Preview

Netw204 Wk2 Quiz Essay Example

Satisfactory Essays
Open Document
Open Document
598 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Netw204 Wk2 Quiz Essay Example
| Question : | (TCO 1) What command do you type to save the configuration stored in RAM to NVRAM? | | | Student Answer: | | Router(config)#copy current to starting | | | | Router#copy starting to running | | | | Router(config)#copy running-config startup-config | | | | Router#copy run startup | | Instructor Explanation: | Chapter 1, page 26 | | | | Points Received: | 0 of 5 | | Comments: | | | |

2. | Question : | (TCO 1) Which of the following commands will set the privileged mode password to quiz? | | | Student Answer: | | R1(config) # enable secret quiz | | | | R1(config)# password secret quiz | | | | R1(config)# enable password secret quiz | | | | R1(config)# enable secret password quiz | | Instructor Explanation: | Chapter 1, page 26 | | | | Points Received: | 0 of 5 | | Comments: | | | |

3. | Question : | (TCO 3) Which of the following is a characteristic of a dynamic routing protocol? | | | Student Answer: | | Administrator intervention is needed to maintain changing-route information. | | | | Protocols automatically react to topology changes. | | | | They are less scalable that static routes. | | | | They use less CPU and memory than static routing. | | Instructor Explanation: | Chapter 3, page 153 | | | | Points Received: | 5 of 5 | | Comments: | | | |

4. | Question : | (TCO 2) Which statement is true concerning configuring static routes using next-hop addresses? | | | Student Answer: | | Routers cannot use more than one static route with a next-hop address. | | | | When the router identifies that a packet is destined for a route associated with a next-hop address in the routing table, the router requires no further information and can immediately forward the packet. | | | | Routers configured with the static route using a next-hop address

You May Also Find These Documents Helpful

  • Good Essays

    Kudler Fine Foods has proposed creating an electronic sales database of all their products that can be linked to a website. In return this will allow customers to purchase any of his or her items online and have them shipped to his or her homes. With the creation of this electronic commerce, loyalty points can be added to online purchases as well as physical purchases. The loyalty points can also be redeemed for gift items and specialty foods on the website. Before a customer can purchase products online they must register their name, e-mail address, mailing address and credit card information. After providing the proper information they will be prompted to create a user name and password for future use. When an account is set up for a customer, bonus loyalty points could be given…

    • 944 Words
    • 4 Pages
    Good Essays
  • Good Essays

    nt 2640 studyguide

    • 720 Words
    • 3 Pages

    Given the following routing table on a router, which next hop will the router select given the IP packet with the destination address of: 19.48.254.3…

    • 720 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Nt1310 Unit 7

    • 410 Words
    • 2 Pages

    Note that the fact that the on-demand approach of the AODV protocol minimizes routing table information. AODV uses traditional routing tables as it is a reactive routing protocol. To determine whether routing information is up-to-date and to prevent routing loops sequence numbers are used. The maintenance of time-based states is a crucial feature of AODV which suggests that a routing entry that isn't recently used is expired. In case of route breakage, the neighbours are notified. The discovery of the route from source to destination relies on query and reply cycles and intermediate nodes store the route information within the type of route table entries along the…

    • 410 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1330 Unit 3 Quiz Essay

    • 5533 Words
    • 23 Pages

    | ____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.Answer…

    • 5533 Words
    • 23 Pages
    Satisfactory Essays
  • Satisfactory Essays

    These are the system binary files that the system needs to run for all users…

    • 627 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * Domain members rely heavily on DNS services to locate domain resources. For example, when a domain-joined computer boots, it queries domain Service Locator records (SRV) in DNS to locate a Domain Controller against which to authenticate. Without a local DNS instance, this process has to take place over a potentially slow site link. Of course, once a computer has located a Domain Controller, it will continue to authenticate against that server until it something forces the client to find another DC.…

    • 636 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Gives system addressing and routing, and does so in such a manner as additionally to give a regular address space across numerous lower-level protocols. This makes conceivable the interconnection of systems that describes the Internet. The IP protocol works at this level.…

    • 1263 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt1310 Unit 5 Essay

    • 437 Words
    • 2 Pages

    Case - A case is a sort of chassis for the internals of a computer and acts as a kind of protection from dust etc. It is also more appealing to look at rather than the internals of the computer.…

    • 437 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT1330 final exam

    • 1081 Words
    • 3 Pages

    11. BOOTP enables a TCP/IP workstation to retrieve settings for all of the configuration parameters it needs to run excluding which option? Workstation settings…

    • 1081 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 8 Assignment 1

    • 349 Words
    • 1 Page

    routing table: A list of IP routes used by an IP router when making routing decisions about where to forward an IP packet.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nt1330 Unit 1 Essay

    • 601 Words
    • 3 Pages

    The number one web based attack of 2009 was Malicious PDF activity 49% of web based attacks--attempts to deliver malicious pdf content to victims through the web. The pdf attack is designed to exploit arbitrary vulnerabilities in applications that are able to process pdf’s. A successful pdf attack could compromise the integrity and security of affected computers. (Symantec Corporation, 2009)…

    • 601 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    The term used to describe presenting things from a specific perspective while not paying much attention to other views.…

    • 516 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt1310 Unit 4 Essay

    • 364 Words
    • 2 Pages

    How will I use the concepts and principles from Experience 1 to improve work results?…

    • 364 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 1 Quiz Essay

    • 794 Words
    • 4 Pages

    The following questions are ones that the chair hopes are considered in the course of each delegate’s independent research and the committee’s discussions:…

    • 794 Words
    • 4 Pages
    Good Essays