Consider the following network> Answer the questions about static, floating static, host, and default routes. a)...
Fantastic news! We've Found the answer you've been seeking!
Question:
Transcribed Image Text:
Consider the following network> Answer the questions about static, floating static, host, and default routes. a) b) c) PC1 * 172.16.1.0/24 172.16.2.0/24 172.16.3.0/24 SODO GO/O GOD 1 50/0/0 50/0/1 DCE R.1 SON01 Soon DCE 192.168.1.0/24 1 10.10.10.0/24 SOOM 1 SO/0/0 SOOD R3 G0/0 t 192.168.2.0/24 PC3 What command would be used to create a static route in the R1 routing table to reach subnet 192.168.2.0/24 through R3? See slide 32 in 8Routing. What command would be used to create a floating static route at R1 to reach subnet 192.168.2.0/24 through R2? See slide 45 in 8Routing. What command would be used to create a host route in the R1 routing table to reach PC2 (172.16.1.10)? See slide 59 in 8Routing. d) Suppose R4 is added and has an IP address of 172.16.1.2. Suppose R4 connects to an ISP and provides Internet access for all PCs. i) What command would be used to create a default route in the R3 routing table to reach R4? See slide 38 in 8Routing. ii) What would be the default gateway entry in the PC3 routing table to reach R4? See slide 6 in 7HSRP. 2. (2 points) Name one advantage to using the PPP protocol on links between routers as compared with the HDLC protocol. See slide 67 in 8Routing. 3. (3 points) What is the difference between a Basic Service Set (BSS) and an Extended Service Set (ESS)? See slides and 21 in 9Wireless LANs. 4. (3 points) What is the difference between an Autonomous Access Point (AP) and a Controller-Based Access Point? See slide 18 in 9Wireless LANs. 5. (3 points) Before a wireless device can send data packets through an Access Point, it must first associate and authenticate itself to that Access Point. Describe one authentication method used by wireless devices to gain permission to use Wi-Fi LANS. See slides 63-65 in 9Wireless LANS 6. (3 points) My laptop wants to transmit a packet on a Wi-Fi LAN. It has just sent a Request-To-Send (RTS) message to the AP, but now there has been no response from the AP and my laptop has timed out. What will my laptop do next to try to send its packet out, based on the CSMA/CA protocol? See slide 36 in 9Wireless LANs 7. (12 points) Show the content of MAC address fields at points A, B, C, and D. If an address field is not used, show N/A. Note that points B and C are over Ethernet and only the DA and SA fields are used. See slides 48-50 in 9Wireless LANS A4 A1 / DA A2 / SA A3 A TI sender 11-22-33-01-01-01 A 99-88-77-05-05-05 WAP 00-00-00-00-00-00 B 33-44-55-33-44-55 B C 99-88-77-06-06-06 WAP C D receiver 11-22-33-02-02-02 D 8. (3 points) By default, passwords are displayed unencrypted when a 'show running- config' command is executed. What IOS command will cause passwords in the running- configuration file to be encrypted? See slide 13 in 10Security. 9. (3 points) What IOS command would you type on a router to enforce a requirement that all router passwords must be at least 9 characters long? See slide 10 in 10Security. 10. John's PC and Sue's PC are on the same subnet. a) (4 points) Describe how John executes a MAC Table Overflow Attack that allows him to view all packets destined to Sue's PC. See slide 24 in 10Security. b) (4 points) You determine John's PC is attached to port Fa0/4 of switch S2. What Cisco configuration should be entered on switch S2 CLI to prevent this attack from succeeding in the future? See slides 25-37 in 10Security. Consider the following network> Answer the questions about static, floating static, host, and default routes. a) b) c) PC1 * 172.16.1.0/24 172.16.2.0/24 172.16.3.0/24 SODO GO/O GOD 1 50/0/0 50/0/1 DCE R.1 SON01 Soon DCE 192.168.1.0/24 1 10.10.10.0/24 SOOM 1 SO/0/0 SOOD R3 G0/0 t 192.168.2.0/24 PC3 What command would be used to create a static route in the R1 routing table to reach subnet 192.168.2.0/24 through R3? See slide 32 in 8Routing. What command would be used to create a floating static route at R1 to reach subnet 192.168.2.0/24 through R2? See slide 45 in 8Routing. What command would be used to create a host route in the R1 routing table to reach PC2 (172.16.1.10)? See slide 59 in 8Routing. d) Suppose R4 is added and has an IP address of 172.16.1.2. Suppose R4 connects to an ISP and provides Internet access for all PCs. i) What command would be used to create a default route in the R3 routing table to reach R4? See slide 38 in 8Routing. ii) What would be the default gateway entry in the PC3 routing table to reach R4? See slide 6 in 7HSRP. 2. (2 points) Name one advantage to using the PPP protocol on links between routers as compared with the HDLC protocol. See slide 67 in 8Routing. 3. (3 points) What is the difference between a Basic Service Set (BSS) and an Extended Service Set (ESS)? See slides and 21 in 9Wireless LANs. 4. (3 points) What is the difference between an Autonomous Access Point (AP) and a Controller-Based Access Point? See slide 18 in 9Wireless LANs. 5. (3 points) Before a wireless device can send data packets through an Access Point, it must first associate and authenticate itself to that Access Point. Describe one authentication method used by wireless devices to gain permission to use Wi-Fi LANS. See slides 63-65 in 9Wireless LANS 6. (3 points) My laptop wants to transmit a packet on a Wi-Fi LAN. It has just sent a Request-To-Send (RTS) message to the AP, but now there has been no response from the AP and my laptop has timed out. What will my laptop do next to try to send its packet out, based on the CSMA/CA protocol? See slide 36 in 9Wireless LANs 7. (12 points) Show the content of MAC address fields at points A, B, C, and D. If an address field is not used, show N/A. Note that points B and C are over Ethernet and only the DA and SA fields are used. See slides 48-50 in 9Wireless LANS A4 A1 / DA A2 / SA A3 A TI sender 11-22-33-01-01-01 A 99-88-77-05-05-05 WAP 00-00-00-00-00-00 B 33-44-55-33-44-55 B C 99-88-77-06-06-06 WAP C D receiver 11-22-33-02-02-02 D 8. (3 points) By default, passwords are displayed unencrypted when a 'show running- config' command is executed. What IOS command will cause passwords in the running- configuration file to be encrypted? See slide 13 in 10Security. 9. (3 points) What IOS command would you type on a router to enforce a requirement that all router passwords must be at least 9 characters long? See slide 10 in 10Security. 10. John's PC and Sue's PC are on the same subnet. a) (4 points) Describe how John executes a MAC Table Overflow Attack that allows him to view all packets destined to Sue's PC. See slide 24 in 10Security. b) (4 points) You determine John's PC is attached to port Fa0/4 of switch S2. What Cisco configuration should be entered on switch S2 CLI to prevent this attack from succeeding in the future? See slides 25-37 in 10Security.
Expert Answer:
Related Book For
Computer Networking A Top-Down Approach
ISBN: 978-0133594140
7th edition
Authors: James Kurose, Keith Ross
Posted Date:
Students also viewed these computer network questions
-
IN DETAILED - Pseudo code for findLCS() appears after the pseudo code for cutRod(). int cutRod( int [] p ) Initialize. Set n to the length of the prices array p. Allocate space for an array r from 0...
-
Managing Scope Changes Case Study Scope changes on a project can occur regardless of how well the project is planned or executed. Scope changes can be the result of something that was omitted during...
-
Angela Monterey has a five-year car loan for a Jeep Wrangler at an annual interest rate of 6.7% and a monthly payment of $609.50. After 3 years, Angela decides to buy a new car. What is Angela's loan...
-
Ina recent year, a bank earned $37 million in interest on its assets of $462 million, it paid out $23 million in interest on its liabilities (excluding capital) of $416 million, and it paid its...
-
A mixture of 75 mole% propane and 25 mole% hydrogen is burned with 25% excess air. Fractional conversions of 90% of the propane and 85% of the hydrogen are achieved: of the propane that reacts. 95%...
-
Shoppers Departmental Stores Ltd. furnishes the following details of purchase, sale etc. of its garments section for the year 200506. Determine the value of inventory of the garments section as on...
-
Identify the four reasons for project termination.
-
FAC3704/102 QUESTION 12 (30 marks)(36 minutes) Dexter Ltd holds 25 000 ordinary shares in Debra Ltd The shares were acquired on 1 February 20.8 for R120 000 when the retained earnings of Debra Ltd...
-
The Kirkpatrick Model is Standard for Levering and Validating Talent investments. This four step system of training workers has been around for a very long time. The four steps are It has been proven...
-
Barriers to Entering Global Markets Most services are inseparable and require production and consumption to occur almost simultaneously; thus, exporting is not a viable entry method for them....
-
The Timeframe Log is a log of how long it would take you to conductand write up the proposed study if you were actually going to carry itout ( bullet points are OK to use here ) . You may wish to...
-
Sin taxes are usually state-imposed taxes on products that are considered unhealthy, not necessary for basic needs, or morally questionable. In many cases, these taxes are an incentive to lower...
-
The Priority Queue Class You will use a priority queue of patients to determine the order that patients are seen by the doctor. Before writing the code to simulate the emergency room, you should...
-
When we ask the question "Why Does College Cost So Much? we really mean (choose the one best answer): Why is it so expensive to operate a college? Why does tuition keep Increasing every year? Why is...
-
The constant Ao value is equal to * 0.01 maximum power density (in watts per square meter) at a distance of 4Km is equal to 25x10^-8 Max. directivity of the antenna is * 0.06 The total antenna...
-
For the following exercises, find the inverse of the function and graph both the function and its inverse. f(x) = 4 x 2 , x 0
-
In the discussion of TCP splitting in the sidebar in Section 3.7, it was claimed that the response time with TCP splitting is approximately 4 RTT FE RTT BE + processing time, Justify this claim.
-
Consider sending a packet from a source host to a destination host over a fixed route. List the delay components in the end-to-end delay. Which of these delays are constant and which are variable?
-
Consider the GBN protocol with a sender window size of 4 and a sequence number range of 1,024. Suppose that at time , the next in-order packet that the receiver is expecting has a sequence number of...
-
Continuing to focus on evidence associated with the act, concealment, and conversion, use the evidentiary material to continue the examination. In addition, the examiner also starts to think of terms...
-
Consider the following cash flow profile and assume MARR is 10 percent/year. a. Determine the ERR for this project. b. Is this project economically attractive? EOY 0 2 3 4 5 6 NCF -$100 $15 $15 $15...
-
Quilts R Us (QRU) is considering investing in a new patterning attachment with the cash flow profile shown in the table below. QRU's MARR is 13.5 percent/year. a. What is this investment's external...
Study smarter with the SolutionInn App