Which one of the following mechanism can be used to prevent a sigle point of failure at the default gateway when one or more gateways are connected tothe same LA A. Virtual router B. Local router C. Foreign router D. External router
Q: Assume Host C is running a Web server on port 80. Assume that Hosts A and B are currently submitting…
A: A web server processes and replies to HTTP and other client requests. The primary function of a web…
Q: Which of the following characteristics does UDP have? A. three-way hand shake for connection…
A: UDP stands for User Datagram protocal. It is a connection less protocal ( option B incorrect) No…
Q: lo send an Ethernet frame to a destination server that is two router hops away, your client computer…
A: class C network use a default subnet of 255.255.255.0 and it has 192-223 as their first octet. To…
Q: In which of the following scenarios, the packet will be forwarded directly to the destination host…
A: In computer networking, a default gateway helps in passing signals through the default route between…
Q: Which of the following port scans attempts to initiate a communication channel via every available…
A: TCP FIN scan is used to determine if ports are closed on the target machine. This type of scanning…
Q: In which of the following ICMP messages, the possible sender is the destination host. 1.type:…
A: type 1 - host is unreachable type 2 - protocol is unreachable type 3 - port is unreachable
Q: When a host on network A sends a message to a host on network B, which address does the router look…
A: Actually, network is a group or interconnected people or things.
Q: When a router can’t determine a path to a message‘s destination, where does it send the message? a.…
A: Router: Router refers to a networking device, which is used to transfer data packets between…
Q: What are two means available to resolve a host name to the appropriate TCP/IPaddress? (Choose two…
A: Answer: Host name is the name that is given to each computer. Domain Name Space (DNS) and /etc /…
Q: For some good reasons, a network administrator has created the following configuration to the…
A: Ipv6 static routing is used to define a connection between network using ipv6 protocol. The above…
Q: Which tool could a tester use to get a response from a host using TCP, if the tester is attempting…
A: Answer: A pentester is endeavoring to ping an objective that exists yet gets no reactions or a…
Q: -network administration has been configured a standard ACL that will deny any traffic from…
A: Here, I have to provide an answer to the above question.
Q: Following which statements are correct about DR/BDR routers in an OSPF area? DR/BDR is primarily…
A: In order to minimize the number of repetitions of the information that flows in the network, In an…
Q: answer all thefollowing two questions from the choosing the answer option. Thanks a lot in advance.…
A: A passive IDS can send an alert, but it is the network administrator's job to interpret the degree…
Q: Regarding to DHCP, which statement is correct? O Only one DCHP server can be installed in each…
A: Regarding to DHCP which of the following Statement is Correct.
Q: Which of the following statement refers to the main difference between the operation of inbound and…
A: Answer: Inbound ALCs are processed before the packets are routed while outbound ALCa are processed…
Q: Match the given description to the correct switching domain. If the links are configured as full-…
A: Collision domain: Broadcast Domain: In collision domain the traffic flow is from backward and…
Q: Which is not the element of router? Routing table Forwarding Table Buffers…
A: Given: Which is not the element of the router? Routing table Forwarding Table…
Q: stimate the initial and final value of retransmit timeout, ???, of a TCP connection using Wireshark…
A: Ans a. The bytes in a TCP association are numbered, starting at a haphazardly chosen introductory…
Q: A network administrator configures the interface Gi7 on R1 with the command ip address 178.18.28.234…
A:
Q: Which type of connection is used to transmit two packets over a medium at the same time? A…
A: Synchronous and Asynchronous transmission are the two types of serial data transmission techniques…
Q: Which of the following is used by hosts and routers to report errors? (A) ICMP (в) NAT CIDR DHCP
A: A distributed denial of service attack is attacked by the attackers which tries to avert allowable…
Q: An administrator is trying to enable the interface of a router. To accomplish this task, the…
A: To enable interface of router , an admin can use no shutdown command.
Q: Use the passive-interface router configuration mode command to prevent the transmission of routing…
A: This document describes the passive-interface command, which may be accustomed management the…
Q: The network administrator has been configuring the following standard IPV4 ACL in R1, which of the…
A: the network administration has veen configuring the following standard IPv4 ACL in R1 , which of the…
Q: Which one of the following mechanism can be used to prevent a sigle point of failure at the default…
A: According to the asked question, the solution is given below with a proper explanation.
Q: Which of the following is not a problem that could be caused by disabling STP in a switched network?…
A: We are going to understand which problem can not arise if we disable STP in a switched network.
Q: Which of the following statements is true about routing functions? A router uses network addresses…
A: Routers On computer networks, a router receives and transmits data. Occasionally, network hubs,…
Q: Which of the following actions correspond to SDN approach? A router exchanges messages with another…
A: Option A- is incorrect because in SDN routers dont exchange messages with each other directly.…
Q: the hosts i
A: Explanation A router is a physical or virtual device that connects two or more packet-switched…
Q: Which of the following statements is NOT true about TCP SYN/ACK host scanning attacks? Question…
A: Option a) is true as Attacker sends a TCP SYN/ACK segment to a target host repeatedly to all ports…
Q: Assume Host C has a Web server listening on port 80. Assume A and B are the web hosts. Is every…
A: Here is the Answer
Q: You are a network administrator and need to configure a router . Which command will you use to…
A: Show history displays all the commands entered on the router Show run display entire active…
Q: 1. Enter privileged EXEC mode. 2. Enter global configuration mode. 3. Apply a hostname BA to…
A: 1.Privileged EXEC mode. From user EXEC mode, enter the enable command. prompt:- Switch# To exit to…
Q: Suppose that you are working on Ubuntu Server and you have decided to delete the IP address…
A: Explanation: Correct command to delete an IP address is : sudo ip dev enp0s3 | rm address…
Q: 2. Do the following for the given network (write the commands for each of the router).…
A: Solution: Note:since we only answer the 3 sub parts ,please submit the question if you would like…
Q: Refer to the below Figure no. 2, a summarized static route has been configured in Router R1.…
A: Answer: Static routing provides better security than dynamic routing.So,it is preferred as it does…
Q: Which of the following is a form of hub that routes packets to the proper port depending on the…
A: Intro It is the process through which systems decide where to send a packet which is known as…
Q: Which of the following is not true about Port Scanning? a. It identifies the version of particular…
A: Answer b. It determines the type of operating system of the target system.
Q: The clear ip ospf process command is useful in which of the following situations? (choose two) when…
A: option B - To force a new DR/BDR election
Q: A.You are working as a network engineer at Shell Info. The organization uses Cisco's IOS on all of…
A: To remove static route open command line and type this command: route delete 0.0.0.0 mask 0.0.0.0…
Q: Which of the following is used by hosts and routers to report errors? A ICMP B) NAT CIDR DHCP
A: One of the most important protocols in the internet protocol suite is the (ICMP)Internet Control…
Q: Given the topology below, write the commands to advertise the OSPFv3 networks on the Sohar router.…
A: OSPF STANDS FOR OPEN SHORTEST PATH FIRST AND IT IS ONE OF THE ROUTING PROTOCOLS USED TO ADVERTISE…
Q: Q6) The administrator assigns an IP address to an interface and activate it. Which route should…
A: Answer: b. C 192.168.0.0/24 is directly connected, FastEthernet 0/0
Q: Which of the following devices can be used to connect computers and other end devices in a LAN? a.…
A: Answer : Router
Q: Which of the following actions correspond to SDN approach? A router exchanges messages with another…
A: SDN approach is stand by software defined network approach.
Step by step
Solved in 2 steps
- Which two of the following hosts on a corporate intranet are on the same subnet? a.192.168.2.143255.255.255.0b.172.54.98.3255.255.0.0c.192.168.5.57255.255.255.0d.172.54.72.89255.255.0.0Which of the following statements is true about routing functions? A router uses network addresses to forward messages. A router forwards DHCP frames at Layer 2. Both (A) and (B) are correct. None of the above are correct. 2) A WiFi access point is responsible for the following: Flow and error control. Identifying Network protocols. Multiple-access resolution. All of the above.q27- When a host on network A sends a message to a host on network B, which address does the router look at? a. Port b. Logical (IP address ) c. Non of the mentioned d. Physical (MAC address) Clear my choice
- give commands for the following instructions on a router, showing also the router prompts. 1. Enter privileged EXEC mode. 2. Enter global configuration mode. 3. Apply a hostname BA to the router. 4. Configure a password that is to be used to enter privileged EXEC mode. The password is fast. 5. Configure the Telnet lines with password cycle.To test DNS configuration by resolving a host name to an IP address, which commandor commands can you use? (Choose all that apply.)a. nslookup hostnameb. dig hostnamec. host hostnamed. resolve hostnameA system administrator at a SOHO remote site would like to modify the range of automatically-assigned IP addresses. Which of the following should be modified on the SOHO wireless router?WPA2 security modePrimary and secondary DNSDMZ interfaceMAC filteringDHCP ending address
- On the receiver's return, I want all TCP traffic from my internal network to pass via the firewall. This traffic is allowed by what rule? Port 80/HTTP Standard Established ICMPThe command below illustrates the configuration of the static route. Router(config)# ip route network-address subnet-mask {ip-address | exit-intf [ip-address]} [distance] What is the function of the parameter distance in the given command? a. To assign bandwidth b. To assign matric value c. To assign AD value d. To assign protocol valueYou are troubleshooting an issue and you think that it is a problem with the DHCP server configuration. Client get an IP address, they can ping IP addresses on the same network and on the internet, but they cannot pull up webpages. What is a likely cause of misconfiguration on the DHCP server? a.) incorrect ntp server b.) incorrect dns server c.) incorrect gateway d.) incorrect subnet mask