What interface will be used for the traffic.why

Assignment Help Computer Network Security
Reference no: EM13951305

Assuming that you have 2 network interfaces on you PC, one with IP 192.168.1.100 and one with IP 192.168.2.50, and that this is the routing table on your PC:

Network Destination Netmask Gateway Interface Metric
0.0.0.0 0.0.0.0 192.168.1.1 192.168.1.100 10
169.254.0.0 255.255.255.0 192.168.2.1 192.168.2.50 5
10.10.10.0 255.255.255.0 192.168.2.1 192.168.2.50 100

a. When pinging 71.10.1.1, what interface will be used for the traffic? Why?

b. When pinging 169.254.0.10, what interface will be used for the traffic? Why?

c. When pinging 169.254.1.1, what interface will be used for the traffic? Why?

d. When pinging 10.10.10.1, what interface will be used for the traffic? Why?

Reference no: EM13951305

Questions Cloud

Project for development of a computer game : Would you alter your proposals if the project was an internal project for development of a computer game software package scheduled for the pre-Christmas market?
Managing supplier quality-integrated devices : Please reviewed the caseassignment then provide a case ANALYSIS study report IN 3 - 5 page written report of the alternatives. The report is EXPECTED TO MEET THE FOLLOWING CRITERIA
Where would you see or find these phenomena : Please share 3 examples of something that does not have an inherently normal distribution of values. Where would you see or find these phenomena?
Incident be an example of social engineering : You are working as a receptionist at a real estate company. You receive a phone call from one of the agents who asks for the email address of another agent he needs to contact.
What interface will be used for the traffic.why : When pinging 71.10.1.1, what interface will be used for the traffic? Why?
Standard deviation of monthly percentage return : Investors commonly use the standard deviation of the monthly percentage return for a mutual fund as a measure of the risk for the fund; in such cases, a fund that has a larger standard deviation is considered more risky than a fund with a lower st..
How disk encryption can help protect data in case h/w lost : Discuss your understanding of how disk encryption can help protect data in case the hardware is lost or stolen.
Expected number of these sampled workers : Suppose a random sample of 15 American workers is selected. What is the expected number of these sampled workers who say they will burn out in the near future? What is the probability that none of the workers say they will burn out in the near fut..
Company planning budget for august : For example, electricity costs are $1,200 per month plus $0.15 per car washed. The company expects to wash 9,000 cars in August and to collect an average of $4.90 per car washed. Required: Prepare the company's planning budget for August.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify risks inherent in the use of wireless

1. Identify risks inherent in the use of wireless and mobile technologies. 2. Analyze the identified risks and develop factors to mitigate the risks.

  Why is security primarily a management issue not a

why is security primarily a management issue not a technological issue? also provide some specific bulleted points on

  A web session can be protected against the eavesdroping

Inside the utility is code that that will erase the server's hard drive contents on January 1st, 2016.

  Explain access control methods and attacks

Explain access control methods and attacks

  What are the possible flaws in this protocol

Identify which security requirement was violated in the cases and what are the possible flaws in this protocol? Propose how to fix the possible flaws with minimal modifications to the protocol.

  Define broadband and baseband transmission technology

Define broadband and baseband transmission technology and describe broadband technology and how a broadband system operates.

  Create a personal disaster recovery plan

Locate reviews for at least four tools and create a chart that list describes the tool, features, cost and support available. Which would you recommend if cost was an issue? Which would you recommend if cost were not an issue?

  Computer networks assignment

This assignment is designed to test your understanding of computer networks through problem solving, literature study, simple analysis and problem solving.

  Describing security topology covers four primary areas

Security topology covers four primary areas of concern (design goals, security zones, technologies, and business requirements). Describe each area including key topics in each area. Discuss software threats.

  Subnet masking and designing small networks

Users on wireless or the open nodes adjacent to the concierges desk should not be able to access the hotels corporate networks and corporate network should only be able to talk to the machine room using protocols DNS, DHCP, HTTP, HTTPS and SSH.

  What are the four principles of computer security

What are the four principles of computer security? What are the basic principles that apply to all networks

  Why are background checks important to information security

Be sure to list your two required references at the end of your post. References must be in APA citation format. Answer the following questions below must be a minimum of 300 words combined. Why are background checks important to information securi..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd