0% found this document useful (0 votes)
515 views24 pages

Soal Ch9 S.D 17

Uploaded by

Eko Subyantoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
515 views24 pages

Soal Ch9 S.D 17

Uploaded by

Eko Subyantoro
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 24

Which router component holds the routing table, ARP cache, and running configuration file?

Flash

ROM

NVRAM

RAM

What type of information is contained in an ARP table?


switch ports associated with destination MAC addresses

domain name to IPv4 address mappings

routes to reach destination networks

IPv4 address to MAC address mappings

A PC is configured to obtain an IPv4 address automatically from network 192.168.1.0/24. The network
administrator issues the arp –a command and notices an entry of 192.168.1.255 ff-ff-ff-ff-ff-ff. Which statement
describes this entry?
This entry maps to the default gateway.

This is a dynamic map entry.

This entry refers to the PC itself.

This is a static map entry.

A cybersecurity analyst believes an attacker is spoofing the MAC address of the default gateway to perform a man-
in-the-middle attack. Which command should the analyst use to view the MAC address a host is using to reach the
default gateway?
netstat -r

route print

ipconfig /all

arp -a

What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
It forwards the frame out of all ports except for the port at which the frame was received.

It notifies the sending host that the frame cannot be delivered.

It broadcasts the frame out of all ports on the switch.

It initiates an ARP request.

Which two ICMPv6 messages are used during the Ethernet MAC address resolution process? (Choose two.)
router advertisement

router solicitation

neighbor solicitation
echo request

neighbor advertisement

How does the ARP process use an IPv4 address?


to determine the MAC address of a device on the same network

to determine the network number based on the number of bits in the IPv4 address

to determine the MAC address of the remote destination host

to determine the amount of time a packet takes when traveling from source to destination

What is one function of the ARP protocol?


mapping a domain name to its IP address

maintaining a table of domain names with their resolved IP addresses

obtaining an IPv4 address automatically

resolving an IPv4 address to a MAC address

Which action is taken by a Layer 2 switch when it receives a Layer 2 broadcast frame?
It sends the frame to all ports.

It drops the frame.

It sends the frame to all ports except the port on which it received the frame.

It sends the frame to all ports that are registered to forward broadcasts.

What addresses are mapped by ARP?


IPv4 address to a destination MAC address

destination IPv4 address to the destination host name

destination IPv4 address to the source MAC address

destination MAC address to the source IPv4 address

When an IPv4 packet is sent to a host on a remote network, what information is provided by ARP?
the IPv4 address of the destination host

the MAC address of the router interface closest to the sending host

the MAC address of the switch port that connects to the sending host

the IPv4 address of the default gateway

The ARP table in a switch maps which two types of address together?
Layer 2 address to a Layer 4 address

Layer 3 address to a Layer 4 address

Layer 4 address to a Layer 2 address


Layer 3 address to a Layer 2 address

What is the purpose of ARP in an IPv4 network?


to forward data onward based on the destination MAC address.

to obtain a specific MAC address when an IP address is known

to forward data onward based on the destination IP address

to build the MAC address table in a switch from the information that is gathered

Which destination address is used in an ARP request frame?


01-00-5E-00-AA-23

FFFF.FFFF.FFFF

0.0.0.0

127.0.0.1

255.255.255.255

A router boots and enters setup mode. What is the reason for this?
Cisco IOS is missing from flash memory.

The configuration file is missing from NVRAM.

The POST process has detected hardware failure.

The IOS image is corrupt.

Which command is used to encrypt all passwords in a router configuration file?


Router_A (config) # enable secret <password>

Router_A (config) # enable password <password>

Router_A (config) # service password-encryption

Router_A (config) # encrypt password

Company policy requires using the most secure method to safeguard access to the privileged exec and configuration
mode on the routers. The privileged exec password is trustknow1. Which of the following router commands
achieves the goal of providing the highest level of security?
enable secret trustknow1

secret password trustknow1

enable password trustknow1

service password-encryption

What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered?
? command not recognized
router(config)#

router(config-host)#
hostname = portsmouth
portsmouth#

portsmouth(config)#

invalid input detected

portsmouth#

An administrator is configuring a new router to permit out-of-band management access. Which set of commands
will allow the required login using a password of cisco?
Router(config)# line console 0
Router(config-line)# password cisco
Router(config-line)# login

Router(config)# line vty 0 4


Router(config-line)# password cisco
Router(config-line)# login

Router(config)# line console 0


Router(config-line)# password cisco
Router(config-line)# exit
Router(config)# service password-encryption

Router(config)# line vty 0 4


Router(config-line)# password manage
Router(config-line)# exit
Router(config)# enable password cisco

Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current
status?
ping

show ip route

show interface fa0/1

show ip interface brief

Which CLI mode allows users to access all device commands, such as those used for configuration, management,
and troubleshooting?
global configuration mode

privileged EXEC mode

user EXEC mode

interface configuration mode

What is the purpose of the startup configuration file on a Cisco router?


to facilitate the basic operation of the hardware components of a device

to contain the commands that are used to initially configure a router on startup

to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS
to contain the configuration commands that the router IOS is currently using

Which characteristic describes the default gateway of a host computer?


the logical address assigned to the switch interface connected to the router

the physical address of the router interface on the same network as the host computer

the logical address of the router interface on the same network as the host computer

the physical address of the switch interface connected to the host computer

What is the purpose of the banner motd command?


It provides an easy way of communicating with any user attached to a router's LANs.

It provides a way to make announcements to those who log in to a router.

It configures a message that will identify printed documents to LAN users.

It is a way that routers communicate the status of their links with one another.

A technician is configuring a router to allow for all forms of management access. As part of each different type of
access, the technician is trying to type the command login. Which configuration mode should be entered to do this
task?
any line configuration mode

user executive mode

privileged EXEC mode

global configuration mode

What is stored in the NVRAM of a Cisco router?


the startup configuration

the Cisco IOS

the running configuration

the bootup instructions

Which statement regarding the service password-encryption command is true?


It encrypts only line mode passwords.

As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in
plain text are encrypted.

To see the passwords encrypted by the service password-encryption command in plain text, issue the no service
password-encryption command.

It is configured in privileged EXEC mode.


What is the prefix length notation for the subnet mask 255.255.255.224?
/25

/26
/27

/28

How many valid host addresses are available on an IPv4 subnet that is configured with a /26 mask?
192

64

254

190

62

Which subnet mask would be used if 5 host bits are available?


255.255.255.128

255.255.255.0

255.255.255.240

255.255.255.224

A network administrator subnets the 192.168.10.0/24 network into subnets with /26 masks. How many equal-sized
subnets are created?
2

64

16

What subnet mask is represented by the slash notation /20?


255.255.240.0

255.255.224.0

255.255.255.192

255.255.255.248

255.255.255.0

Which statement is true about variable-length subnet masking?


Bits are returned, rather than borrowed, to create additional subnets.

The size of each subnet may be different, depending on requirements.

Each subnet is the same size.


Subnets may only be subnetted one additional time.

Why does a Layer 3 device perform the ANDing process on a destination IP address and subnet mask?
to identify faulty frames

to identify the broadcast address of the destination network

to identify the network address of the destination network

to identify the host address of the destination host

How many usable IP addresses are available on the 192.168.1.0/27 network?


30

32

62

254

16

256

Which subnet mask would be used if exactly 4 host bits are available?
255.255.255.248

255.255.255.128

255.255.255.224

255.255.255.240

Which two parts are components of an IPv4 address? (Choose two.)


broadcast portion

subnet portion

network portion

physical portion

host portion

logical portion

If a network device has a mask of /26, how many IP addresses are available for hosts on this network?
62

30

64

14

16
32

What does the IP address 172.17.4.250/24 represent?


multicast address

host address

network address

broadcast address

If a network device has a mask of /28, how many IP addresses are available for hosts on this network?
14

254

62

16

256

32

What is the purpose of the subnet mask in conjunction with an IP address?


to identify whether the address is public or private

to mask the IP address to outsiders

to determine the subnet to which the host belongs

to uniquely identify a host on a network

A network administrator is variably subnetting a network. The smallest subnet has a mask of 255.255.255.224. How
many usable host addresses will this subnet provide?
14

30

What is the valid most compressed format possible of the IPv6 address
2001:0DB8:0000:AB00:0000:0000:0000:1234?
2001:DB8:0:AB::1234

2001:DB8:0:AB00::1234

2001:DB8::AB00::1234

2001:DB8:0:AB:0:1234

What is the prefix associated with the IPv6 address 2001:DB8:D15:EA:CC44::1/64?


2001::/64
2001:DB8:D15:EA:CC44::/64

2001:DB8:D15:EA::/64

2001:DB8::/64

What type of address is automatically assigned to an interface when IPv6 is enabled on that interface?
loopback

link-local

unique local

global unicast

Which IPv6 network prefix is only intended for local links and can not be routed?
FF00::/12

2001::/3

FE80::/10

FC00::/7

What is the purpose of the command ping ::1?


It tests the reachability of the default gateway for the network.

It tests the internal configuration of an IPv6 host.

It tests the broadcast capability of all hosts on the subnet.

It tests the multicast connectivity to all hosts on the subnet.

What is the interface ID of the IPv6 address 2001:DB8::1000:A9CD:47FF:FE57:FE94/64?


FE57:FE94

A9CD:47FF:FE57:FE94

1000:A9CD:47FF:FE57:FE94

FE94

47FF:FE57:FE94

What is the network address for the IPv6 address 2001:DB8:AA04:B5::1/64?


2001::/64

2001:DB8::/64

2001:DB8:AA04:B5::/64

2001:DB8:AA04::/64

Which address type is not supported in IPv6?


private
unicast

multicast

broadcast

What is indicated by a successful ping to the ::1 IPv6 address?


The link-local address is correctly configured.

The default gateway address is correctly configured.

IP is properly installed on the host.

The host is cabled properly.

All hosts on the local link are available.

What is the most compressed representation of the IPv6 address 2001:0db8:0000:abcd:0000:0000:0000:0001?


2001:0db8:abcd::0001

2001:db8:0:abcd::1

2001:0db8:abcd::1

2001:db8::abcd:0:1

2001:0db8:0000:abcd::1

What is the minimum configuration for a router interface that is enabled for IPv6?
to have both an IPv4 and an IPv6 address

to have a self-generated loopback address

to have a link-local IPv6 address

to have both a link-local and a global unicast IPv6 address

At a minimum, which address is required on IPv6-enabled interfaces?


unique local

site local

global unicast

link-local

What are three parts of an IPv6 global unicast address? (Choose three.)
an interface ID that is used to identify the local host on the network

a global routing prefix that is used to identify the portion of the network address provided by a local administrator

a global routing prefix that is used to identify the network portion of the address that has been provided by an ISP

a subnet ID that is used to identify networks inside of the local enterprise site
an interface ID that is used to identify the local network for a particular host

Your organization is issued the IPv6 prefix of 2001:db8:130f::/48 by your service provider. With this prefix, how
many bits are available for your organization to create /64 subnetworks if interface ID bits are not borrowed?
16

128

80

Which type of IPv6 address is not routable and used only for communication on a single subnet?
global unicast address

link-local address

unique local address

unspecified address

loopback address

A technician is troubleshooting a network where it is suspected that a defective node in the network path is causing
packets to be dropped. The technician only has the IP address of the end point device and does not have any details
of the intermediate devices. What command can the technician use to identify the faulty node?
tracert

ipconfig /flushdns

ipconfig /displaydns

ping

A user who is unable to connect to the file server contacts the help desk. The helpdesk technician asks the user to
ping the IP address of the default gateway that is configured on the workstation. What is the purpose for this ping
command?
to resolve the domain name of the file server to its IP address

to request that gateway forward the connection request to the file server

to obtain a dynamic IP address from the server

to test that the host has the capability to reach hosts on other networks

What is a function of the tracert command that differs from the ping command when they are used on a workstation?
The tracert command is used to test the connectivity between two devices.

The tracert command shows the information of routers in the path.

The tracert command reaches the destination faster.

The tracert command sends one ICMP message to each hop in the path.

Which ICMP message is used by the traceroute utility during the process of finding the path between two end hosts?
ping
destination unreachable

redirect

time exceeded

Which utility uses the Internet Control Messaging Protocol (ICMP)?


NTP

RIP

DNS

ping

Which protocol is used by IPv4 and IPv6 to provide error messaging?


ICMP

NDP

ARP

DHCP

A network administrator is testing network connectivity by issuing the ping command on a router. Which symbol
will be displayed to indicate that a time expired during the wait for an ICMP echo reply message?
U

Which two things can be determined by using the ping command? (Choose two.)
the IP address of the router nearest the destination device

the average time it takes each router in the path between source and destination to respond

the destination device is reachable through the network

the average time it takes a packet to reach the destination and for the response to return to the source

the number of routers between the source and destination device

A user calls to report that a PC cannot access the internet. The network technician asks the user to issue the
command ping 127.0.0.1 in a command prompt window. The user reports that the result is four positive replies.
What conclusion can be drawn based on this connectivity test?
The PC can access the Internet. However, the web browser may not work.

The PC can access the network. The problem exists beyond the local network.

The TCP/IP implementation is functional.

The IP address obtained from the DHCP server is correct.


Which command can be used to test connectivity between two devices using echo request and echo reply messages?
ipconfig

ping

netstat

ICMP

What field content is used by ICMPv6 to determine that a packet has expired?
CRC field

Hop Limit field

Time Exceeded field

TTL field

Which protocol provides feedback from the destination host to the source host about errors in packet delivery?
DNS

ARP

ICMP

BOOTP

A network administrator can successfully ping the server at www.cisco.com, but cannot ping the company web
server located at an ISP in another city. Which tool or command would help identify the specific router where the
packet was lost or delayed?
traceroute

ipconfig

netstat

telnet

What message is sent by a host to check the uniqueness of an IPv6 address before using that address?
echo request

ARP request

router solicitation

neighbor solicitation

Which transport layer feature is used to establish a connection-oriented session?


TCP port number

UDP sequence number

TCP 3-way handshake

UDP ACK flag


What is the complete range of TCP and UDP well-known ports?
256 - 1023

1024 - 49151

0 to 255

0 to 1023

What is a socket?
the combination of a source IP address and port number or a destination IP address and port number

the combination of the source and destination sequence numbers and port numbers

the combination of the source and destination IP address and source and destination Ethernet address

the combination of the source and destination sequence and acknowledgment numbers

How does a networked server manage requests from multiple clients for different services?
The server sends all requests through a default gateway.

Each request has a combination of source and destination port numbers, coming from a unique IP address.

Each request is tracked through the physical address of the client.

The server uses IP addresses to identify different services.

What happens if part of an FTP message is not delivered to the destination?


The entire FTP message is re-sent.

The FTP source host sends a query to the destination host.

The message is lost because FTP does not use a reliable delivery method.

The part of the FTP message that was lost is re-sent.

What type of applications are best suited for using UDP?


applications that are sensitive to delay

applications that need reliable delivery

applications that require retransmission of lost segments

applications that are sensitive to packet loss

Network congestion has resulted in the source learning of the loss of TCP segments that were sent to the destination.
What is one way that the TCP protocol addresses this?
The source decreases the amount of data that it transmits before it receives an acknowledgement from the
destination.

The destination decreases the window size.

The source decreases the window size to decrease the rate of transmission from the destination.

The destination sends fewer acknowledgement messages in order to conserve bandwidth.


Which two operations are provided by TCP but not by UDP? (Choose two.)
reconstructing data in the order received

acknowledging received data

identifying the applications

identifying individual conversations

retransmitting any unacknowledged data

What is the purpose of using a source port number in a TCP communication?


to assemble the segments that arrived out of order

to keep track of multiple conversations between devices

to notify the remote device that the conversation is over

to inquire for a nonreceived segment

Which two flags in the TCP header are used in a TCP three-way handshake to establish connectivity between two
network devices? (Choose two.)
FIN

SYN

URG

RST

ACK

PSH

What TCP mechanism is used to enhance performance by allowing a device to continuously send a steady stream of
segments as long as the device is also receiving necessary acknowledgements?
sliding window

three-way handshake

two-way handshake

socket pair

Which action is performed by a client when establishing communication with a server via the use of UDP at the
transport layer?
The client sets the window size for the session.

The client randomly selects a source port number.

The client sends a synchronization segment to begin the session.

The client sends an ISN to the server to start the 3-way handshake.
Which two services or protocols use the preferred UDP protocol for fast transmission and low overhead? (Choose
two)
HTTP

FTP

DNS

POP3

VoIP

Which number or set of numbers represents a socket?


01-23-45-67-89-AB

10.1.1.15

21

192.168.1.1:80

What is a responsibility of transport layer protocols?


providing network access

determining the best path to forward a packet

tracking individual conversations

translating private IP addresses to public IP addresses

On a home network, which device is most likely to provide dynamic IPv4 addressing to clients on the home
network?
a DNS server

a dedicated file server

a home router

an ISP DHCP server

What part of the URL, ht&#8203;tp://ww&#8203;w.cisco.com/index.html, represents the top-level DNS domain?
index

.com

http

www

What are two characteristics of the application layer of the TCP/IP model? (Choose two.)
responsibility for physical addressing

the creation and maintenance of dialogue between source and destination applications

the establishing of window size


closest to the end user

responsibility for logical addressing

What message type is used by an HTTP client to request data from a web server?
ACK

POST

GET

PUT

Which protocol can be used to transfer messages from an email server to an email client?
SMTP

POP3

SNMP

HTTP

Which application layer protocol is used to provide file-sharing and print services to Microsoft applications?
DHCP

HTTP

SMB

SMTP

Which three protocols or standards are used at the application layer of the TCP/IP model? (Choose three.)
TCP

HTTP

IP

UDP

MPEG

GIF

Why is DHCP for IPv4 preferred for use on large networks?


It is a more efficient way to manage IPv4 addresses than static address assignment is.

Large networks send more requests for domain to IP address resolution than do smaller networks.

DHCP uses a reliable transport layer protocol.

Hosts on large networks require more IPv4 addressing configuration settings than do hosts on small networks.

It prevents sharing of files that are copyrighted.


An author is uploading one chapter document from a personal computer to a file server of a book publisher. What
role is the personal computer assuming in this network model?
slave

transient

server

master

client

Which statement is true about FTP?


The client can choose if FTP is going to establish one or two connections with the server.

FTP is a peer-to-peer application.

The client can download data from or upload data to the server.

FTP does not provide reliability during data transmission.

A wireless host needs to request an IPv4 address. What protocol would be used to process the request?
SNMP

DHCP

FTP

ICMP

HTTP

Which TCP/IP model layer is closest to the end user?


application

transport

internet

network access

When retrieving email messages, which protocol allows for easy, centralized storage and backup of emails that
would be desirable for a small- to medium-sized business?
SMTP

POP

IMAP

HTTPS

Which protocol uses encryption?


FTP

DNS
HTTPS

DHCP

Which two tasks can be performed by a local DNS server? (Choose two.)
allowing data transfer between two network devices

forwarding name resolution requests between servers

providing IP addresses to local hosts

retrieving email messages

mapping name-to-IP addresses for internal hosts

Which component is designed to protect against unauthorized communications to and from a computer?
firewall

antimalware

antivirus

port scanner

security center

Which command will block login attempts on RouterA for a period of 30 seconds if there are 2 failed login attempts
within 10 seconds?
RouterA(config)# login block-for 30 attempts 10 within 2

RouterA(config)# login block-for 2 attempts 30 within 10

RouterA(config)# login block-for 10 attempts 2 within 30

RouterA(config)# login block-for 30 attempts 2 within 10

What is the purpose of the network security accounting function?


to keep track of the actions of a user

to require users to prove who they are

to determine which resources a user can access

to provide challenge and response questions

What type of attack may involve the use of tools such as nslookup and fping?
denial of service attack

access attack

reconnaissance attack

worm attack

Which benefit does SSH offer over Telnet for remotely managing a router?
connections via multiple VTY lines
authorization

encryption

TCP usage

What is one of the most effective security tools available for protecting users from external threats?
firewalls

patch servers

router that run AAA services

password encryption techniques

Which type of network threat is intended to prevent authorized users from accessing resources?
access attacks

reconnaissance attacks

DoS attacks

trust exploitation

Which three services are provided by the AAA framework? (Choose three.)
authentication

autobalancing

autoconfiguration

automation

authorization

accounting

Which malicious code attack is self-contained and tries to exploit a specific vulnerability in a system being attacked?
social engineering

virus

Trojan horse

worm

Some routers and switches in a wiring closet malfunctioned after an air conditioning unit failed. What type of threat
does this situation describe?
electrical

environmental

configuration

maintenance
What does the term vulnerability mean?
a weakness that makes a target susceptible to an attack

a method of attack to exploit a target

a potential threat that a hacker creates

a computer that contains sensitive information

a known target or victim machine

What three configuration steps must be performed to implement SSH access to a router? (Choose three.)
a password on the console line

an enable mode password

an IP domain name

a unique hostname

an encrypted password

a user account

What is the objective of a network reconnaissance attack?


unauthorized manipulation of data

denying access to resources by legitimate users

discovery and mapping of systems

disabling network systems or services

For security reasons a network administrator needs to ensure that local computers cannot ping each other. Which
settings can accomplish this task?
firewall settings

smartcard settings

MAC address settings

file system settings

A network administrator establishes a connection to a switch via SSH. What characteristic uniquely describes the
SSH connection?
remote access to the switch through the use of a telephone dialup connection

out-of-band access to a switch through the use of a virtual terminal with password authentication

direct access to the switch through the use of a terminal emulation program

remote access to a switch where data is encrypted during the session

on-site access to a switch through the use of a directly connected PC and a console cable
Which network design consideration would be more important to a large corporation than to a small business?
low port density switch

redundancy

Internet router

firewall

A newly hired network technician is given the task of ordering new hardware for a small business with a large
growth forecast. Which primary factor should the technician be concerned with when choosing the new devices?
devices that have support for network monitoring

redundant devices

devices with a fixed number and type of interfaces

devices with support for modularity

What type of traffic would most likely have the highest priority through the network?
instant messaging

SNMP

FTP

voice

A network technician is investigating network connectivity from a PC to a remote host with the address 10.1.1.5.
Which command, when issued on a Windows PC, will display the path to the remote host?
trace 10.1.1.5

ping 10.1.1.5

traceroute 10.1.1.5

tracert 10.1.1.5

A user is unable to reach the website when typing http://www.cisco.com in a web browser, but can reach the same
site by typing http://72.163.4.161. What is the issue?
TCP/IP protocol stack

default gateway

DNS

DHCP

Where are Cisco IOS debug output messages sent by default?


Syslog server

vty lines

memory buffers
console line

Which element of scaling a network involves identifying the physical and logical topologies?
traffic analysis

device inventory

cost analysis

network documentation

What mechanism can be implemented in a small network to help minimize network latency for real-time streaming
applications?
AAA

QoS

ICMP

PoE

Which process failed if a computer cannot access the internet and received an IP address of 169.254.142.5?
DNS

DHCP

HTTP

IP

A small company has only one router as the exit point to its ISP. Which solution could be adopted to maintain
connectivity if the router itself, or its connection to the ISP, fails?
Add more interfaces to the router that is connected to the internal network.

Purchase a second least-cost link from another ISP to connect to this router.

Have a second router that is connected to another ISP.

Activate another router interface that is connected to the ISP, so the traffic can flow through it.

When should an administrator establish a network baseline?


when there is a sudden drop in traffic

at regular intervals over a period of time

at the lowest point of traffic in the network

when the traffic is at peak in the network

Which two traffic types require delay sensitive delivery? (Choose two.)
voice

FTP

email
video

web

A network technician suspects that a particular network connection between two Cisco switches is having a duplex
mismatch. Which command would the technician use to see the Layer 1 and Layer 2 details of a switch port?
show interfaces

show running-config

show mac-address-table

show ip interface brief

Which statement is true about CDP on a Cisco device?


The show cdp neighbor detail command will reveal the IP address of a neighbor only if there is Layer 3 connectivity
.

Because it runs at the data link layer, the CDP protocol can only be implemented in switches.

To disable CDP globally, the no cdp enable command in interface configuration mode must be used.

CDP can be disabled globally or on a specific interface.

What factor should be considered in the design of a small network when devices are being chosen?
cost of devices

ISP

redundancy

traffic analysis

You might also like