Preview

Unit 7 Lab

Satisfactory Essays
Open Document
Open Document
192 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Lab
Michael Sherman
Unit 7 Lab Q&A

1. Define subnetting. Subnetting groups devices into a contiguous range of IP addresses
2. Define supernetting. Supernetting is a way to aggregate multiple IP addresses in the same class
3. Define network resiliency Maintaining acceptable levels of service even with faults and operational challenges
4. How is VRRP utilized to ensure network redundancy? Increases availability of routing paths via automatic default gateway selections
5. Name 3 dynamic routing protocols that can be used to distribute routing information RIP, EIGRP, OSPF
6. What is meant by the term CIDR? Classless Inter-Domain Routing, same as supernetting
7. What protocol can be used to eliminate loops in the network? Spanning Tree Protocol (STP)
8. What is the function of GVRP? Allows for the control of VLANS defined in IEEE 802.1Q
9. What is the function of the LACP? Port trunks perform the same functions as static trunks
10. What does RIP stand for and what is its function? Routing Information Protocol, prevents routing loops by limiting hops from source to destination
11. What is the command to enable RIP on a CISCO router and what mode must be enabled to execute the command? Router(config)# router rip Router(config-router)# network ip-address

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 2130 Lab

    • 191 Words
    • 1 Page

    1. An amino acid consists of a carbon atom attached to a hydrogen atom, an amine group, a side group, and a _____________ group.…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Lab 3

    • 82 Words
    • 1 Page

    f. ping –c3 IP where IP is the IP address of a remote system such as the router…

    • 82 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    802.1 handle architecture, security, management, and internetworking of LAN, MAN, and WAN standardized by IEEE802. It provides internetworking, audio/video bridging, data center bridging and security.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco switch:…

    • 920 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 6

    • 690 Words
    • 3 Pages

    1. Run your model. Compare the queue statistics of the 3 processes with those obtained for Part C in the previous Lab. How have they changed and what conclusions can you draw? (Note the sums of all capacities for both cases are equivalent – 12 in each).…

    • 690 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Lab 8

    • 1017 Words
    • 8 Pages

    If you used the number of bytes instead you would get a whole different amount of possible networks which isn’t right.…

    • 1017 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Labs

    • 1237 Words
    • 6 Pages

    Would the IP address in Figure 8-1 be valid as a class C address? Why or why not?…

    • 1237 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETW 204 week 3 iLab

    • 991 Words
    • 6 Pages

    In this lab, I learned abbreviated system commands for enabling configurations and showing IP routing. I also learned how to initially configure a RIP to a…

    • 991 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The RIP protocol is a dynamic, distance-vector routing protocol used in local and wide area networks. This is an implementation of single routing metric (hop count) which measures the best route distance between the source and a destination network RIP. RIP is an interior gateway protocol (IGP) which means that it performs routing within a single autonomous system (AS).…

    • 1294 Words
    • 6 Pages
    Better Essays

Related Topics