What devices transfer packets across multiple networks

Assignment Help Computer Network Security
Reference no: EM133337830

Assignment:

1. What devices transfer packets across multiple networks and use tables to store network addresses to determine the best destination?

A. Hubs

B. Routers

C. Bridges

D. Switches

2. You are going to run a network cable in the space above the drop ceiling in your office. What do you need to use?

A. PVC

B. coaxial

C. plenum

D. fiber-optic

3. What type of cable is immune to electromagnetic or radio-frequency interference?

A. CSMA/CD

B. Fiber-optic cabling

C. Twisted-pair cabling

D. Broadband coaxial cabling

4. What model describes network protocols?

A. CSMA/CA

B. CSMA/CD

C. OSI

D. ISO

5. What is the list of rules that a firewall uses to make determinations on which traffic to block called?

A. NAT

B. WPA

C. ACL

D. SSID

6. What is the maximum distance you can run UTP cable?

A. 10 meters

B. 85 meters

C. 100 meters

D. 185 meters

7. Which of the following is a common connector type for fiber-optic cable?

A. ST

B. RJ-45

C. BNC

D. RG-6

8. What coaxial cable standard is also known as thicknet?

A. RG-6

B. RJ-11

C. RG-58

D. RG-8

9. Pin 1 in the 568B twisted pair cabling standard is what color?

A. White/orange

B. Orange

C. White/green

D. Green

10. What tool would you use to create a twisted pair cable?

A. Cable tester

B. Multimeter

C. Punch-down tool

D. Crimpe

Reference no: EM133337830

Questions Cloud

Propose a specific and novel it innovation : BIT 4604 Virginia Tech Propose a specific and novel IT innovation that the firms could use to gain a strategic advantage over its competitors
Social movement create international political theory : How does the social movement create international political theory? Where are the women in international theory?
Did you use manual or automated approach for test management : SST3 6068 Fanshawe College What was your test management process during your project execution? Did you use manual or automated approach for test management
Nation-state since the Cold War era : Describe the evolution of conflict in Afghanistan as a nation-state since the Cold War era until the rise of Taliban in 2021.
What devices transfer packets across multiple networks : What devices transfer packets across multiple networks and use tables to store network addresses to determine the best destination?
Increase the security and resilience of medical devices : HIM 360 School of Professional Studies, increase the security and resilience of medical devices and health IT." Who should be involved in this initiative
Scientific diplomacy and digital diplimacy : Discuss how Malaysia has used scientific diplomacy and digital diplimacy in an effort to deal with Covid-19 pandemic in the country.
Cybersecurity requirements and the interagency guidelines : Cybersecurity Requirements and the Interagency Guidelines, can you comply with the 3rd party requirements in each law without a contract
Perspective of israeli diplomat : From the perspective of an Israeli diplomat, which would be the most and least suitable of the listed organizations for serving as the mediator

Reviews

Write a Review

Computer Network Security Questions & Answers

  What sort of attack is it intended to detect

What sort of attack is it intended to detect? What are the key differences between user-centric and target-centric monitoring in behavioral data forensics?

  What is your biggest fear about using the internet and why

Can a business survive in today's world without a website or a poorly maintained website? Why or Why not? What's your biggest fear about using the Internet? Why? Can you do anything to stop or prevent it from happening?

  Why would the government impose quotas

Why would the government impose quotas when tariffs not only would reduce imports but also bring in new revenues for the treasury?

  Explain the use of file transfer protocol

Explain the use of File Transfer Protocol

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Describe the challenges and opportunities IT professionals

Need a paper done for IT - Describe the challenges and opportunities IT professionals in your chosen sub-disciplines might experience.

  Linux command syntax

What is the entire command for searching the current directory for files ending in sh that contain the text string "security"?

  Difference between an insider attack and an outsider attack

What is the difference between an insider attack and an outsider attack? What is this defense in depth approach to security that we keep hearing about

  Compare the performance of various wireless networks

BN303 Wireless Networks & Security Assignment - Use of a WLAN Tools in an enterprise setting. Test and compare the performance of various wireless networks

  Classify vulnerability using the risos model

Classify this vulnerability using the RISOS model, classify this vulnerability using the PA model and justify your answer

  Explain access control methods and attacks

Explain access control methods and attacks

  What hacking of memory or hacking of ram means

Describe what hacking of memory or hacking of RAM means. Examine the common tools that hackers use to hack into memory of computing devices. Detail two (2) real-life examples of such tools in action

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd