How JustAnswer Works:

  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.

Ask Steve Herrod Your Own Question

Steve Herrod
Steve Herrod, Masters Degree
Category: Homework
Satisfied Customers: 3290
Experience:  BA (Hons) & MA Qualifications
65126503
Type Your Homework Question Here...
Steve Herrod is online now
A new question is answered every 9 seconds

Select the application protocol typically not used by end users;

This answer was rated:

Select the application protocol typically not used by end users; instead, the network management software and actual networking devices use it to allow a network engineer to monitor and troubleshoot network problems
SMTP
SNMP
STP
MANAGE

_____ allow(s) you to segment the traffic on a switch into separate subnetworks
qos
REDUNANCY
SCALABILITY
VLANS

Which of the following illustrates properly designed hierarchical networks that achieve near-wire speed among all devices? (Points : 5)
Collapsed core
Convergence
The core layer
Performance


6. (TCO 2) Startup configuration is stored in ________. (Points : 5)
ROM
PRAM
NVRAM
Flash


7. (TCO 2) _____ is the term used for a frame that is sent to a specific group of devices or clients. (Points : 5)
Half-duplex communication
Latency
Microsegment
Multicast transmission


8. (TCO 2) A type of checksum used to detect errors in a transmitted frame is known as a _____. (Points : 5)
CSMA/CD
cyclical redundancy check
destination MAC address
full-duplex communication


9. (TCO 2) The time that it takes to place a frame on the wire (or read a frame off of the wire) is known as a _____. (Points : 5)
NIC delay
propagation delay
source MAC address
switch fabric


10. (TCO 2) A _____ is a frame that is sent from one host and addressed to one specific destination. (Points : 5)
source MAC address
switch fabric
throughput
unicast transmission


11. (TCO 3) VLAN allows a network administrator to create groups of logically networked devices except for which of the following? (Points : 5)
Functions
Departments
Project teams
Running configuration


12. (TCO 3) Using which of the following commands would create an 802.1Q link? (Points : 5)
Switch(vlan)# XXXXX trunk
Switch(config)# XXXXX access mode trunk
Switch(config-if)# XXXXX mode trunk
Switch(config)# XXXXX access mode 1


13. (TCO 3) Which of the following is a requirement for VoIP traffic? (Points : 5)
Assured bandwidth to ensure voice quality
Transmission priority over other types of network traffic
Ability to be routed around congested areas on the network
All of the above


14. (TCO 3) Which would not be one of the characteristics of a typical VLAN? (Points : 5)
VLANs logically divide a switch into multiple, independent switches at Layer 2.
Trunk links can carry traffic for multiple VLANs.
VLAN implementation significantly increases traffic due to added trunking information.
A VLAN can span multiple switches.


15. (TCO 3) Which of the following disables trunk mode? (Points : 5)
Switchport mode trunk
Switchport mode dynamic desirable
Switchport nonegotiate
Switchport mode access

Steve Herrod :

Hi, I'll be happy to help with these

Steve Herrod :

can you upload them in a document form?

Customer:

I do not how ..I only have an hr to answer

Customer:

sorry..do no how

Steve Herrod :

ok - let me see if I can get them into an easy form

Customer:

ok.. I did it. how do I get it to you?

Steve Herrod :

if you go to wikisend.com

Steve Herrod :

choose upload

Steve Herrod :

and attach the file

Steve Herrod :

it will give you a link I can use to download it

Customer:

cannot access that site from my work computer

Steve Herrod :

ok no problem

Steve Herrod :

can you just confirm questions 1 to 5 for me?

Steve Herrod :

have done several of the others already

Steve Herrod :

have finished but can't make out the first 5 questions

Customer:

 



(TCO 2) Select the application
protocol typically not used by end users; instead, the network management
software and actual networking devices use it to allow a network engineer to
monitor and troubleshoot network problems.
(Points : 5)

SMTP

SNMP

STP

MANAGE

Customer:

 



(TCO 1) _____ allow(s) you to
segment the traffic on a switch into separate subnetworks.
(Points : 5)

Quality of Service
(QoS)


Redundancy

Scalability

VLANs

Customer:

 



(TCO 1) _____ will determine the
design requirements for a network.
(Points : 5)

Business
goals


Personal
preference


Location

None of the
above

Customer:

(TCO 1) Which of the
following illustrates properly designed hierarchical networks that achieve
near-wire speed among all devices?
(Points : 5)

Collapsed
core


Convergence

The core
layer


Performance

Steve Herrod :

ok - that is the first 4 questions

Steve Herrod :

what is number 5?

Steve Herrod :

have answered rest

Steve Herrod :

These are the answers so far

Customer:

not able to open

Customer:

(TCO 2) Startup
configuration is stored in ________.
(Points : 5)

ROM

PRAM

NVRAM

Flash

Steve Herrod :

Ok, I'll list the question and the answer here

Steve Herrod :

1 - SNMP

Steve Herrod :

let me know if this method will work

Steve Herrod :

2 - VLAN

Steve Herrod :

3 - Business Goals

Steve Herrod :

4 - Performance

Steve Herrod :

5 - NVRAM

Steve Herrod :

6 - Multicast

Steve Herrod :

7 - CSMA/CD

Steve Herrod :

8 - NIC Delay

Steve Herrod :

9 - Unicast

Steve Herrod :

10 - Project Teams

Steve Herrod :

11 - Switch(config)# XXXXX access mode trunk

Steve Herrod :

12 - All of the above

Steve Herrod :

13 - VLAN implementation significantly increases traffic due to added trunking information.

Steve Herrod :

14 - Switchport nonegotiate

Customer:

thank you. do you have time for a few more?

Steve Herrod :

should so

Customer:

(TCO 4) Which of the
following depicts a VTP domain?
(Points : 5)

Switches share VLAN information;
the boundary is defined by a Layer 3 device.


It can only create, delete, and
modify local VLANs.


It advertises VLAN configuration
information and can create, delete, and modify
VLANs.


It restricts broadcast traffic to
those trunks that must be used to reach the destination devices.

Customer:

 



(TCO 5) Ports in a blocking state
are known as which of the following?
(Points : 5)

Nondesignated
ports


PortFast

Root
bridge


Root ports

Customer:





12. (TCO 6) The command Switch#show spanning-tree displays the _____ and _____ to the root bridge. (Points : 5)

STP port; path cost STP port; not the path cost path cost; not the STP port none of the above

Steve Herrod :

Which of the
following depicts a VTP domain? = Switches share VLAN information;
the boundary is defined by a Layer 3 device.

Steve Herrod :

Ports in a blocking state
are known as which of the following? = Nondesignated
ports

Steve Herrod :





12. (TCO 6) The command Switch#show spanning-tree displays the _____ and _____ to the root bridge. ( =

STP port; path cost

Steve Herrod :

Let me know if you got those ok

Steve Herrod and other Homework Specialists are ready to help you

Related Homework Questions