Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 23 The most basic form of NAT, Replaces the MAC address in datagrams passing from the site to the Internet Replaces the IP address

Question 23

The most basic form of NAT,

Replaces the MAC address in datagrams passing from the site to the Internet
Replaces the IP address in datagrams passing from the site to the Internet
Replaces the TCP address in the frame passing from the site to the Internet
Replaces the UDP address in the frame passing from the site to the Internet

Question 24

What crucial information used by NAPT is not available in most IP fragments?

TTL (time to live)
Protocol port numbers
The unique server ID
The Fragment number

Question 25

Originally, separate protocols were used to obtain each of the configuration parameters needed at startup. The Dynamic Host Configuration Protocol (DHCP) extends which protocol to allow a host to obtain all necessary information with a single request?

Bootstrapping Protocol (BOOTP)
Transmission Control Protocol (TCP)
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)

Question 26

Explain its purpose and the difference between a Layer 3 versus a Layer 2 Switch for VLANs and how they work.

Layer 3 is used to intelligently forward (route) packets while Layer 2 switches cant route packets based upon IP addresses
Layer 3 switches can logically segment a network into two or more VLANs, while Layer 2 switches easily retrieve packets and forward them very quickly (at near wire speed)
Layer 3 is less expensive than Layer 2 switches, both do the same job
All of the above
A and B above only
B and C above only

Question 27

What is the difference between a PAN, LAN, and WAN?

Size
Transfer media are different
Redundancy
Latency

Question 28

Name the specific technique used in security attacks to deny service to TCP.

Spoofing
Packet interception
SYN Flooding
Distributed denial of service attacks

Question 29

Which of the following are NOT major security problems on the Internet?

Loss of data
Loss of control
Denial of service
Misrepresentation
All of the above are major security problems

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

What is the basis for Security Concerns in Cloud Computing?

Answered: 1 week ago

Question

Describe the three main Cloud Computing Environments.

Answered: 1 week ago