Dedicated digital circuits 3. c. Routers use Layer 3 and ignore Layers 1 and 2. d. Routers discard old data-link headers and insert new data-link headers as part of their logic, which treats each interface’s lower-layer details as independent from each other. 4. b. As a transport service to deliver IP packets to the next IP router 5. b. Star 6. c. 64 Kbps, 1.544 Mbps, and any speed in between d. No literal distance limitation 7. a. A patch cable with RJ-48 8. c. The switches map the T1 customer lines to one of 28 different frequencies in the T3 trunks.
You can easily tell if this is the problem by comparing the size of the DHCP address scope to the number of devices on your network that request IP addresses from the DHCP server. But since only some of the workstations have got addresses the problem might be the DHCP server. Start off by doing some ping tests to verify that the DHCP server is able to communicate across the network. If the DHCP server is able to communicate with other computers on the network, then I recommend verifying that the DHCP server has an IP address that is compatible with the scope that the server is configured to assign addresses from. The server itself has to be assigned a static address in the same subnet range, such as 192.168.0.199.
Question 39: What are the three primary goals of network security? Question 40: What are the three types of malicious traffic detection methods? Question 41: What type of availability attack is described in the diagram below? Question 42: ________ can occur when an analog connection creates an electromagnetic field around its conductors, inducing its waveforms on a nearby analog connection. Question 43: What is the administrative distance of Routing Information Protocol (RIP) routing protocol?
Creating false deauthentication or disassociation frames 7.) Which of the following is not a wireless LAN attack faced by a home user? Upload harmful content 8.) Each of the following can be used in war driving except: Wired NIC 9.) What is access control in a WLAN?
2. Determine the protocol numbers for the protocol names: Protocol | NUMBERS | References | IPv4 (Internet Protocol version 4) | 4 | (Protocol Numbers, 2013) | IPv6 (Internet Protocol version 6) | 41 | | TCP (Transmission Control Protocol) | 6 | | UDP (User Datagram Protocol) | 17 | | ICMP (Internet Control Message Protocol) | 1 | | VRRP (Virtual Router Redundancy Protocol) | 112 | | IPSEC ESP (Internet Protocol Encap Security Payload | 50 | | L2TP (Layer Two Tunneling Protocol) | 115 | | OSPF (Open Shortest Path First) | 89 | | EIGRP (Enhanced Interior Gateway Routing Protocol) | 88 | | 3. Determine the correct ICMP type based on the description provided. ICMP Message Description | Type | Code | Echo | 8 | RFC792 | Echo Reply | 0 | RFC792 | Time Exceeded | 11 | 0 – Time to Live exceeded in Transit1 - Fragment Reassembly Time Exceeded | Port Unreachable | 3 | 3 - Port Unreachable | Fragmentation Needed | 3 | 4 - Fragmentation Needed and Don't Fragment was Set | 4. What are the valid ranges of protocol numbers?
| Question 8 | | 2 / 2 points | Which of the following is not an operation mode in BitLocker? | | A) | transparent operation mode | | | B) | user authentication mode | | | C) | volume encryption mode | | | D) | USB key mode | Hide Feedback | | BitLocker has three operational modes that define the steps involved in the system boot process, which are transparent operation mode, user authentication mode, and USB key mode. | Question 9 | | 2 / 2 points | Which of the following is essentially a series of filters that examine the contents of packets and traffic patterns to and from the network to determine which packets they should allow to pass through the filter? | | A) | tunneling | | | B) | port control | | | C) | firewall | | | D) | Trojan horse | Hide Feedback | | A firewall is essentially a series of filters that examines the contents of packets and the traffic patterns to and from the network to determine which packets they should allow to pass through the filter. | Question 10 | | 2 / 2 points | Proof of identity typically takes one of three forms.