Refer to the exhibit. A router learns a route to the 192.168.6.0 network, as shown in the output of the show ip rip database command. However, upon running the show ip route command, the network administrator sees that the router has installed a different route to the 192.168.6.0 network learned via EIGRP. What could be the reason for the missing RIP route? Compared to RIP, EIGRP has a lower administrative distance.
Question 15 The Wide Area Network (WAN) design below represents what type of fault-tolerant network design? Question 16 Which QoS design consideration is incorrect? Question 17 Which term is best described by the following definition: “Both NICs are active at the same time, and they each have their own MAC address”? Question 18 Which of the following is one of the two modes of Network Interface Card (NIC) redundancy? (Choose 2) Question 19 The ________ command can be used to display information about current sessions, including source and destination IP addresses and port numbers.
* c. 15 32. Which of the following commands connects to a computer containing shared files and folders? * b. Net use 33. Which port numbers are most vulnerable to NetBIOS attacks?
| Question 4 | What is the name of the computer you are working from? SEA-SVR2 | Question 5 | What IP addressing settings are currently configured?10.10.0.12 | Question 6 | Is the computer currently configured for DHCP? How can you tell? Yes, DHCP enabled and it received an ip address of 10.10.0.20 | Question 7 | What is the IP address of the DHCP server from which W2K8yy has obtained its IP address? DHCP Server 10.10.0.11 | Question 8 | If the answer to #7 was not the IP address of the SEA-SVR1 computer, why might this have happened?
110 (network ID), 10.10.1 (host) What are the binary values of the host ID and the network ID? Hint: You should use decimal-to- binary conversion skills on each octet of the address separately and chain the bytes together for the answer. 1101110.00001010.00001010.00000001 Exercise 8.1.2 Use your textbook and the Internet to complete Table 8- 1. Class | Range of 1st byte (octet) in decimal | Network ID | Host ID | Possible Networks | Possible Hosts per Network | A | 0-127 | A | b,c,d | 2^7 | 2^24 | B | 128-191 | a,b | c,d | 2^14 | 2^16 | C | 192-223 | a,b,c | D | 2^21 | 2^8 | Why is the number of possible networks for each class not equal to 2 raised to the power of the number of bits used for the network ID? It would require more bits Exercise 8.1.3 Would the IP address in Figure 8- 1 be valid as a class C address?
This password is stored in _______. BIOS CMOS RAM* DDR RAM the CPU 8. (TCO 3) The term form factor in regards to a motherboard refers to the ______ layout of the components on the board physical logical proposed inverted 9. (TCO 9) When you first purchase a notebook, make sure you have a ____ CD containing the installed OS so you can recover from a failed hard drive development management diagnostic recovery 10. (TCO 9) ____ let you specify which devices are to be loaded on startup for a particular user or set of circumstances Hardware profiles* Folder redirections Briefcase profiles Startup profiles 11.
What are well known ports? i. Also known as “reserve ports”, which are ports 1 – 1023 that are reserved by ICANN (Internet Corporation for Assigned Names and Numbers). Port Number Assignments Port Numbers Description 1 - 1023 The “well known” ports 1024 – 49,151 Registered ports 49,152 – 65,535 Private Ports 4. Identify the port numbers for the following applications.
6. Which of the following determines, in part what bits the computer stores in the file to represent the text typed into the report. C. Character set 7. What bits the computer store in RAM to represent the number 123456789? D. The binary equivalent to 123456789 8.
Which of the following account lockout policy modifications could you make to ensure that user passwords cannot be intercepted by analyzing captured packets? (D) Disable the Store Passwords Using Reversible Encryption policy 2. Which of the following mechanisms is most often used in firewall rules to allow traffic on to the network? (D) Port numbers 3. Which of the following NTFS features is incompatible with EFS encryption?
Then convert the address to decimal form. By controlling which IP addresses assigned to the individual computer, you must make sure you assign it one of the IP addresses your provider gave you; assign it the netmask your provider gave you; and assign it a gateway, which is the IP address of your router When setting up a router, you: assign it the IP address, in the range, your provider gave you; assign it the netmask your provider gave you; tell it the IP address of your ISP's