Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Which network device differentiates network traffic using Layer 2 of the OSI model? Group of answer choices Active hub Dumb hub Router Switch Flag question:

Which network device differentiates network traffic using Layer 2 of the OSI model?

Group of answer choices

Active hub

Dumb hub

Router

Switch

Flag question: Question 2

Question 21 pts

A first-year student in a computer networking class is studying different addressing types and attempting to identify them. Which of the following does she determine is a Media Access Control (MAC) address?

Group of answer choices

192.168.10.5

2001:0db8:85a3:0000:0000:8a2e:-370:7334

00-14-22-01-23-45

10.0.0.0/8

Flag question: Question 3

Question 31 pts

Isaac is designing a network infrastructure as a class project. He determines that one device he requires must have the capacity to act as a repeater, operate at the Data Link Layer of the OSI model, be able to filter packets based on their MAC address, and allow communication between two local area networks (LANs). Which device will fulfill these specifications?

Group of answer choices

Active hub

Bridge

Router

Switch

Flag question: Question 4

Question 41 pts

Which form of addressing uses 32 bits and subnetting, but suffers from a lack of integrated security?

(Answer using all lowercase letters - Acronyms are OK to use).

Flag question: Question 5

Question 51 pts

Tonya is a student. She is working through a network addressing scheme example for a class. She has read that the 128-bit address 2001:0f58:0000:0000:0000:0000:1986:62af can be shortened but is trying to understand how. What is the correct solution?

Group of answer choices

2001:0f58:1986:62af

2001:f58::1986:62af

2001:0f58:0:1986:62af

2001:0f58:0:0:0:0:1986:62af

Flag question: Question 6

Question 61 pts

Mohammad is presenting IPv6 cryptographic security features to his networking class. A student asks him to explain data origin authentication. How does he answer this question?

Group of answer choices

It encrypts network traffic and cannot be deciphered without the appropriate encryption key.

It uses a checksum that incorporates a shared encryption key so that the receiver can verify that the data was actually sent by the apparent sender.

It involves a checksum that can be used by the receiver to verify that the packet wasn't modified in transit.

It is a solution that creates a tunnel for traffic between two IPv6 hosts through an IPv4 network.

Flag question: Question 7

Question 71 pts

Miles is an IT consultant. He is given the specifications of a networking project for the new campus of a multinational corporation. Among the requirements, switches and wireless access points (WAPs) must interconnect all nodes, the network must use hardware firewalls, and it must support single sign-on (SSO). Which network infrastructure does he select that fulfills these requirements?

Group of answer choices

Client/server

Small office/home office (SOHO)

Wide area network (WAN)

Workgroup

Flag question: Question 8

Question 81 pts

Samantha is a network engineer. She is writing a proposal to her company's chief information office (CIO) about the deployment of a group of end-user nodes to replace the office's aging workstations. Her solution is to use PCs with only display screens, keyboards, and mice, with all of the computing work and storage hosted on servers. What is her solution?

Group of answer choices

Remote access

Remote control

Thin client

Virtual private network (VPN)

Flag question: Question 9

Question 91 pts

In a _____ _____ connection topology, all devices on a network are connected to all other devices.

(Answer using all lowercase letters).

Flag question: Question 10

Question 101 pts

A _____ _____ is a boundary network that hosts resource servers for the public Internet.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions