At which layer of the osi model bridges and switches operate

Assignment Help Computer Network Security
Reference no: EM132191425

Question: 1. Bridges and switches operate at which layer of the OSI model?

a. Network
b. Data Link
c. Presentation
d. Session

2. Fill in the blank. Even though the LAN switch reduces the size of ___________ domains, all hosts connected to the switch are still in the same ___________ domain.

3. What type of transmission allows one transmitter to try to reachonly a subset, or a group, of the entire segment?

a. Broadcast
b. Unicast
c. Multicast
d. Routing

4. Fill in the blank. Layer 2 devices make forwarding decisions based on ___________ contained within the headers of transmitted data frames.

5. What device adds the most latency in a network?

a. router
b. switch
c. bridge
d. server

6. The process that can stop frames from propagating onto segmentswhere the destination does not exist once a switch or a bridge has learned the topology is called...

a. routing
b. filtering
c. inspection
d. monitoring

7. Fill in the blank. A _________ frame is the smallest frame that allows CSMA/CD to operate properly, and a __________ frame isthe largest.

8. What is the broadcast MAC address used to communicate to all devices on a layer 2 network?

a. FF:FF:FF:00:00:00
b. 11:22:33:44:44:55:66
c. FF:FF:FF:FF:FF:FF
d. 00:00:00:00:00:00

9. Which acronym stands for a Layer 2 error checking mechanism?

a. NIC
b. CRC
c. BGP
d. OSPF

10. Which mechanism reads the entire frame to check for errorsbefore sending on to the destination?

a. Full duplex
b. Cut through
c. Filtering
d. Store and forward

Reference no: EM132191425

Questions Cloud

Determining whether moderation was significant : Analyze the output, determining whether moderation was significant and how to interpret that result. Reflect on possible implications of social change.
Why the improper release of accruals was fraudulent : Very briefly state why the improper release of accruals was fraudulent?
One of the keys to successful change management : Which of the following is not one of the keys to successful change management?
Describe how you will demonstrate cultural competence : Describe how you will demonstrate cultural competence in five of the exam topic areas of your choosing.
At which layer of the osi model bridges and switches operate : Bridges and switches operate at which layer of the OSI model? Fill in the blank. Even though the LAN switch reduces the size of ___________ domains.
Explain how rich content editor you will use this data : Evidence of purposeful rigor and student thinking - at least two levels of Depth of Knowledge (DOK), clearly labeled
Does good manager need to also be good leader : Discuss the following "Does a good manager need to also be a good leader?" Discuss the following "Is a leader necessarily a good manager?"
What is an intelligence analysis strategy : What is an Intelligence Analysis Strategy and how is it used?
Environmental sustainability initiatives : What economic arguments can be made for and against environmental sustainability initiatives?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Describe which keys should be used to encrypt the message

Now Bob wants to send a message m to Alice. Describe which keys should be used to encrypt the message and decrypt the ciphertext.

  Computing decryption function and recovered plaintext

Decrypt to recover the plaintext. What is the decryption function, and the recovered plaintext? What type of cipher is this?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  What comparison of means test was used

What comparison of means test was used to answer the question I need it now is there a relationship between parents highest level of education and socioeconomic

  Is the system breakable if the language is standard english

What degree of redundancy rL of the language is necessary in order that this code system be breakable? - Is the system breakable if the language is standard English?

  Identification of preventative controls

Identification of preventative controls and the development of recovery strategies and Explanation of the information technology (IT) contingency planning process to include an understanding of the required business impact analysis

  Differentiate between logical and physical security

For this 3-5 page paper, provide an overview of the need for and history of data security differentiate between logical and physical security

  Network management in network management why is it

network management in network management why is it important to carefully consider decisions that will lock the firm

  Discuss security issues related to researched technologies

From the e-Activity, discuss two security issues related to the researched technologies. Analyze the security protection currently implemented on the device.

  Discussion of operating system patches

Prepare a well-written paper no more than 10 pages in length -  case studies related to cybersecurity and the use of social networking and home computer use.

  What is data mining and why is it considered controversial

What exactly is "cyber ethics" How is it different from and similar to computer ethics information ethics and Internet ethics and Identify and describe some key aspects of each of the four phases in the evolution of cyber ethics as a field of app..

  How nessus may be used for harmful purposes by a hacker

In a pragraph describe how it is useful to a network security specialist and how it may be used for harmful purposes by a hacker?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd