Configure the network as follows:
1) Configure Host Names
2) Shut down unused interfaces.
3) Configure enable password and vty passwords of cisco
4) Use VTP mode transparent and domain ccna
5) Add VLANS 10,20,30,100 to the VLAN database
6) Configure ports between switches as trunks
7) Configure access ports on links to PCs
1. If Satellite with a radius of 5.3m transmitted a message at the frequency of 1.3 MHz to
earth station. Determine:
The wavelength, and time, in hour of the transmission
The centrifugal force of the satellite
The attenuation of the transmission
2. The wavelength of a signal transmitted at 1000MS-1 is 700M. Determine the period of
the transmission
3. Analyze the conditions that can lead to satellite path diversity
4. Explain handoff and discuss three types of satellite handoff
The wavelength of a signal transmitted at 1000MS-1 is 700M. Determine the period of the transmission
Assignment 1
1. If Satellite with a radius of 5.3m transmitted a message at the frequency of 1.3 MHz to
earth station. Determine;
i. The wavelength, and time, in hour of the transmission
ii. The centrifugal force of the satellite
iii. The attenuation of the transmission
2. The wavelength of a signal transmitted at 1000MS-1 is 700M. Determine the period of
the transmission
3. Analyze the conditions that can lead to satellite path diversity
4. Explain handoff and discuss three types of satellite handoff
Which one of the following is a password-attack ?
a. Blue-force-attack
b. Brute-force-attack
c. Bright-force-attack
d. Blu-force-attack
Which one of the following is a feature (in the video shown in class) belonging to phishing attack?
a. Outpersonating
b. Inpersonating
c. Forpersonating
d. Impersonating
Which one of the following is one of the 3-step-communication in networking ?
a. tcp-Syn
b. tcp-Seen
c. tcp-Sink
d. tcp-Sing
. Which one of the following is a famous cyber security attack type?
a. Man-in-the-head-attack
b. Man-in-the-middle-attack
c. Man-in-the-front-attack
d. Man-in-the-tail-attack
How many valid host addresses are available on an IPv4 subnet that is configured with a /25 mask?
a. 254
b. 126
c. 62
d. 30
. Which of the following is correct as part of DDos-attack (shown in class) ?
a. netsox 76 -i 10.0.2.6 -p 23 -s raw
b. netfox 76 -i 10.0.2.6 -p 23 -s raw
c. netwox 76 -i 10.0.2.6 -p 23 -s raw
d. netvox 76 -i 10.0.2.6 -p 23 -s raw