Computer Networks Answers

Questions: 1 204

Answers by our Experts: 1 122

Need a fast expert's response?

Submit order

and get a quick answer at the best price

for any assignment or question with DETAILED EXPLANATIONS!

Search & Filtering

Configure the network as follows:


1) Configure Host Names


2) Shut down unused interfaces.


3) Configure enable password and vty passwords of cisco


4) Use VTP mode transparent and domain ccna


5) Add VLANS 10,20,30,100 to the VLAN database


6) Configure ports between switches as trunks


7) Configure access ports on links to PCs



1. If Satellite with a radius of 5.3m transmitted a message at the frequency of 1.3 MHz to

earth station. Determine:

The wavelength, and time, in hour of the transmission

The centrifugal force of the satellite

The attenuation of the transmission

2. The wavelength of a signal transmitted at 1000MS-1 is 700M. Determine the period of

the transmission

3. Analyze the conditions that can lead to satellite path diversity

4. Explain handoff and discuss three types of satellite handoff


The wavelength of a signal transmitted at 1000MS-1 is 700M. Determine the period of the transmission


Assignment 1

1. If Satellite with a radius of 5.3m transmitted a message at the frequency of 1.3 MHz to

earth station. Determine;

i. The wavelength, and time, in hour of the transmission

ii. The centrifugal force of the satellite

iii. The attenuation of the transmission

2. The wavelength of a signal transmitted at 1000MS-1 is 700M. Determine the period of

the transmission

3. Analyze the conditions that can lead to satellite path diversity

4. Explain handoff and discuss three types of satellite handoff



Which one of the following is a password-attack ?

a. Blue-force-attack

b. Brute-force-attack

c. Bright-force-attack

d. Blu-force-attack


Which one of the following is a feature (in the video shown in class) belonging to phishing attack?

a. Outpersonating

b. Inpersonating

c. Forpersonating

d. Impersonating


Which one of the following is one of the 3-step-communication in networking ?

a. tcp-Syn

b. tcp-Seen

c. tcp-Sink

d. tcp-Sing


. Which one of the following is a famous cyber security attack type?

a. Man-in-the-head-attack

b. Man-in-the-middle-attack

c. Man-in-the-front-attack

d. Man-in-the-tail-attack


 How many valid host addresses are available on an IPv4 subnet that is configured with a /25 mask?

a. 254

b. 126

c. 62

d. 30 


. Which of the following is correct as part of DDos-attack (shown in class) ?

a. netsox 76 -i 10.0.2.6 -p 23 -s raw

b. netfox 76 -i 10.0.2.6 -p 23 -s raw

c. netwox 76 -i 10.0.2.6 -p 23 -s raw

d. netvox 76 -i 10.0.2.6 -p 23 -s raw


LATEST TUTORIALS
New on Blog
APPROVED BY CLIENTS