Question: Note: This is ITCSM 332 class. This is the full problem and needs definition and explaination of each question. Starting from Layer 4, what are
Note: This is ITCSM 332 class. This is the full problem and needs definition and explaination of each question.
Starting from Layer 4, what are the PDUs in each layer called as they undergo encapsulation? What is the command used to establish a static route on a router? How do you do this? What command is used to configure ip address on an interface? Which Administrative Distance is the most reliable and which is the least reliable? What are the types of routes set up on a router? What are IGPs and EGPs used for?
When does a frame change? What type of routing protocols are known to route by rumor What is an autonomous system and what makes it important? What do you understand by static and dynamic routing? And when would you want to use each of them? What is convergence? Why do network admins care about it? What are some ways routing loops can be reduced in distance vector routing? What do you understand by pinhole congestion?
What is the difference between Telnet and SSH? How many usable IP addresses are in each of a /30, /29, /28, and /27 subnet masks? What are the commands for setting up static routing and dynamic routing? Why would you use EIGRP over RIPv2?
What are the topologies in frame relay network addressing? What are some of the advantages of VLANs In what device do you set up VLANs How do switches treat frames with unknown mac addresses? What are some of the types or descriptions of access list? How do you set up frame relay? What commands do you use? What are some benefits of access lists
Why would you use an extended access-list over standard access-list? What are access ports and trunk ports used for? What are the commands for creating an access-list? What are some of the differences between a router and a switch (including physical)? Does dynamic routing consume of bandwidth? What are some of the VLAN trunking protocols? What are some of the types of WANs?
Consider this extended access-list: access-list 111 deny tcp 120.10.10.0 0.0.0.255 host 189.160.10.52 eq ftp Explain what will happen to traffic based on this.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
