DHCP Server 10.10.0.11 | Question 8 | If the answer to #7 was not the IP address of the SEA-SVR1 computer, why might this have happened? It was | Question 9 | What nodes appear underneath the DHCP scope that you created in Exercise 1? Address Pool, Address Leases, Reservations, Scope Options | Question 10 | What appears in the IP address text box?10.10.0.10 the Ip address of the Domain Controller | Question 11 | What value is configured in the DNS Servers: line? 10.10.0.10 | Question 12 | What value is configured in the DNS Servers: line?10.10.0.10 | Question 13 | What is the default location for DHCP server backups? C:\windows\system32\dhcp\backup\ | Question 14 | What IP address is configured on the SEA-SVR2computer?169.254.209.252 | Question 15 | What appears in the IP address text box?10.10.0.55 | Question 16 | From which DHCP server are you receiving an IP
It would require more bits Exercise 8.1.3 Would the IP address in Figure 8- 1 be valid as a class C address? Why or why not? The network number is in Class A Exercise 8.1.4 According to the subnet mask, what is the network ID of the IP address shown in Figure 8- 2? 190.8 What is the host ID of the IP address shown in Figure 8- 2? 8.4 What is the binary network ID?
Table for Individual Question FeedbackPoints Earned:1.0/1.0Correct Answer(s):C 3. __________ is the process of confirming a user’s identity, usually by requiring the user to supply some sort of token, such as a password or certificate. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):Authentication 4. SMTP server is essentially the Windows counterpart to the __________ program used by most UNIX Web servers. Table for Individual Question FeedbackPoints Earned:0.0/1.0Correct Answer(s):sendmail; Sendmail 5.
* d. 139/TCP 25. A null session is enabled by default in all the following Windows versions except: * b. Windows Server 2008 26. The Net view command can be used to see whether there are any shared resources on a server. True or False?
Identify the port numbers for the following applications. a. Telnet – 23 b. HTTP – 80 (Hypertext Transfer Protocol) c. FTP – 20, 21 (File Transfer Protocol) d. DNS – 53 (Domain Name Server) e. DHCP – 67, 68 (Dynamic Host Control Protocol) Common Applications and Their Port Numbers Port Number Application Description 20, 21 FTP - (File Transfer Protocol) 22 SSH - (Secure Shell) 23 Telnet - (Virtual Terminal Connection) 25 SMTP -
The following seven bits in the octet were then set to one which would complete the network identification. The remaining octets (24 bits) represented the hosts ID and would allow up to 126 networks with 17 million hosts per network. In a Class A address, the network number values start at the number 1 and end at 127. Class B IP Address Class B IP address were assigned to medium to large networks. They allow 16,384 networks by using the first two octets in the address for the network identification.
Page 1 of 17 Copyrights © 2007 Selftest Engine, all rights Reserved. A. Account Provisioning Question No: 5 Microsoft Dynamics GP will support what type of SQL Server authentication? Category: B. Microsoft Dynamics GP Add-In for Microsoft Word A. Microsoft .Net Framework 3.5 C. Microsoft SQL Server Native Client 10.0 D. Microsoft SQL Server 2008 Answer: A, C Question No: 4 Which of the following prerequisite can be installed automatically from the Component Installation window when installing Microsoft
(Choose 2) Question 19 The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers. Question 20 Which command is a UNIX command? Question 21 A route can be added by using the route ________ command. Question 22 Which command is a UNIX command? Question 23 Which UNIX ARP option below is use to display current ARP entries in a UNIX Hosts’ ARP
What is incorrectly configured? the IP address of the S0/0/0 interface at R1 9. Refer to the exhibit. Which summarization should R1 use to advertise its networks to R2? 192.168.0.0/22 10.
Crypto isakmp enable Crypto isakmp policy 110 Authentication pre-share Encryption des Group 1 Hash md5 Lifetime 43200 Exit Crypto isakmp key cisco1234 address 200.100.20.2 crypto ipsec transform-set TSet esp-des esp-md5-hmac mode tunnel exit access-list 102 permit tcp any any crypto map CMap 10 ipsec-isakmp match address 102 set transform-set TSet set peer 200.100.20.2 exit interface s0/1 crypto map CMap exit Task 2—Configure a Site-to-Site IPSec VPN on the Chicago Router • After you have completed typing in the Chicago IPSec configuration commands, highlight the commands you typed in using your mouse (click and drag) or the keyboard ( + Arrow keys) use A to select all of the commands in the Chicago configuration file. Use C to put the commands in the clipboard. Use V to paste these commands into the table cell provided in the lab report