Question
Which network device differentiates network traffic using Layer 2 of the OSI model? Group of answer choices Active hub Dumb hub Router Switch Flag question:
Which network device differentiates network traffic using Layer 2 of the OSI model?
Group of answer choices
Active hub
Dumb hub
Router
Switch
Flag question: Question 2
Question 21 pts
A first-year student in a computer networking class is studying different addressing types and attempting to identify them. Which of the following does she determine is a Media Access Control (MAC) address?
Group of answer choices
192.168.10.5
2001:0db8:85a3:0000:0000:8a2e:-370:7334
00-14-22-01-23-45
10.0.0.0/8
Flag question: Question 3
Question 31 pts
Isaac is designing a network infrastructure as a class project. He determines that one device he requires must have the capacity to act as a repeater, operate at the Data Link Layer of the OSI model, be able to filter packets based on their MAC address, and allow communication between two local area networks (LANs). Which device will fulfill these specifications?
Group of answer choices
Active hub
Bridge
Router
Switch
Flag question: Question 4
Question 41 pts
Which form of addressing uses 32 bits and subnetting, but suffers from a lack of integrated security?
(Answer using all lowercase letters - Acronyms are OK to use).
Flag question: Question 5
Question 51 pts
Tonya is a student. She is working through a network addressing scheme example for a class. She has read that the 128-bit address 2001:0f58:0000:0000:0000:0000:1986:62af can be shortened but is trying to understand how. What is the correct solution?
Group of answer choices
2001:0f58:1986:62af
2001:f58::1986:62af
2001:0f58:0:1986:62af
2001:0f58:0:0:0:0:1986:62af
Flag question: Question 6
Question 61 pts
Mohammad is presenting IPv6 cryptographic security features to his networking class. A student asks him to explain data origin authentication. How does he answer this question?
Group of answer choices
It encrypts network traffic and cannot be deciphered without the appropriate encryption key.
It uses a checksum that incorporates a shared encryption key so that the receiver can verify that the data was actually sent by the apparent sender.
It involves a checksum that can be used by the receiver to verify that the packet wasn't modified in transit.
It is a solution that creates a tunnel for traffic between two IPv6 hosts through an IPv4 network.
Flag question: Question 7
Question 71 pts
Miles is an IT consultant. He is given the specifications of a networking project for the new campus of a multinational corporation. Among the requirements, switches and wireless access points (WAPs) must interconnect all nodes, the network must use hardware firewalls, and it must support single sign-on (SSO). Which network infrastructure does he select that fulfills these requirements?
Group of answer choices
Client/server
Small office/home office (SOHO)
Wide area network (WAN)
Workgroup
Flag question: Question 8
Question 81 pts
Samantha is a network engineer. She is writing a proposal to her company's chief information office (CIO) about the deployment of a group of end-user nodes to replace the office's aging workstations. Her solution is to use PCs with only display screens, keyboards, and mice, with all of the computing work and storage hosted on servers. What is her solution?
Group of answer choices
Remote access
Remote control
Thin client
Virtual private network (VPN)
Flag question: Question 9
Question 91 pts
In a _____ _____ connection topology, all devices on a network are connected to all other devices.
(Answer using all lowercase letters).
Flag question: Question 10
Question 101 pts
A _____ _____ is a boundary network that hosts resource servers for the public Internet.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started