Subject:Computer SciencePrice:9.82 Bought3
1) (a). When the EA is set to one in Frame Relay, the following is true:
A. current() byte = n - 1 where n = 2
B. current() byte = n - 1 where n = 4
C. A flag would be set to 01111000
D. FECN would be 2 bits
1. (b)A packet going through a VPN will help with:
A. OSI traversing restrictions
B. layer 4 security Flaws
C. making all prior locations untraceable
D. prevent direct neighbor ISP logging
1. (c) What associates with stronger MPLS performance in contrast to
PPP?
A. High-level variable handling
B. RSVP identification
C. Encapsulation without abstraction
D. Stream size-specific to IPs
1(d) The IP address is assigned to a network interface on a host
when
A. the OS boots up
B. the PC connects to the Internet
C. an application is run
D. the user requests one
2.(a) Which of the follow is most detrimental to software with objectoriented
code?
A. worms
B. bots
C. ransomware
D. phishing
2(b)Given this IPv4 binary subnet
mask: 11111111.11111111.11111000.00000000 what is an
appropriate wildcard mask?
A. 0.0.21.254
B 0.0.1.255
C. 0.0.254.1
D. 0.0.7.255
1. (a). When the EA is set to one in Frame Relay, the following is true:
B. current() byte = n - 1 where n = 4
1. (b)A packet going through a VPN will help with:
D. prevent direct neighbor ISP logging
1. (c) What associates with stronger MPLS performance in contrast to
PPP?
C. Encapsulation without abstraction
1(d) The IP address is assigned to a network interface on a host
when
B. the PC connects to the Internet
2.(a) Which of the follow is most detrimental to software with object oriented
code?
B. bots
2(b)Given this IPv4 binary subnet
mask: 11111111.11111111.11111000.00000000 what is an
appropriate wildcard mask?
D. 0.0.7.255
Step-by-step explanation
Incase of any query, kindly use the comment section.
1. (a). When the EA is set to one in Frame Relay, the following is true:
These addresses are up to 2 bytes long. Using the EA fields extended addresses can be used which may be up to 4 bytes long.
1. (b)A packet going through a VPN will help with:
Using a VPN will prevent your ISP from viewing what websites you visit when you connect to the Internet, or what you do online while connected.
So if someone intercepts that data, all they'll see is garbled nonsense that would take a supercomputer many, many years to decrypt without the key.
1. (b)A packet going through a VPN will help with:
1. (c) What associates with stronger MPLS performance in contrast to
PPP?
However, MPLS can deliver any type of packet between sites. MPLS can encapsulate packets of various network protocols.
1(d) The IP address is assigned to a network interface on a host
when
The IP address that you give to a host is assigned to its network interface, sometimes referred to as the primary network interface
2.(a) Which of the follow is most detrimental to software with object oriented
code?
The best programming language is really depending on the bot goal and ... project makes a sense of using object-oriented programming (OOP).
2(b)Given this IPv4 binary subnet
mask: 11111111.11111111.11111000.00000000 what is an
appropriate wildcard mask?
Netmask: 255.255.248.0 = 21 11111111.11111111.11111 000.00000000
Wildcard: 0.0.7.255 00000000.00000000.00000 111.11111111