At which layer of the osi model bridges and switches operate

Assignment Help Computer Network Security
Reference no: EM132191425

Question: 1. Bridges and switches operate at which layer of the OSI model?

a. Network
b. Data Link
c. Presentation
d. Session

2. Fill in the blank. Even though the LAN switch reduces the size of ___________ domains, all hosts connected to the switch are still in the same ___________ domain.

3. What type of transmission allows one transmitter to try to reachonly a subset, or a group, of the entire segment?

a. Broadcast
b. Unicast
c. Multicast
d. Routing

4. Fill in the blank. Layer 2 devices make forwarding decisions based on ___________ contained within the headers of transmitted data frames.

5. What device adds the most latency in a network?

a. router
b. switch
c. bridge
d. server

6. The process that can stop frames from propagating onto segmentswhere the destination does not exist once a switch or a bridge has learned the topology is called...

a. routing
b. filtering
c. inspection
d. monitoring

7. Fill in the blank. A _________ frame is the smallest frame that allows CSMA/CD to operate properly, and a __________ frame isthe largest.

8. What is the broadcast MAC address used to communicate to all devices on a layer 2 network?

a. FF:FF:FF:00:00:00
b. 11:22:33:44:44:55:66
c. FF:FF:FF:FF:FF:FF
d. 00:00:00:00:00:00

9. Which acronym stands for a Layer 2 error checking mechanism?

a. NIC
b. CRC
c. BGP
d. OSPF

10. Which mechanism reads the entire frame to check for errorsbefore sending on to the destination?

a. Full duplex
b. Cut through
c. Filtering
d. Store and forward

Reference no: EM132191425

Questions Cloud

Determining whether moderation was significant : Analyze the output, determining whether moderation was significant and how to interpret that result. Reflect on possible implications of social change.
Why the improper release of accruals was fraudulent : Very briefly state why the improper release of accruals was fraudulent?
One of the keys to successful change management : Which of the following is not one of the keys to successful change management?
Describe how you will demonstrate cultural competence : Describe how you will demonstrate cultural competence in five of the exam topic areas of your choosing.
At which layer of the osi model bridges and switches operate : Bridges and switches operate at which layer of the OSI model? Fill in the blank. Even though the LAN switch reduces the size of ___________ domains.
Explain how rich content editor you will use this data : Evidence of purposeful rigor and student thinking - at least two levels of Depth of Knowledge (DOK), clearly labeled
Does good manager need to also be good leader : Discuss the following "Does a good manager need to also be a good leader?" Discuss the following "Is a leader necessarily a good manager?"
What is an intelligence analysis strategy : What is an Intelligence Analysis Strategy and how is it used?
Environmental sustainability initiatives : What economic arguments can be made for and against environmental sustainability initiatives?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Analyze the existing security situation in the organization

Analyze the existing security situation in the organization. Identify the predominant electronic and physical threats to communications networks. Explain the importance of explicit enterprise security policies and procedures.

  Develop a wireless and remote connectivity assessment

Your company, Security Professionals Inc., has been engaged to perform a wireless and remote connectivity assessment and submit a proposal.

  Develop a security policy document

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense

  State whether this is a ca or end-user certificate

Identify the key elements in this certificate, including the owner''s name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  Describing use of kerberos for mutual authentication

Answer the following in relation to a scenario where Bob and Alice use Kerberos for mutual authentication. When Bob receives a ticket from Alice, how does he know it is genuine?

  Discuss top-three physical security controls that you need

Discuss the top-three physical security controls that you believe need to be implemented in order to secure the physical perimeter of the office space.

  Questions on security in computing and program security

Frequently asked questions on security in computing, program security , operating system , database security ? what is intrusion detection system , what is firewall , what re the non malicious programming errors , theft to security , how to contro..

  Wat issues need to be considered when planning an

common data formats are critical to being able to exchange data quickly and smoothly. establishing the standards for

  What are the security issues that should be addressed

What are the security or control issues that should be addressed as part of the technology selection process for Kirby's business? Propose how you would address ethics or information security issues as part of the technology selection process..

  Explain protocol for sending encrypted message

Consider following protocol for sending an encrypted message from Alice to Bob in presence of Key Distribution Center (KDC).

  What you believe are largest threat against network security

Discuss what you believe are the largest threats against network security, and what measures should be taken to protect against such intrusions.

  Examine common web application vulnerabilities and attacks

Examine three common Web application vulnerabilities and attacks, and recommend corresponding mitigation strategies for each. Provide a rationale for your response.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd