.

     Select          White hat

                Phisher

               Cracker

               Spammer

     Instructor Explanation:    Chapter 4

        

 6.    Question :    (TCO 7) Applying a specific algorithm to data to alter their appearance, making them incomprehensible to those who are not authorized to see the information, is known as

     Select          decryption.

               a virus.

               a worm.

                encryption.

     Instructor Explanation:    Chapter 4

   

 7.    Question :    (TCO 7) Over the years the types and methods of security attacks have evolved. What kind of network attack became prevalent starting around 1985?

     Select           Password guessing and code replication

               Password cracking and war dialing

               Viruses, including the ILOVEYOU worm, Nimda, and Code Red

               Trojan horses such as Back Orifice

     Instructor Explanation:    Chapter 4 page 191

   

 8.    Question :    (TCO 7) Securing router network services most commonly needs to be done at what IOS layer?

     Select           Network

                Application

               Physical

               Data link

     Instructor Explanation:    Chapter 3

 9.    Question :    (TCO 7) What type of attack uses a compromised host to pass traffic through a firewall that would otherwise be dropped or blocked?

     Select          Reconnaissance attack

               Password attack

                Port redirection

               DoS attack

     Instructor Explanation:    Chapter 4 page 210

        

 10.    Question :    (TCO 7) Which network policy defines the standards for connecting to the internal network from outside the organization?

     Select          Account-access-request policy

                Remote-access policy

               Risk-assessment policy

               Audit policy

     Instructor Explanation:    Chapter 4 page 231

   

1.    Question :    (TCO 1) Which of the following choices displays IPv6 neighbor discovery cache information?

     Select          show ipv6 neighbor

                show ipv6 neighbors

               show neighbors

               ipv6 neighbors

     Instructor Explanation:    Chapter 7

        

 2.    Question :    (TCO 1) _____ is an integration method in which a node has implementation and connectivity to both an IPv4 and IPv6 network.

     Select          Tunneling

                Dual stacking

               A 6to4 tunnel

               A Teredo tunnel

     Instructor Explanation:    Chapter 7

        

 3.    Question :    (TCO 1) Dynamic NAT maps private IP addresses to public addresses drawn from a

     Select           pool.

                NAT pool.

               interface.

               source.

     Instructor Explanation:    Chapter 7

        

 4.    Question :    (TCO 1) When IPv6 is implemented, the routing protocol RIPng will have these features, but it

     Select          uses IPv6 for transport.

               sends updates on UPD port 521.

                includes the IPv6 prefix and next-hop IPv6 address.

                is limited in multicasting.

     Instructor Explanation:    Chapter 7

   

 5.    Question :    (TCO 1) The command to display information about the total amount of active NAT translations, NAT configuration parameters, how many addresses are in the poll, and how many have been allocated is

     Select          show nat statistics.

               show ip nat statistic.

               show ip nat stats.

                show ip nat statistics.

     Instructor Explanation:    Chapter 7

   

 6.    Question :    (TCO 5) _____ control(s) access to a network by analyzing the incoming and outgoing packets and passing or halting them based on stated criteria.

     Select          IDS

                Packet filtering

               Circuit switching

               Packet switching

     Instructor Explanation:    Chapter 5

   

 7.    Question :    (TCO 5) Some of the ways that ACLs should be placed in a network include all of the following except

     Select          using ACLs in firewall routers positioned between two parts of your network and an external network, such as the Internet.
               using ACLs on a router positioned between two parts of your network to control traffic entering or exiting a specific part of your internal network.
               configuring ACLs for each network protocol configured on the border router interfaces. You can configure ACLs on an interface to filter inbound traffic, outbound traffic, or both.
                configuring ACLs on border routers only, or routers situated at the edges of the networks.
     Instructor Explanation:    Chapter 5

        

 8.    Question :    (TCO 5) To configure a numbered ACL-designated 5 that would permit network 192.168.10.0/24, you would enter _____.

     Select           R1(config)# access-list 5 permit 192.168.10.0/24

                R1(config)# access-list 5 permit 192.168.10.0 0.0.0.255

               R1# access-list 5 permit 192.168.10.0

               R1(config)# access-list permit 192.168.10.0

     Instructor Explanation:    Chapter 5

   

 9.    Question :    (TCO 5) The established parameter in the extended ACL configuration means it

     Select           indicates an established connection for TCP protocol only.

                indicates an established connection for IP protocol only.

               indicates an established connection for UDP protocol only.

               indicates an established connection for IPX protocol only.

     Instructor Explanation:    Chapter 5

    

 10.    Question :    (TCO 5) access-list 100 permit tcp 192.168.20.5 0.0.0.0 0.0.0.0 255.255.255.255 eq 80
Base on the access list above, to what destinations will the source device be allowed to web browse?

     Select          0.0.0.0

                192.168.20.5

                any

               255.255.255.255

     Instructor Explanation:    Chapter 5

    
   

 

We give our students 100% satisfaction with their assignments, which is one of the most important reasons students prefer us to other helpers. Our professional group and planners have more than ten years of rich experience. The only reason is that we have successfully helped more than 100000 students with their assignments on our inception days. Our expert group has more than 2200 professionals in different topics, and that is not all; we get more than 300 jobs every day more than 90% of the assignment get the conversion for payment.

Place Order Now

#write essay #research paper #blog writing #article writing #academic writer #reflective paper #essay pro #types of essays #write my essay #reflective essay #paper writer #essay writing service #essay writer free #essay helper #write my paper #assignment writer #write my essay for me #write an essay for me #uk essay #thesis writer #dissertation writing services #writing a research paper #academic essay #dissertation help #easy essay #do my essay #paper writing service #buy essay #essay writing help #essay service #dissertation writing #online essay writer #write my paper for me #types of essay writing #essay writing website #write my essay for free #reflective report #type my essay #thesis writing services #write paper for me #research paper writing service #essay paper #professional essay writers #write my essay online #essay help online #write my research paper #dissertation writing help #websites that write papers for you for free #write my essay for me cheap #pay someone to write my paper #pay someone to write my research paper #Essaywriting #Academicwriting #Assignmenthelp #Nursingassignment #Nursinghomework #Psychologyassignment #Physicsassignment #Philosophyassignment #Religionassignment #History #Writing #writingtips #Students #universityassignment #onlinewriting #savvyessaywriters #onlineprowriters #assignmentcollection #excelsiorwriters #writinghub #study #exclusivewritings #myassignmentgeek #expertwriters #art #transcription #grammer #college #highschool #StudentsHelpingStudents #studentshirt #StudentShoe #StudentShoes #studentshoponline #studentshopping #studentshouse #StudentShoutout #studentshowcase2017 #StudentsHub #studentsieuczy #StudentsIn #studentsinberlin #studentsinbusiness #StudentsInDubai #studentsininternational