Modules 5-11 Chapter Quizzes

¡Supera tus tareas y exámenes ahora con Quizwiz!

AAA Server

What authenticates users to allow access to specific network resources and records what the user does while connected to the resource? AAA Server ACL Port Mirroring VPN

It identifies the routers in the path from a source host to a destination host.

What characterizes a traceroute utility? It utilizes the ICMP Route Redirection messages. It is primarily used to test connectivity between two hosts. It identifies the routers in the path from a source host to a destination host. It sends four Echo Request messages.

Syslog

What gathers a variety of statistics for devices that are configured to send and log status messages? NetFlow NTP SNMP Syslog

It connects multiple networks that are geographically separated.

What is a characteristic of a WAN? It requires a wireless access point to connect users to the network. It spans across a campus or city to enable sharing of regional resources. It connects multiple networks that are geographically separated. It is typically owned and managed by a single home or business.

It encrypts the entire body of the packet for more secure communications.

What is a feature of the TACACS+ protocol? It encrypts the entire body of the packet for more secure communications. It hides passwords during transmission using PAP and sends the rest of the packet in plaintext. It utilizes UDP to provide more efficient packet transfer. It combines authentication and authorization as one process.

connects to remote servers on behalf of clients

What is a function of a proxy firewall? filters IP traffic between bridged interfaces drops or forwards traffic based on packet header information connects to remote servers on behalf of clients uses signatures to detect patterns in network traffic

VPN

What is a private network that is created over a public network? AAA Server ACL Port Mirroring VPN

ACL

What is a series of commands that control whether a device forwards or drops packets based on information found in the packet header? AAA Server ACL Port Mirroring VPN

.com

What is an example of a top-level domain? .com root.cisco.com cisco.com ww​w.cisco.com

IP is properly installed on the host.

What is indicated by a successful ping to the ::1 IPv6 address? All hosts on the local link are available. The host is cabled properly. IP is properly installed on the host. The link-local address is correctly configured. The default gateway address is correctly configured.

An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately.

What is the main difference between the implementation of IDS and IPS devices? An IDS uses signature-based technology to detect malicious packets, whereas an IPS uses profile-based technology. An IDS needs to be deployed together with a firewall device, whereas an IPS can replace a firewall. An IDS can negatively impact the packet flow, whereas an IPS can not. An IDS would allow malicious traffic to pass before it is addressed, whereas an IPS stops it immediately.

segmentation

What is the process of dividing a large data stream into smaller pieces prior to transmission? Sequencing duplexing multiplexing segmentation

to filter the traffic that is moving in and out of the PC

What is the purpose of a personal firewall on a computer? to protect the computer from viruses and malware to increase the speed of the Internet connection to filter the traffic that is moving in and out of the PC to protect the hardware against fire hazard

neighbor solicitation

What message is sent by a host to check the uniqueness of an IPv6 address before using that address? ARP request neighbor solicitation echo request router solicitation

port mirroring

What network monitoring technology enables a switch to copy and forward traffic sent and received on multiple interfaces out another interface toward a network analysis device? SNMP port mirroring network tap NetFlow

NetFlow

What provides statistics on packet flows passing through a networking device? NetFlow NTP SNMP Syslog Servers

NTP (Network Time Protocol)

What sets the date and time on network devices? NetFlow NTP SNMP Syslog Servers

STP (Spanning Tree Protocol)

What technology is used to prevent Layer 2 loops? VTP ARP NTP STP

time exceeded

Which ICMPv6 message is sent when the IPv6 hop limit field of a packet is decremented to zero and the packet cannot be forwarded? port unreachable time exceeded protocol unreachable network unreachable

WLC (Wireless LAN Controller)

Which device can control and manage a large number of corporate APs? WLC LWAP switch router

wireless access point (WAP)

Which device connects wireless clients to the network? switch router wireless access point (WAP) end device

distribution

Which layer of the hierarchical design model is a control boundary between the other layers? core distribution network access

SNMP

Which network service allows administrators to monitor and manage network devices? NetFlow SNMP syslog NTP

SMB (Server Message Block)

What application layer protocol describes the services that are used for file sharing in Microsoft networks? SMB SMTP Telnet DNS DHCP

receive AP's MAC address (BSSID) send client's MAC address to AP receive AP's association identifier (AID)

What are three events that can occur in Step 3 (Association) of the client and AP association process? (Choose three.) receive AP's MAC address (BSSID) send client's MAC address to AP agree with AP to share Open authentication initiate shared key request receive AP's association identifier (AID)

does not require a dedicated end-to-end connection operates independently of the network media

What are two characteristics of IP? (Choose two.) retransmits packets if errors occur does not require a dedicated end-to-end connection re-assembles out of order packets into the correct order at the receiver end guarantees delivery of packets operates independently of the network media

listen for beacon frames to find WLAN SSIDs (passive mode) send a probe request to the AP with or without a known SSID (active mode)

What are two events that can occur in Step 1 (Discovery) of the client and AP association process? (Choose two.) agree with AP to share Open authentication send client's MAC address to AP listen for beacon frames to find WLAN SSIDs (passive mode) send a probe request to the AP with or without a known SSID (active mode)

agree with AP to share Open authentication initiate shared key authentication process

What are two events that can occur in Step 2 (Authentication) of the client and AP association process? (Choose two.) send client's MAC address to AP agree with AP to share Open authentication receive AP's MAC address (BSSID) initiate shared key authentication process

identifying the proper application for each communication stream tracking the individual communication between applications on the source and destination hosts

What are two roles of the transport layer in data communication on a network? (Choose two.) performing a cyclic redundancy check on the frame for errors providing the interface between applications and the underlying network over which messages are transmitted identifying the proper application for each communication stream providing frame delimiting to identify bits making up a frame tracking the individual communication between applications on the source and destination hosts

encapsulating PDUs from the transport layer routing packets toward the destination

What are two services provided by the OSI network layer? (Choose two.) encapsulating PDUs from the transport layer routing packets toward the destination placement of frames on the media collision detection performing error detection

Sequence Number

What field is used by the destination host to reassemble segments into the original order? Control Bits Destination Port Sequence Number Source Port Window Size

Window Size

What field is used to provide flow control? Control Bits Destination Port Sequence Number Source Port Window Size

The part of the FTP message that was lost is re-sent.

What happens if part of an FTP message is not delivered to the destination? The FTP source host sends a query to the destination host. The message is lost because FTP does not use a reliable delivery method. The part of the FTP message that was lost is re-sent. The entire FTP message is re-sent.

The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.

What happens when a sending host senses there is congestion? The receiving host increases the number of bytes it sends before receiving an acknowledgment from the sending host. The receiving host reduces the number of bytes it sends before receiving an acknowledgment from the sending host. The sending host increases the number of bytes it sends before receiving an acknowledgment from the destination host. The sending host reduces the number of bytes it sends before receiving an acknowledgment from the destination host.

source MAC address

What information does an Ethernet switch examine and use to build its address table? source MAC address source IP address destination IP address destination MAC address

destination MAC address

What information does an Ethernet switch examine and use to forward a frame? source MAC address destination IP address source IP address destination MAC address

The DDNS provider detects a change to the client IP address and immediately updates the mapping change. DDNS (Dynamic DNS)

What is a benefit of using DDNS? DDNS has a service called ICANN Lookup used to obtain the registration record of a URL. DDNS is a more secure version of DNS and has a robust security profile. DDNS is a starting point for identifying potentially dangerous internet locations that may have been reached through the network. The DDNS provider detects a change to the client IP address and immediately updates the mapping change.

There can be many ports open simultaneously on a server, one for each active server application.

What is a characteristic of a TCP server process? There can be many ports open simultaneously on a server, one for each active server application. Every application process running on the server has to be configured to use a dynamic port number. A host running two different applications can have both configured to use the same server port. An individual server can have two services assigned to the same port number within the same transport layer services.

determines the path and directs data along the way to its final destination

What is a role of an intermediary device on a network? runs applications that support collaboration for business determines the path and directs data along the way to its final destination forms the interface between the human network and the underlying communication network functions as the primary source of information for end devices

segment

What is the PDU associated with the transport layer? segment packet bits frame

to display the host routing table

What is the command netstat -r used for? to release the assigned IP address to renew the default gateway to display the host routing table to display the TCP sockets

2001:db8:eeff:a::1

What is the correct compressed format of the IPv6 address 2001:0db8:eeff:000a:0000:0000:0000:0001? 2001:db8:eeff:a::0001 2001:db8:eeff:a:::1 2001:db8:eeff:a::1 2001:db8:eeff:a:1

encapsulation

What is the name of the process of adding protocol information to data as it moves down the protocol stack? de-encapsulation sequencing segmentation encapsulation

to request that a source decrease the rate at which it transmits data

What is the purpose of the TCP sliding window? to ensure that segments arrive in order at the destination. to end communication when data transmission is complete. to request that a source decrease the rate at which it transmits data. to inform a source to retransmit data from a specific point forward.

The IPv4 network address of 10.128.16.0 255.255.240.0

What is the result of a logical AND operation of: 10.128.17.4 255.255.240.0? The IPv4 network address of 10.128.0.0 255.255.240.0 The IPv4 network address of 10.128.16.0 255.255.240.0 The IPv4 network address of 10.128.17.0 255.255.240.0 The IPv4 network address of 10.128.17.4 255.255.240.0

flow control

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly? response timeout flow control encapsulation access method

encapsulation

What process involves placing one PDU inside of another PDU? segmentation encoding flow control encapsulation

DAD (Duplicate Address Detection)

What process is used in ICMPv6 for a host to verify that an IPv6 address is unique before configuring it on an interface? SLAAC DAD ARP EUI-64

email

What type of server would use IMAP? FTP Telnet DNS email DHCP

Layer 2

Which OSI layer header is rewritten with new addressing information by a router when forwarding between LAN segments? Layer 3 Layer 2 Layer 7 Layer 4

application

Which OSI model layer contains protocols for process-to-process communication? transport application network session

HTTP

Which application layer protocol uses message types such as GET, PUT, and POST? POP3 SMTP DHCP HTTP DNS

end devices

Which device must connect to another device to gain access to the network? end devices wireless access point switch router

switch

Which device uses MAC addresses to determine the exit port? switch router end device wireless LAN Controller

It communicates with upper protocol layers.

Which function or operation is performed by the LLC sublayer? It adds a header and trailer to a packet to form an OSI Layer 2 PDU. It performs data encapsulation. It is responsible for media access control. It communicates with upper protocol layers.

Distribution layer

Which layer aggregates traffic and provides connectivity to services? Access layer Core layer Distribution layer Hierarchical layer

DHCPREQUEST

Which message does an IPv4 host use to reply when it receives a DHCPOFFER message from a DHCP server? DHCPDISCOVER DHCPACK DHCPOFFER DHCPREQUEST

ZPF (Zone-Based Policy Firewalls)

Which network design groups interfaces into zones with similar functions or features? layered private self-zone ZPF

Core layer

Which network design layer provides connectivity between distribution layers for large LAN environments? Access layer Core layer Distribution layer Hierarchical layer

Access layer

Which network design layer provides endpoints and users with a connection to the network? Access layer Core layer Distribution layer Hierarchical layer

SSID

Which parameter is commonly used to identify a wireless network name when a home wireless AP is being configured? SSID BESS ESS ad hoc

67 DHCP

Which protocol automates assignment of IP addresses on a network, and which port number does it use? (Choose two.) 67 DHCP 80 53 DNS SMB

POP3

Which protocol enables mail to be downloaded from an email server to a client and then deletes the email from the server? POP3 IMAP SMTP HTTP

ICMP (Internet Control Message Protocol)

Which protocol is used by ping to test connectivity between network hosts? ICMP TCP ARP DHCP

data link

Which protocol stack layer encapsulates data into frames? data link transport network application

ICMPv6

Which protocol supports Stateless Address Autoconfiguration (SLAAC) for dynamic assignment of IPv6 addresses to a host? ARPv6 DHCPv6 ICMPv6 UDP

An SVI is needed for each VLAN

Which sentence correctly describes the SVI inter-VLAN routing method? A physical interface is needed for every VLAN that is created. The encapsulation type must be configured on the SVI. An SVI is needed for each VLAN. Subinterfaces have to be created.

Segments are sent from the transport layer to the internet layer.

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network? Frames are sent from the network access layer to the internet layer. Data is sent from the internet layer to the network access layer. Packets are sent from the network access layer to the transport layer. Segments are sent from the transport layer to the internet layer.

An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client.

Which statement best describes the operation of the File Transfer Protocol? An FTP client uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP Server. An FTP server uses a source port number of 21 and a randomly generated destination port number during the establishment of control traffic with an FTP client. An FTP client uses a source port number of 20 and a randomly generated destination port number during the establishment of data traffic with an FTP Server. An FTP server uses a source port number of 20 and a randomly generated destination port number during the establishment of control traffic with an FTP client.

It is a physical address assigned to an Ethernet NIC by the manufacturer.

Which statement describes a MAC address? It is a physical address assigned to an Ethernet NIC by the manufacturer. It contains two portions, the network portion and the host portion. It is 128-bits in length. It identifies the source and destination addresses of hosts on the Internet.

Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world.

Which statement describes a characteristic of cloud computing? Applications can be accessed over the Internet by individual users or businesses using any device, anywhere in the world. A business can connect directly to the Internet without the use of an ISP. Devices can connect to the Internet through existing electrical wiring. Investment in new infrastructure is required in order to access the cloud.

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.​

Which statement is true about the TCP/IP and OSI models?​ The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.​ The OSI Layer 7 and the TCP/IP application layer provide identical functions. The first three OSI layers describe general services that are also provided by the TCP/IP internet layer.​ The TCP/IP network access layer has similar functions to the OSI network layer.​

192.168.5.5 172.16.4.4 10.1.1.1

Which three IP addresses are private ? (Choose three.) 172.32.5.2 192.168.5.5 192.167.10.10 224.6.6.6 172.16.4.4 10.1.1.1

Nmap

Which tool is used to provide a list of open ports on network devices? Nmap Ping Whois Tracert

TCP 3-way handshake

Which transport layer feature is used to guarantee session establishment? UDP ACK flag UDP sequence number TCP 3-way handshake TCP port number

It uses the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) access control method. It is supported by IEEE 802.3 standards.

Which two characteristics describe Ethernet technology? (Choose two.) It is supported by IEEE 802.5 standards. It typically uses an average of 16 Mb/s for data transfer rates. It uses the CSMA/CD access control method. It is supported by IEEE 802.3 standards. It uses a ring topology.

window sequence number

Which two fields are included in the TCP header but not in the UDP header? (Choose two.) window source port sequence number checksum destination port

ACK SYN

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two network devices? (Choose two.) PSH ACK SYN FIN RST URG

RIP EIGRP

Which two protocols are considered distance vector routing protocols? (Choose two.) ISIS RIP EIGRP BGP OSPF

Ethernet switch access point

Which two roles are typically performed by a wireless router that is used in a home or small business? (Choose two.) repeater Ethernet switch WLAN controller access point RADIUS authentication server

VoIP DNS

Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose two) POP3 FTP HTTP VoIP DNS

Application gateway

Which type of firewall filters information at Layers 3, 4, 5, and 7 of the OSI reference model? Host-based Hybrid Application gateway Packet filtering Stateful

Host-based

Which type of firewall is a PC or server with firewall software running on it? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent

Hybrid

Which type of firewall is a combination of various firewall types? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent

Packet filtering

Which type of firewall is part of a router firewall, permitting or denying traffic based on Layer 3 and Layer 4 information? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent

https://w​ww.ourblogs.info/

Which website is considered secure because it encrypts the communication between the website and visitors? http://ww​w.thebanks.com/ ftp://download.openproject.net/ https://w​ww.ourblogs.info/ http://ww​w.secureaccess.com:8080/

channel settings

Which wireless parameter refers to the frequency bands used to transmit data to a wireless access point? scanning mode channel settings security mode SSID

to display a list of the near-side router interfaces between the source device and the destination device

Why would a manager need to use the tracert command? to display a list of the near-side router interfaces between the source device and the destination device to quickly verify connectivity by sending echo-request messages to the destination and receiving a series of echo-reply messages from that destination to display a list of current processes running on a local or a remote computer to query the Domain Name System (DNS) to get domain names and mapping information

ipconfig /displaydns

A particular website does not appear to be responding on a Windows 7 computer. What command could the technician use to show any cached DNS entries for this web page? arp -a nslookup ipconfig /all ipconfig /displaydns

to verify that the TCP/IP stack is operational

A user complains that the workstation cannot access the network. The network technician asks the user to issue the ping 127.0.0.1 command. What is the purpose of using this command? to check that the workstation can reach a DHCP server to verify that the TCP/IP stack is operational to test the reachability of a remote network to verify that the NIC is configured with a static address

when the value of the Hop Limit field reaches zero

A user executes a traceroute over IPv6. At what point would a router in the path to the destination device drop the packet? when the router receives an ICMP time exceeded message when the target host responds with an ICMP echo reply message when the value of the Hop Limit field reaches 255 when the value of the Hop Limit field reaches zero

network unreachable

A user issues a ping 192.168.219.8 command and receives a response that includes a code of 0. What does this code represent? protocol unreachable network unreachable host unreachable port unreachable

port unreachable

A user issues a ping 2001:db8:3040:114::88 command and receives a response that includes a code of 3. What does this code represent? port unreachable host unreachable network unreachable protocol unreachable

Ethernet, IP, TCP, HTTP

A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission? Ethernet, IP, TCP, HTTP HTTP, TCP, IP, Ethernet Ethernet, TCP, IP, HTTP HTTP, Ethernet, IP, TCP

0607:1234:aa10:ba01

A device has an IPv6 address of 2001:0DB8:75a3:0214:0607:1234:aa10:ba01 /64. What is the host identifier of the device? ba01 0607:1234:aa10:ba01 2001:0DB8 2001:0DB8:75a3

all hosts in the same network

A host is transmitting a broadcast. Which host or hosts will receive it? a specially defined group of hosts all hosts on the Internet all hosts in the same network the closest neighbor on the same network

traceroute

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? ipconfig traceroute netstat telnet

traceroute

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web server located at an ISP in another city. Which tool or command would help identify the specific router where the packet was lost or delayed? telnet traceroute ipconfig netstat

the TCP/IP stack on a network host

A technician uses the ping 127.0.0.1 command. What is the technician testing? the TCP/IP stack on a network host connectivity between a PC and the default gateway connectivity between two adjacent Cisco devices connectivity between two PCs on the same network physical connectivity of a particular PC and the network

Layer 3

At what layer of the OSI model do routers operate? Layer 2 Layer 4 Layer 5 Layer 3

transport layer

At which OSI layer is a destination port number added to a PDU during the encapsulation process? network layer application layer transport layer data link layer

It is the criterion that is used to filter traffic.

How is a source IP address used in a standard ACL? It is used to determine the default gateway of the router that has the ACL applied. It is the address to be used by a router to determine the best path to forward packets. It is the address that is unknown, so the ACL must be placed on the interface closest to the source address. It is the criterion that is used to filter traffic.

DMZ

Refer to the exhibit. The network "A" contains multiple corporate servers that are accessed by hosts from the Internet for information about the corporation. What term is used to describe the network marked as "A"? DMZ untrusted network perimeter security boundary internal network

Port Mirroring

What allows a switch to make duplicate copies of traffic passing through it, and then send it out a port with a network monitor attached? AAA Server ACL Port Mirroring VPN

SNMP (Simple Network Management Protocol)

Which option allows administrators to monitor and manage network devices? NetFlow NTP SNMP Syslog Servers

IPsec

Which protocol provides authentication, integrity, and confidentiality services and is a type of VPN? MD5 AES ESP IPsec

It is a cloud-based security service to scan traffic for malware and policy enforcement.

Which statement describes the Cisco Cloud Web Security? It is an advanced firewall solution to guard web servers against security threats. It is a cloud-based security service to scan traffic for malware and policy enforcement. It is a security appliance that provides an all-in-one solution for securing and controlling web traffic. It is a secure web server specifically designed for cloud computing.

threat intelligence

Which technology is used by Cisco Advanced Malware Protection (AMP) in defending and protecting against known and emerging threats? threat intelligence network admission control website filtering and block listing network profiling

interface identifier connection type

Which two pieces of information should be included in a logical topology diagram of a network? (Choose two.) cable type and identifier interface identifier connection type cable specification device type OS/IOS version

Transparent

Which type of firewall filters IP traffic between a pair of bridged interfaces? Host-based Hybrid Next generation Packet filtering Proxy Stateful Transparent

to identify the network address of the destination network

Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask? to identify the broadcast address of the destination network to identify the host address of the destination host to identify the network address of the destination network to identify faulty frames

inside global

In NAT translation for internal hosts, what address would be used by external users to reach internal hosts? outside local inside global outside global inside local

to convert information to the appropriate form for transmission

In computer communication, what is the purpose of message encoding? to negotiate correct timing for successful communication to interpret information to break large messages into smaller frames to convert information to the appropriate form for transmission

a home router

On a home network, which device is most likely to provide dynamic IP addressing to clients on the home network? a home router a dedicated file server a DNS server an ISP DHCP server

It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

Refer to the exhibit. Consider the IP address configuration shown from PC1. What is a description of the default gateway address? It is the IP address of the ISP network device located in the cloud. It is the IP address of the Router1 interface that connects the company to the Internet. It is the IP address of Switch1 that connects PC1 to other devices on the same LAN. It is the IP address of the Router1 interface that connects the PC1 LAN to Router1.

203.0.113.5

Refer to the exhibit. NAT is configured on Remote and Main. The PC is sending a request to the web server. What IPv4 address is the source IP address in the packet between Main and the web server? 192.0.2.1 10.130.5.76 172.16.1.10 203.0.113.5 209.165.200.226 209.165.200.245

The UDP destination port number identifies the application or service on the server which will handle the data. The source port field identifies the running application or service that will handle data returning to the PC. UDP segments are encapsulated within IP packets for transport across the network.

Data is being sent from a source PC to a destination server. Which three statements correctly describe the function of TCP or UDP in this situation? (Choose three.) The UDP destination port number identifies the application or service on the server which will handle the data. The TCP process running on the PC randomly selects the destination port when establishing a session with the server. The source port field identifies the running application or service that will handle data returning to the PC. The TCP source port number identifies the sending host on the network. TCP is the preferred protocol when a function requires lower network overhead. UDP segments are encapsulated within IP packets for transport across the network.

the next byte that the destination expects to receive

During a TCP session, a destination device sends an acknowledgment number to the source device. What does the acknowledgment number represent? the last sequence number that was sent by the source one number more than the sequence number the next byte that the destination expects to receive the total number of bytes that have been received

passive mode

For which discovery mode will an AP generate the most traffic on a WLAN? passive mode active mode open mode mixed mode

Each VLAN must have a different network number.

How are IP addressing designs affected by VLAN implementations? Each VLAN must have a different network number. VLANs do not support VLSM. Each VLAN must have a different subnet mask. VLANs do not use a broadcast address.

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

How do hosts ensure that their packets are directed to the correct network destination? They always direct their packets to the default gateway, which will be responsible for the packet delivery. They search in their own local routing table for a route to the network destination address and pass this information to the default gateway. They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​ They send a query packet to the default gateway asking for the best route.

BYOD provides flexibility in where and how users can access network resources.

How does BYOD change the way in which businesses implement networks?​ BYOD provides flexibility in where and how users can access network resources. BYOD requires organizations to purchase laptops rather than desktops. BYOD devices are more expensive than devices that are purchased by an organization. BYOD users are responsible for their own network security, thus reducing the need for organizational security policies.

30

How many usable IP addresses are available on the 192.168.1.0/27 network? 62 30 16 32 254 256


Conjuntos de estudio relacionados

doing nothing is something (review questions)

View Set

chapter 1 life and health insurance exam

View Set

Organizational Behavior 2E Chapter 4

View Set