Preview

Unit 7 Lab

Satisfactory Essays
Open Document
Open Document
192 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Lab
Michael Sherman
Unit 7 Lab Q&A

1. Define subnetting. Subnetting groups devices into a contiguous range of IP addresses
2. Define supernetting. Supernetting is a way to aggregate multiple IP addresses in the same class
3. Define network resiliency Maintaining acceptable levels of service even with faults and operational challenges
4. How is VRRP utilized to ensure network redundancy? Increases availability of routing paths via automatic default gateway selections
5. Name 3 dynamic routing protocols that can be used to distribute routing information RIP, EIGRP, OSPF
6. What is meant by the term CIDR? Classless Inter-Domain Routing, same as supernetting
7. What protocol can be used to eliminate loops in the network? Spanning Tree Protocol (STP)
8. What is the function of GVRP? Allows for the control of VLANS defined in IEEE 802.1Q
9. What is the function of the LACP? Port trunks perform the same functions as static trunks
10. What does RIP stand for and what is its function? Routing Information Protocol, prevents routing loops by limiting hops from source to destination
11. What is the command to enable RIP on a CISCO router and what mode must be enabled to execute the command? Router(config)# router rip Router(config-router)# network ip-address

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 2130 Lab

    • 191 Words
    • 1 Page

    1. An amino acid consists of a carbon atom attached to a hydrogen atom, an amine group, a side group, and a _____________ group.…

    • 191 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Unit 1 Lab 3

    • 82 Words
    • 1 Page

    f. ping –c3 IP where IP is the IP address of a remote system such as the router…

    • 82 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 4

    • 920 Words
    • 4 Pages

    3. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco switch:…

    • 920 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    1. ZenMap GUI sends out broadcasts for server queries for various different types of operating systems in servers (OS). By examining how various hosts respond to certain queries, ZenMap GUI can distinguish what kind of OS and server exists.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    10. PGP uses the RSA algorithm and the IDEA encryption algorithm. The PGP is considered to have Windows interface which is more polished. GPG stands for Gnu Privacy Guard it does not use the IDEA encryption algorithm.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 8 Labs

    • 1237 Words
    • 6 Pages

    Would the IP address in Figure 8-1 be valid as a class C address? Why or why not?…

    • 1237 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 3 Lab

    • 290 Words
    • 2 Pages

    TCP – This protocol is what is used to break data down into manageable pieces and package them to send out to the proper address.…

    • 290 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NETW 204 week 3 iLab

    • 991 Words
    • 6 Pages

    In this lab, I learned abbreviated system commands for enabling configurations and showing IP routing. I also learned how to initially configure a RIP to a…

    • 991 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Unit 1 Lab 1

    • 255 Words
    • 1 Page

    Where do maggots come from? Are they a self-born, spontaneous generation or are they mothered by something or someone? I actually asked myself that question numerous times while finding maggots on few things myself. I also wonder the same about fruit flies. Seems like as soon as I buy fruits, fruit flies fill my house almost the same day while all windows and doors closed. This experiment of maggots was quiet fun and put my personal hypothesis to rest.…

    • 255 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 567 Words
    • 3 Pages

    Attacker would avoid detection by covering tracks step of the hacking process where they cover up their tracks in the system they hacked into.…

    • 567 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Lab 7

    • 928 Words
    • 3 Pages

    1. What are some common risks, threats, and vulnerabilities commonly found in the LAN-to-WAN Domain that must be mitigated through a layered security strategy?…

    • 928 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The RIP protocol is a dynamic, distance-vector routing protocol used in local and wide area networks. This is an implementation of single routing metric (hop count) which measures the best route distance between the source and a destination network RIP. RIP is an interior gateway protocol (IGP) which means that it performs routing within a single autonomous system (AS).…

    • 1294 Words
    • 6 Pages
    Better Essays

Related Topics