Preview

NT1430 U2G1

Satisfactory Essays
Open Document
Open Document
433 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NT1430 U2G1
Unit 2 Chapter Exercises (NT1430.U2.GA1)
Unit 2
Sobell, Chapter 5, p. 182, Exercises 1, 3, 4, 8, 10
Sobell, Chapter 6, p. 221, Exercises 1, 2, 3, 4, 6

Grading: Answers to the end-of-the-chapter exercises can be found in the text instructor guide. To access the guide, follow the steps outlined in the Instructor Guide for accessing the Pearson IRC.
Pg. 1821.
Which of the following installation steps are typically required on a Cisco router, but not typically required on a Cisco switch?
a. Connect Ethernet cables
b. Connect serial cables
c. Connect to the console port
d. Connect the power cable e. Turn the on/off switch to “on” In what modes can you execute the show mac-address-table command?
a. User mode
b. Enable mode
c. Global configuration mode
d. Setup mode
e. Interface configuration mode
Which of the following is a difference between Telnet and SSH as supported by a
Cisco switch?
a. SSH encrypts the passwords used at login, but not other traffic; Telnet encrypts nothing. b. SSH encrypts all data exchange, including login passwords; Telnet encrypts nothing. c. Telnet is used from Microsoft operating systems, and SSH is used from UNIX and Linux operating systems.
d. Telnet encrypts only password exchanges; SSH encrypts all data exchanges.

A switch user is currently in console line configuration mode. Which of the following would place the user in enable mode?
a. Using the exit command once
b. Using the exit command twice in a row
c. Pressing the Ctrl-z key sequence
d. Using the quit command pg. 221
1. Defines the size of the prefix (combined network and subnet) part of the addresses in a subnet. Defines the size of the prefix (combined network and subnet) part of the addresses ina subnet.
2. Defines the size of the host part of the addresses in the subnet. is an identifiably separate part of an organization's network. Typically, a subnet may represent all the machines at one geographic location, in one building, or on the same local area network
3.

You May Also Find These Documents Helpful

  • Good Essays

    Nt1310 Unit 12

    • 348 Words
    • 2 Pages

    Provide accessories necessary to complete the installation, of the types specified or recommended for the purpose by the manufacturer of the equipment or accessories.…

    • 348 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1430

    • 285 Words
    • 1 Page

    i. Both are text-based protocols: mouse movements cannot be transferred only keystrokes. Both are connection-oriented and are client-server protocols. The main difference is in security. SSH offers security mechanisms that protect the user against anyone with malicious intent while Telnet has no security measures whatsoever.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    It320 Chapter 1

    • 473 Words
    • 2 Pages

    * On a computer, a reference to an IP address on the same subnet, with that IP address being the IP address or a router. When the computer needs to send a packet to another subnet, it sends the packet to its default gateway. Also called default router.…

    • 473 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Most of the network equipment and the operating systems will be configured with this. Because of the security concerns of using Telnet protocols over an open network like the Internet, means that its use have waned significantly in favour of Secure…

    • 623 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Assignment 1

    • 469 Words
    • 3 Pages

    In the Video 4.01, I learned that Local Area Networks cover a short distance, and that Wide Area Networks can cover miles. In addition, what the difference between a work group and a domain. I also learned that in a work group all network computers are equal.…

    • 469 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    6. A starting address of 192.0.0.0 and ending address of 223.255.255.255 is a member of which network class? Class C…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 4 Assignment 4

    • 122 Words
    • 1 Page

    As for deciding on the subnet mask, the largest would be 255.255.252.0 or /23. There are a total of 365 devices, including 352 computers, 7 servers, 4 switches, and 2 routers that need IP addresses. Using a /23 subnet, that would allow for 508 devices, whereas /24 would only allow for 254.…

    • 122 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Nt1310 Unit 1

    • 4209 Words
    • 17 Pages

    83) Which process is responsible for establishing a connection between the client and the server?…

    • 4209 Words
    • 17 Pages
    Powerful Essays
  • Powerful Essays

    The subnet determines how many subnets a network will have and, consequently, how many hosts each subnet will have. The mask, when in binary form, will display the bits in 1s and 0s respectively. Those bits that are 1s are considered network/subnet bits, and those bits that are 0s are considered host bits.…

    • 2698 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    NT1310 unit 5

    • 873 Words
    • 3 Pages

    Once you have your plan intact and it has been approved you need to think about how you are going to get this cable in the building. What types of tools are you going to need? If you are going to run CAT 5e though out the building you will need several different tools; such as cable pulleys, punch downs, wire cutters, and cable strippers. You will need most of these tools to install your cable into your building. There will be a few different tools you will need if you are putting cable into a preexisting building. You may then need a fish tape or fiberglass push pole. It really depends on the type of job you are going to be doing and what type of cable or fiber you are going to be working with. This will determine what tools you will need to get the job done correctly and safely.…

    • 873 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Creating a Domain Model

    • 482 Words
    • 2 Pages

    Since subnets are basically allotments of IP addresses used as tools to separate virtual LANs within the domain, they are represented and named as Subnet1, Subnet2, and…

    • 482 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1210 Unit 2

    • 443 Words
    • 2 Pages

    9. Web Address - Text that identifies details about one object in a network so that a client can request that object from a server.…

    • 443 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Explanation of Ssh

    • 835 Words
    • 4 Pages

    SSH (Secure Shell) is a protocol that can be used to log into a remote machine and provide secure encrypted communications between the Virtual Server and the local computer. The communication is made via encrypted channels. Telnet on the other hand communicates without any encryption, allowing a sniffer to capture information, e.g. user names and passwords. This is why SSH is preferred over Telnet.…

    • 835 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Set up a host name for the particular switch to distinguish it in the network.…

    • 734 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Pshs

    • 437 Words
    • 2 Pages

    -is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays