what is the difference between static and dynamic routing

Answer one of the following from Section 7.1:

  1. What is the difference between static and dynamic routing?
  2. What is convergence?
  3. What information is contained in a routing table?
  4. What is the function of a routing table?
  5. When would you create a static routing table entry?

Answer one of the following from Section 7.2:

  1. When would you configure both static and dynamic routing on the same router?
  2. Which type of route is preferred, one with a higher metric or one with a lower metric?
  3. Why is the hop count sometimes an unreliable metric for choosing the best path to a destination network?
  4. How does the link state method differ from the distance vector method?
  5. What is the difference between RIP and RIPv2? Why is this important in today’s networks?
  6. Which routing protocol is typically used within an ISP? Which protocol is used on the Internet?
  7. Which routing protocol(s) divide an autonomous system into areas?
  8. How does IS-IS differ from OSPF?

Answer one of the following from Section 7.3:

  1. What are two advantages to using NAT?
  2. What is the difference between static NAT and dynamic NAT?
  3. What is port forwarding?
  4. What is the difference between NAT and PAT?

Answer one of the following from Section 7.4:

  1. What is administrative distance?
  2. What is the difference between automatic and manual summarization?
  3. What are the benefits of route summarization?
  4. What is a first-hop router?

Answer one of the following from Section 8.1:

  1. How does a packet filtering firewall differ from a circuit-level gateway?
  2. Why is a packet filtering firewall a stateless device?
  3. What types of filter criteria can an application layer firewall use for filtering?
  4. Which security device might you choose to restrict access by user account?
  5. What is the difference between a proxy and a reverse proxy?

Answer one of the following from Section 8.2:

  1. Under what conditions would you use an all-in-one security appliance?
  2. What security functions are included in an all-in-one security appliance?

Answer one of the following from Section 8.3:

  1. How do firewalls manage incoming or outgoing traffic?
  2. What is the difference between a standard and an extended ACL?
  3. What does the deny any statement do?
  4. What is the difference between a routed firewall and a transparent firewall?

    Answer one of the following from Section 10.1:

    1. Under which circumstances might you choose an ad hoc wireless network?
    2. What device is used to create an infrastructure wireless network?
    3. How do wireless networks control media access?
    4. What is the difference between a BSS and an ESS?
    5. What do wireless clients use to identify a specific wireless access point?
    6. How do multiple access points identify themselves as part of the same network?

    Answer one of the following from Section 10.2:

    1. What are the differences between 802.11a and 802.11g specifications?
    2. Devices that support the 802.11g standards are typically compatible with which other wireless standard?
    3. How does MIMO differ from channel bonding?
    4. Why is channel bonding typically not used with the 2.4 GHz range?
    5. What happens when an 802.11a device connects to an access point that supports both 802.11n and 802.11a? What happens if the access point uses MIMO and supports dual band?
    6. Which types of devices typically use Bluetooth wireless?

    Answer one of the following from Section 10.3:

    1. What information is contained in the wireless profile?
    2. What is the strongest encryption method?
    3. What is the purpose of a beacon?
    4. How are wireless networks listed in the notification area?

    Answer one of the following from Section 10.4:

    1. What is device density?
    2. What is the difference between Received Signal Level and Signal to Noise Ratio?
    3. Which implementation automatically partitions a single broadcast domain into multiple VLANs?
    4. What information if specified in logical network diagram?
    5. How do you measure the signal strength at a given distance from the access point?

    Answer one of the following from Section 10.5:

    1. What is the difference between a hub-and-spoke infrastructure and a distributed wireless mesh infrastructure?
    2. What is a lightweight access point used for?
    3. Which protocol is used to route frames back and forth between the wireless network and the wired LAN?
    4. Which enterprise deployment has limited mobility and is difficult to manage?

    Answer one of the following from Section 10.6:

    1. What does open authentication use for authenticating a device? Why is this not a very secure solution?
    2. What two additional components are required to implement 802.1x authentication?
    3. What does WEP use for the encryption key? Why does this present a security problem?
    4. Why should you not use shared key authentication with WEP?
    5. What is the difference between WPA Personal and WPA Enterprise?
    6. You have an access point that currently supports only WEP. What would you typically need to do to support WPA2?
    7. What is the encryption method used with WPA? WPA2?
    8. Which default values should you always change on your wireless network?
    9. What can you do to contain RF emanations?
 
Do you need a similar assignment done for you from scratch? We have qualified writers to help you. We assure you an A+ quality paper that is free from plagiarism. Order now for an Amazing Discount!
Use Discount Code "Newclient" for a 15% Discount!

NB: We do not resell papers. Upon ordering, we do an original paper exclusively for you.