1 What is a Layer 3 device that receives an electrical signa

1.) What is a Layer 3 device that receives an electrical signal in one port, interprets the bits, decodes the logical address and makes a filtered, forwarding decision about the packet?

       Hub
       Firewall
       Switch
       Router

2.) 192.168.1.5:1099, 192.168.1.7:25 represents _____.

       two IP addresses
       HTTP Ports
       a socket pair
       Web server addresses

3) What two IPv6 addresses are commonly assigned to a host today?

       IPv6 broadcast and IPv6 Link Local addresses
       A layer 2 address and a layer 3 address
       IPv6 local route and IPv6 anycast address
       IPv6 global unicast address and the IPv6 link local address

4) A /20 prefix represents a subnet mask of _____.

       255.255.224.0
       255.255.248.0
       255.255.254.240
       255.255.255.192

5) There is a protocol that is a precursor to DHCP. It did four of DHCP’s configuration capabilities and it also enabled a diskless workstation to discover a server, accept its IP address, and initiate a download of a file into memory to boot the machine. This protocol utilizes which ports?

       TCP ports 20 and 21
       UDP ports 7 and 9
       UDP ports 67 and 68
       TCP ports 37 and 119

6) Which type of network attack involves port scanning and ping sweeps?

       Reconnaissance attack
       Denial of service attack
       Man-in-the-middle attack
       Trojan horse attack

7) Which type of network attack involves the disabling or corruption of networks, systems, or services?

       Reconnaissance attack
       Denial of service attack
       Man-in-the-middle attack
       Trojan horse attack

8) What is a network service and why is it considered part of the network infrastructure?

9) The netstat –r command is issued on a host. You see a route 0.0.0.0 0.0.0.0 in the results. What does this route mean?

10) What is the difference between Wi-Fi and WLAN?

11) Even though the IPv6 header is longer than the IPv4 header, it is processed more quickly by a router. Why?

12) You have been given the IPv4 address 192.168.6.0 to create an IP addressing scheme for a new department’s LAN within your company. The new LAN will need an IP address and subnet mask for one switch, two servers, one network printer, and six workstations. You have been asked to keep network security in mind when assigning the subnet mask to the IP address. Using the IP address 192.168.6.0, what IP address will you assign to each device? What subnet mask will you assign to the LAN? Explain how you determined the IP addresses you assigned to each device and the subnet mask you chose to provide additional network security.

13) Why might you need to use the service password-encryption command? What does it encrypt?

14) What is a security feature of using NAT on a network?

15) You work in a small consulting company and have been assigned to a team of three network engineers who are tasked with evaluating a new startup organization’s network requirements, designing, and implementing the network. You have been asked to provide to your manager a team plan for the completion of these goals. What tasks need to be done and how will you divide them within the team of three?

Solution

3)

Now a days,generally IPv6 broadcast and IPv6 Link Local addresses are the addresses that are commonly assigned to a host.

10)

WLAN is a network of devices which uses high frequencyof radio signals for the communication of data, while Wi-Fi is the name used to identify near by wlan devices and is a facility allowing other devices like smart phones,computers to connect to internet.

13)

Enable secret password is the only password that is not affected by the service password encryption command.While the service password encryption command is beneficial and should be enabled on all routers, remember that the command uses an easily reversible cipher. Some commercial programs and freely available Perl scripts instantly decode any passwords encrypted with this cipher. This means that the service pasword encryption command protects only against casual viewers—someone looking over your shoulder—and not against someone who obtains a copy of the configuration file and runs a decoder against the encrypted passwords.

14)

Though NAT may conceal any number of machines located on Local Area Networks behind it,it has a single machine\'s presence.All these routers(NAT) function as effective firewalls.So,it prevents unwanted and dangerous rush from other public internet from passing through routers so that they can not use this private LAN.

1.) What is a Layer 3 device that receives an electrical signal in one port, interprets the bits, decodes the logical address and makes a filtered, forwarding d
1.) What is a Layer 3 device that receives an electrical signal in one port, interprets the bits, decodes the logical address and makes a filtered, forwarding d

Get Help Now

Submit a Take Down Notice

Tutor
Tutor: Dr Jack
Most rated tutor on our site