Business Data Networks and Security, 9e (Panko) Chapter 9 TCP/IP Internetworking II
1) In IP subnet planning, having a large subnet part allows more hosts per subnet. Answer: FALSE
2) When the subnet part is made larger, the host part must be smaller. Answer: TRUE
3) If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) None of the above Answer: D
4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) None of the above Answer: B
5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have? A) 8 B) 16 C) 254 D) 65,534 Answer: D
6) You have a 20-bit network part and a…show more content… A) manager B) agent C) Both A and B D) Neither A nor B Answer: A
47) In SNMP, the agent can create commands. Answer: FALSE
48) In SNMP, the ________ creates responses. A) manager B) agent C) Both A and B D) Neither A nor B Answer: B
49) In SNMP, the manager creates both commands and responses. Answer: FALSE
50) In SNMP, the ________ creates traps. A) manager B) agent C) Both A and B D) Neither A nor B Answer: B
51) In SNMP, the manager can create ________. A) traps B) GET commands C) Both A and B D) Neither A nor B Answer: B
52) In SNMP, Set commands tell the agent to change a parameter on the managed device. Answer: TRUE
53) A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard. A) command B) trap C) alarm D) All of the above Answer: B
54) In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) Neither A nor B Answer: A
55) SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above Answer: A
56) SNMPv3 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above Answer:
Related Documents: Business Data Networks and Security Essay
Network Security and Management Brandi Schoch CTU Online Introduction to Network Management IT245-1403A-09 Jennifer Gaddy August 11, 2014 Table of Contents Table of Contents 2 Identifying the Network 3 The Organization 3 Network Servers 3 Network Personnel 3 Diagramming the Network 5 Network Architecture 5 Speed and Distance 6 Access Method 6 Network Models 8 OSI Model 8 FCAPS Model 11 The Diagrams 13 Protocols and Agents 14 Protocols Used Presently 14 Security Concerns 15 Network Security 16 Viruses…
secure confidential data and defend against fraud and unauthorized transactions, such as money laundering. 2. People wanting to use their mobile devices at work has led to the practice of “bring your own device (BYOD)” 3. People wanting to use their mobile devices at work is part of a growing trend called Dual-Use Mobile Equipment. 4. Many smartphones are not being managed as secure devices, with fewer than one in five adding anti-malware and only half using data encryption. This can…
MSIT 458 Information Security and Assurance VoIP Xeon Group Rohit Bhat Ryan Hannan Alan Mui Irfan Siddiqui 1 VOIP I. What is VoIP? II. Business & Security Concerns III. Security Threats IV.Security Measures V. Cost/Risk Analysis VI.Legal Consequences 2 What is VOIP? • Protocol optimized for the transmission of voice through the Internet or other packet switched networks • Also referred to as IP telephony, Internet telephony, voice over broadband, broadband telephony…
Introduction To get a second glance from enterprise IT, sync and share solutions must include the basic business feature sets. That is security, integrations, roles and permissions, audit trails, remote wipe, comprehensive APIs, real-time administration, bandwidth controls and de-duplication. Every organization is unique with different needs, challenges and goals and requirement for enterprise sync and share lies with flexibility. We present the five must haves in enterprise-ready sync and share…
Implementation of a Computer Network Security for a Production / Manufacturing Industry. Abstract This implementation of Computer network security for a manufacturing company is challenge in this growing competitive market. Enterprises employ hundreds of employees working in various departments at various locations through an established intranet for the organization. Many industries are in lack of Information security system which affects the business of the organization in various…
The Competitive Force Organizations develop business strategies in order to guide the company’s operations toward a competitive business in their respective industry. A business strategy is a plan that a company develops that directs the organization toward achieving their objectives. These objectives could be more customers, increase profits, or expansion in the industry. The purpose of the business strategy for organizations is to structure the business in order to establish a competitive advantage…
Network Security Dustin Riedemann Kaplan University IT286: Introduction to Network Security Prof: Denver Lee Martin August 12, 2013 Technology is an ever evolving industry and so is hacking, and people are always trying to find new ways to gain access to places that they are not suppose to be. There are different types of attacks that are categorized as access attacks, denial of service (DoS) attacks, and modification and repudiation attacks. There may be attacks that are also within these…
requires that all types of financial institutions to protect private financial information. Protecting Private Data - The process of ensuring data confidentiality. Standard - A detailed written definition for hardware and software and how it is to be used. Data Classification Standards - Four Major Categories: • Private data • Confidential • Internal use only • Public domain data White-hat hackers - Ethical hacking...Intending to be helpful. Vulnerabilities and Threats - any weakness in a…
Purpose - This policy defines the security configurations users and Information Technology (IT) administrators are required to implement in order to ensure the integrity, availability, and confidentially of the network environment of Richmond Investments(R.I). It serves as the central policy document with which all employees and contractors must be familiar, and defines regulations that all users must follow. The policy provides IT managers within R.I. with policies and guidelines concerning the…
LAN Topology Design and Cabling Specifications for ABC Widgets Network Design Computer Networking, IT230 February 28, 2010 Executive Summary The network design will be star topologies for all locations. Windows servers are located at one location in Pennsylvania, additional Windows servers are located in SLC and Europe. Connections between sites are utilized with Remote Desktop directly to various servers. VPN remote access servers will support the company Sales Department and internal employee’s…