Yahoo Answers is shutting down on May 4th, 2021 (Eastern Time) and beginning April 20th, 2021 (Eastern Time) the Yahoo Answers website will be in read-only mode. There will be no changes to other Yahoo properties or services, or your Yahoo account. You can find more information about the Yahoo Answers shutdown and how to download your data on this help page.

Lv 43,003 points

Rey 619

Favorite Answers4%
Answers1,459
  • Network Questions help Please.?

    access-list 100 permit tcp any any eq 80 time-range MWF

    access-list 100 permit tcp any any eq 23 time-range ABS

    time-range MWF

    periodic Monday Wednesday Friday 8:00 to 17:00

    time-range

    absolute start 00:00 30 Sept 2012 end 01:00 30 Sept 2012

    int f0/0

    ip access-group 100 in

    1. Given the commands shown above and assuming F0/0 is the inside interface of the network, explain what this ACL does.

    2. Type in the two global configuration mode commands that are required to enable SSH on a Cisco router. (Note that this does not include line vty commands.)

    1 AnswerComputer Networking8 years ago
  • Network Questions help Please.?

    1. Which term correctly matches the following definition, as stated in the course textbook?

    The protocol determines such variables as network login and authentication and whether the session will be half duplex, meaning information flows in one direction at a time, or full duplex, meaning information can flow in both directions simultaneously.

    a. Synchronizing

    b. Addressing

    c. Setting session variables

    d. Routing

    2. Which term correctly matches the following definition, as stated in the course textbook?

    The protocol segments a continuous data stream from the source into frames, cells, or packets as appropriate.

    a. Data formatting

    b. Routing

    c. Addressing

    d. Data segmenting and reassembly

    3. An ethernet is otherwise known as which of the following?

    a. ITU, 805.1

    b. FCC, 197.0

    c. DTE. 102.3

    d. IEEE 802.3

    4. A promising method of providing fiber to the home (FTTH) is the _____. This technique places all the active equipment in the central office. A passive signal is brought to the residence, either directly to the home or to the curbside. The same fiber could be connected to several residences, with the signals to and from the different premises multiplexed by TDMA. A _____ uses passive splitters to break the capacity of the backbone fiber into multiple wavelengths. A _____ requires no power, which makes it practical for bringing fiber to the curb.

    a. wavelength division multiplexing (WDM)

    b. plain old telephone service (POTS)

    c. passive optical network (PON)

    d. time division multiplexing (TDM)

    5. The two choices for light sources for fiber optic systems are _____.

    a. LCD and LED

    b. LCD and laser

    c. laser and LED

    d. LCD and LTD

    6. Which of the following does not define LDAP?

    a. A protocol for accessing directory information

    b. A flat directory structure to store data

    c. A model defining the format and character of the information

    d. A namespace defining how information is referenced and organized

    1 AnswerComputer Networking8 years ago
  • Network Questions help Please.?

    1. Which of the following concepts is NOT involved in network security?

    a. Policies

    b. Physical security

    c. Terminal security

    d. Object-oriented security

    e. Data security

    2. Which of the following is NOT a point-to-point digital circuit?

    a. T-1

    b. T-3

    c. Frame Relay

    d. E-1

    3. Which of the following is NOT a WAN application issue that data network applications can be separated into?

    a. Conversational

    b. Networking

    c. Bulk data transfer

    d. Inquiry/response

    e. Remote job entry

    4. Which one of the terms below correctly matches the following definition, as stated in the course textbook?

    Protocols check for errors, acknowledge correctly received data blocks, and send repeat requests when blocks contain an error. Sophisticated protocols can acknowledge multiple packets using one of two procedures. A selective repeat acknowledgment enables the receiving device to request the sending end to resend specific packets. In the go-back-N method, the receiver instructs the sender to resend an errored packet and all subsequent packets.

    a. Link management

    b. Communications control

    c. Error detection and correction

    d. Full duplex mode

    1 AnswerComputer Networking8 years ago
  • networking questions help.?

    1. The component of network security that ensures that data being sent or received has not been corrupted or modified in transit is ________.

    a. data integrity

    b. data confidentiality

    c. data and system availability

    d. data and user authentication

    2. The type of security control that makes use of Firewalls is _______.

    a. administrative

    b. physical

    c. technical

    d. clerical

    3 AnswersComputer Networking8 years ago
  • Mgmt of Techonology resources help?

    7. Information services (IS) generally focuses on a high level of _____ but, at the same time, they need to be _____ in order to respond to the business units’ needs.

    a. standardization, agile

    b. security, active

    c. agility, standardized

    d. technology, open

    8. Strong business/IT relationships can be built and fostered by _____.

    a. continuity planning

    b. new technology

    c. security planning

    d. informal networking practices

    9. One of the newer protocols that needs to be included in a network maintenance plan is _____

    a. IIS

    b. VOIP

    c. TCP/IP

    d. OSI

    10. All of the following are types of implementation strategies EXCEPT:

    a. Cutover

    b. Pilot

    c. Conversion

    d. Parallel

    11. There are two traditional approaches to estimating project costs:

    a. Capital and operating

    b. Run-rate and zero-based

    c. Overall and operational

    d. Top-down and bottom-up

    12. Many companies have instituted an officer level position to handle security. This position is known as the

    a. CIO

    b. CEO

    c. CFO

    d. CSO

    2 AnswersHomework Help8 years ago
  • Network Questions help Please.?

    1. Which is NOT one of the areas that reports to the CIO?

    a. Vice-president of IT

    b. Planning and finance

    c. Corporate applications

    d. Vice-president of operations

    2. Service-oriented architecture (SOA) helps companies ensure _____.

    a. small organizations will always have an advantage over large organizations

    b. operating models will be difficult to define

    c. services are directly aligned with the business view

    d. subjective beliefs about the business services in the organization

    3. Network monitoring is used to _____

    a. catch people using work computers for personal matters

    b. ensure network stability

    c. minimize technology use

    d. keep applications segregated

    4. The three main phases in the Systems Development Life Cycle (SDLC) are _____.

    a. Start, Work, End

    b. Definition, Construction, Implementation

    c. Analysis, Definition, Implementation

    d. Design, Building, Testing

    5. Incremental (Run-Rate) budgeting assumes that next year’s operations will be _____ this year’s operations.

    a. different than

    b. the same as

    c. similar to

    d. No assumptions are made.

    6. Legislation and regulations affect the information technology (IT) department _____.

    a. both directly and indirectly

    b. in no way at all

    c. Directly

    d. indirectly

    1 AnswerComputer Networking8 years ago
  • networking questions help.?

    1. (TCO 3) Select the kinds of information that are defined in an MIB module.

    a. Nodes, notifications, and object numbers

    b. Nodes, object types or variables, and object numbers

    c. Nodes, object types or variables, notifications, and object numbers

    d. Nodes, object types or variables, and notifications

    e. None of the above

    2. (TCO 4) Which is not a typical response by an agent?

    A response code

    The information that was requested

    Additional housekeeping information

    Either a response code or additional housekeeping information

    Polling frequency and results

    3. (TCO 4) Which type of alert indicates to a management system that some monitored MIB object or management variable has exceeded a certain preconfigured value?

    A syslog message alert

    A configuration change alert

    An operator activity alert

    A threshold-crossing alert

    None of the above

    4. (TCO 5) Select the two distinct types of management complexity that affect scale and must be dealt with when developing and deploying management systems.

    Runtime complexity and build complexity

    Service complexity and build complexity

    Runtime complexity and application complexity

    Application complexity and service complexity

    Either application complexity or service complexity

    5. (TCO 6) In the context of network management, a service provider can be which entity?

    Internet service provider

    Telecommunications service provider

    Enterprise IT department

    None of the above

    All of the above

    1 AnswerComputer Networking8 years ago
  • Best wireless ac routers recommended please help?

    Hi guys which one is the best wireless Ac routers that is the best?

    AMped Wireless RTA15 vs the ASUS Asus RT-AC66U 802.11ac

    http://www.ampedwireless.com/products/rt%E2%80%A6

    http://www.asus.com/Networking/RTAC66U/

    Which one is the best out of the two please .

    Please let me know thanks.

    2 AnswersComputer Networking8 years ago
  • networking questions help.?

    1. (TCO 2) Signal loss due to an object in the path causing the wave to bend is known as _____.

    diffraction

    reflection

    refraction

    defraction

    2. A 10 dB gain to a 33 mW signal results in _____.

    43 mW

    3,300 mW

    330 mW

    330 W

    3. An antenna is used to _____.

    amplify electric current

    amplify signals

    convert radio waves to electromagnetic waves

    convert between electrical current and radio waves

    4. Remote wireless bridges _____.

    are only used inside buildings

    use omnidirectional antennas to spread the transmission signals

    only operate in point-to-point mode

    transmit at a higher power level

    5. The IEEE 802.16 standard uses _____ for its access method.

    a combination of CSMA/CA and CSMA/CD

    only CSMA/CA

    a time-slot scheduling system

    only CSMA/CD

    6. Which would provide the most interference to your wireless signal?

    Human body

    Glass

    Plaster

    Wood

    7. The maximum size for a WEP-shared secret key is _____.

    40 bits

    104 bits

    16 bits

    None of the above

    8. Access point filtering usually blocks traffic at the lowest level, which is based on the type of _____.

    frame

    package

    port

    protocol

    9. In mobile IP, the _____ uses a subnet map to keep track of the home agent information for all visiting client devices.

    router

    authoritative access point (AAP)

    Layer 3 switch

    None of the above

    10. The following factors can affect system throughput in the wireless segment except for _____.

    types of RF interference

    access point processor speed

    packet size

    All affect system throughput.

    11. After the security flaws in WEP were publicized, the IEEE TGi task group released a new proposed implementation known as which?

    WPA

    AES

    TKIP

    WEP2

    12. Which is not a location in which businesses install wireless networks for increased employee productivity?

    Remote parking lots

    Lunchrooms

    Common areas

    Lobbies

    13. IrDA devices connect to which type of network?

    WWAN

    WLAN

    WPAN

    WCAN

    14. _____ is a group of wireless devices that is served by a single access point (AP).

    Basic service set

    Ad hoc mode

    Extended service set

    None of the above

    2 AnswersComputer Networking8 years ago
  • networking questions help.?

    1. (TCO 7) Which is a traffic indication map (TIM)?

    A list of the stations that have buffered unicast frames waiting at the AP

    The route that frames take when transmitted from the AP to a station

    The congestion that results from too many stations in a micro cell

    A grid on a mesh network that lists all of the WLCs

    2. 3. (TCO 7) A set of hardware and/or software that can be used to provide unified management of a wireless network is called

    configuration manager.

    unified software system (USS).

    wireless LAN controller (WLC).

    wireless network management system (WNMS).

    3. (TCO 8) Which authentication method is a match of SSIDs?

    Closed system authentication

    Shared key authentication

    Open system authentication

    SSID matching authentication

    4. 6. (TCO 8) Each of the following is a reason why it is difficult to defend against today's attackers, except

    complexity of attack tools.

    a weak patch distribution.

    greater sophistication of attacks.

    delays in patching hardware and software tools.

    5. 7. (TCO 7) Each of the following should be considered when performing an outdoor site survey, except

    height and material of the buildings, light poles, or other structures that are to host an AP.

    availability of power at buildings, light poles, or outbuilding to power the Aps.

    trees, foliage, hills, or other obstacles.

    time of day.

    6. 8. (TCO 7) If all APs were set to the same channel number, the result would be

    adjacent channel interference.

    cochannel interference.

    RF overlap interference.

    channel bonding interference.

    7. 9. (TCO 8) Which of the following is not an extensible authentication protocol (EAP) used in IEEE 802.11X?

    SSL/TLS

    EAP-TLS

    PEAPv0/EAP-MSCHAPv2

    EAP-FAST

    8. 10. (TCO 8) In a RADIUS authentication with a wireless device in an IEEE 802.11X network, the AP serves as the

    supplicant.

    authenticator.

    validation server.

    database verifier (DV).

    1 AnswerComputer Networking8 years ago
  • networking questions help.?

    1. A wireless workgroup bridge is used to connect

    a. a wired network segment with a wireless network segment.

    b. a wireless network segment with another wireless network segment.

    c. a gateway and a bridge.

    d. a router and a switch.

    2. A(n) _____ provides encryption and authentication services for a wireless network and resides between the wireless network and the wired network to serve as the entry point to the wired network.

    a. remote authentication server

    b. access point

    c. mesh hub router

    d. enterprise encryption gateway (EEG)

    3. Which of the following statements is false concerning IEEE 802.11ac?

    a. It operates in both the 5 GHz and the 2.4 GHz bands.

    b. Error correction coding is improved.

    c. It enables the simultaneous transmission of different data rates to different clients.

    d. Beamforming is a standard feature.

    4. Which of the following is not true regarding long-term evolution (LTE)?

    a. It was chosen over WiMAX by carriers because it supported the dominant mobile standard worldwide.

    b. LTE uses OFDM.

    c. Peak download speed can exceed 10 Gbps.

    d. MIMO is utilized by LTE.

    5. _____ transmits a secondary copy along with the primary information to account for errors.

    a. Forward Error Correction (FEC)

    b. Multiplexing

    c. Bandwidth diversity

    d. DSSS framing

    6. All of the possible combinations of different factors for 802.11n transmissions are contained in the

    a. UNII procedure manual.

    b. Wi-Fi table.

    c. IEEE 802.11n Resource Guide.

    d. Modulation and Coding Scheme (MCS).

    7. The hybrid coordination function (HCF) allows for different types of wireless traffic to be given different levels of

    a. speed.

    b. priority.

    c. frame size.

    d. back-off procedures.

    8. What happens if a probe request frame contains a null frame?

    a. All APs will respond.

    b. No APs will respond.

    c. Only APs with a null SSID will respond.

    d. An error message is generated and sent to the APN.

    1 AnswerComputer Networking8 years ago
  • networking questions help.?

    1. Each of the following is a good location for installing an AP except

    on a ceiling.

    high on a wall.

    in a plenum without a special enclosure.

    on a pole.

    2. The orientation of radio waves as they leave an antenna is called

    polarization.

    phase.

    orientation.

    radiation form.

    3. _____ is the power radiated out by the wireless system and includes any antenna gain.

    Antenna power source (APS)

    Radiation power (RP)

    Equivalent isotropically radiated power (EIRP)

    Dipole equivalent isotropic radiator (DEIR)

    4. Each of the following is an advantage of standards except

    interoperability.

    protection.

    more competition.

    increased costs.

    2 AnswersComputer Networking8 years ago
  • Math Alegrabra help please?

    Eight Less than the product of eleven and a number is negative nineteen find the number.

    6 AnswersMathematics8 years ago
  • Microsoft Project 2013 Help.?

    I need some help in printing the reports. I am new to using Project. Can someone pls let me know how to print these reports.

    1. A printout of your Task Table: Entry showing all columns, but no Gantt chart. (Format to print on 1 page)

    2. A printout of your Task Table: Cost showing all columns but no Gantt chart. (Make sure to widen Task Name column so the entire column can be read).

    3. The project Summary Report.

    4. Your project's Budget Report. (Print on one page)

    5. Your project's Who Does What report.

    6. Your project's Overallocated Resources report. (You should have overallocated resources. If not, make sure your assignments are correct and all your resources are 100% default, with the exception of the Systems Administrator)

    2 AnswersSoftware8 years ago
  • University Questions Information Security.?

    I need some help in choosing the best University. I am currently done my Bachelors degree in Network Communications Mgmt at Devry in Canada.. I want to do Master in Information Security in the US.

    Is it good program to do Master? How about employment rate. Can anyone recommend a good university.

    Pls any suggestion.

  • USA job / student visa question.?

    I have a question regarding student visa.

    I am a Canadian citizen and would like to study in USA for a shot time. If I study in US will they give me a green card so that I can search for a job while I am studying or will they give me student visa.

    What way is better to get into the us to work.

    2 AnswersEmbassies & Consulates8 years ago
  • Energy and Insulation help.?

    1. does insulation work to keep houses cool in hot weather? If so, how? How else, besides insulation, can one keep the inside of a house comfortable?

    2. nuclear energy is caused by fusion. Is there energy lost in this process and if so, where does it go?

    2 AnswersGreen Living9 years ago
  • English Essay Help question.?

    You are head of the program committee for the local chapter of a professional society (DPMA, IEEE, APICS, or similar body). Your committee brings in guest speakers and creates other interesting and informative programs once a month for chapter members. Several months ago, the committee scheduled Leonard J. Bruce III, president of Medusa Computers, to make a two-part presentation on "Entrepreneurship in the Computer Industry."

    Mr. Bruce's first speech last week was a disaster. He apparently had not prepared for the occasion and didn't seem to know exactly whom he was addressing. His topic had some potential, but the delivery was so disorganized that the audience became restless. Many of his comments were off-topic, touching on everything from his favorite Star Trek episode to his golf game. One of his jokes was flagrantly tasteless.

    During the coffee hour following the presentation, you overheard a member say, "I'm not sure I want to attend next month's event." You also heard comments about the inappropriateness of the speaker's jokes. Although your first instinct is to cancel the second presentation, you realize that Mr. Bruce has already been paid a fee of $1,500 for two presentations and that his company is a major purchaser of products sold by the company for which you work. If your boss were to hear that you "fired" Mr. Bruce, things could get difficult for you at the office.

    Directions

    You discuss the problem with the chapter president, Allan Agrawal, who is sympathetic. He suggests three possible options for addressing the issue: you can fire Mr. Bruce, you can do nothing and let Mr. Bruce continue, or you can coach Mr. Bruce before the next speech. Decide on a course of action and write a memo in which you communicate your decision to Mr. Agrawal and the chapter’s Executive Committee. The secondary audience for your memo is your boss, Florence Milano, President of Data Solutions, Inc.

    2 AnswersHomework Help9 years ago
  • Management Question help?

    1. do you think that change allows you to learn new skills that will help move you forward?

    2. what about the people that refuse to change? How can you handle them?

    1 AnswerCorporations9 years ago
  • Loan Scam problem help.?

    I need some help with this problem. About two weeks backs I gave someone a loan for $ 1500 + $ 300 ( interest ) they promised me that they will pay $ 225 weekly 8 payments but until now they have not yet paid me two weeks of payment. It was a wrritten agreement so I have their info such as personal like sin no, drivers no, home address, etc. Can the police help me out or please give me helpful info on how to get my money back.

    2 AnswersCredit9 years ago