Question

While investigating the settings on your SOHO router, you find two IP addresses reported on the...

While investigating the settings on your SOHO router, you find two IP addresses reported on the device's routing table, which is used to determine where to send incoming data. The two IP addresses are 192.168.2.1 and 71.9.200.235. Which of these IP addresses would you see listed as the default gateway on the devices in your local network? How do you know?

Please keep answer 1-2 sentences.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

You can see your default gateway using ipconfig or ipconfig/all command on the command prompt

here you will find

IPv6 address

IPv4 address

Subnet Mask and

Default Gateway

Steps for finding the Default Gateway

Step1. Open command prompt (This is for windows, I am using window 10)

Step2. Type ipconfig and press enter

Step3. you can see the default gateway

Screenshot of ifconfig and ipconfigall command in command prompt

Add a comment
Know the answer?
Add Answer to:
While investigating the settings on your SOHO router, you find two IP addresses reported on the...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • PLEASE ATTACH A SCREENSHOT OF YOUR SUCCESSFUL PING IN PACKET TRACER FOR THE END!!!!!!!!!!! THANK YOU! Objectives Part...

    PLEASE ATTACH A SCREENSHOT OF YOUR SUCCESSFUL PING IN PACKET TRACER FOR THE END!!!!!!!!!!! THANK YOU! Objectives Part A: Configure a simple static routing . Part B: Configure a simple RIP routing Part A: Configure a simple static routing 1. Create the following network topology on Packet Tracer Router-PT Router-PT Addressing Table Device Interface IP Address Subnet Mask Default Gatewa 10.0.0.1 20.0.0.1 30.0.0.1 20.0.0.2 0.0.0.10 30.0.0.10 N/A 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 255.0.0.0 Routero 2/0 NIA NIA NIA 10.0.0.1 30.0.0.1...

  • Question: Your Answer: What is the IP Address of the computer? If this computer could reach...

    Question: Your Answer: What is the IP Address of the computer? If this computer could reach the Internet but could not resolve names on the Internet, assuming that these settings are correct, which computer would you check to make sure it is running? What is the fully qualified domain name for this computer? What is the MAC address of this Network Adapter? What is the IP address of the device that provided the computer IP Address? What is the CIDR...

  • Packet Tracer Open the Packet Tracer program on your PC. Map a simple network. Include two...

    Packet Tracer Open the Packet Tracer program on your PC. Map a simple network. Include two PCs, a switch, a router and a server. Wire this network using Copper Straight-Through Cable. Take a screenshot of the cabled topology and place it below. Assign IP addresses to each PC, the server and the router interface connected to the switch. This can be any IP address, but I suggest a classful private IP address scheme. From PC0, ping the Default Gateway. Take...

  • Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic...

    Q1 Error detection/correction Can these schemes correct bit errors: Internet checksums, two-dimendional parity, cyclic redundancy check (CRC) A. Yes, No, No B. No, Yes, Yes c. No, Yes, No D. No, No, Yes E. Ho, hum, ha Q2 CRC vs Internet checksums Which of these is not true? A. CRC's are commonly used at the link layer B. CRC's can detect any bit error of up to r bits with an r-bit EDC. c. CRC's are more resilient to bursty...

  • 1) In a typical TCP connection establishment, the two flags used in the core handshake are...

    1) In a typical TCP connection establishment, the two flags used in the core handshake are the _____ and _____ flags. 2) TCP uses _____ to manage the transmission between senders and receivers that can send or receive differing rates to make sure not to overwhelm machines that may be slower. 3) The transport layer protocol used by the TCP / IP suite that does not provide guarantees on ordering or confirmation of receipt of packets is called . 4)...

  • can you please help me with this homework. DCOM 101 – Introduction to Data Communications Final Project Instructions: In this Final Project, you will test the skills and knowledge gained throughout th...

    can you please help me with this homework. DCOM 101 – Introduction to Data Communications Final Project Instructions: In this Final Project, you will test the skills and knowledge gained throughout this course. The steps listed below are loosely based on the Assignments you have completed thus far, so don’t hesitate to look back and use those resources. Follow the steps in each section, and paste screenshots when prompted. This assignment is worth 10% of your final grade. Basic Network...

  • PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers...

    PART A 21 MARKS SHORT ANSWER QUESTIONS Answer ALL questions from this part. Write your answers in the Examination Answer Booklet. Each question is worth 1.5 marks (14 x 1.5 = 21 marks). Question 1 An organisation has been granted a block of addresses with the mask /22. If the organisation creates 8 equal-sized subnets, how many addresses (including the special addresses) are available in each subnet? Show your calculations. Question 2 Give an example of a valid classful address...

  • Overview This assignment will give you experience on the use of classes. Understand the Application Every...

    Overview This assignment will give you experience on the use of classes. Understand the Application Every internet user–perhaps better thought of as an Internet connection–has certain data associated with him/her/it. We will oversimplify this by symbolizing such data with only two fields: a name ("Aristotle") and a globally accessible IP address ("139.12.85.191"). We could enhance these by adding other—sometimes optional, sometimes needed—data (such as a MAC address, port, local IP address, gateway, etc), but we keep things simple and use...

  • Will facebook be able to have a successful business model without invading privacy? explain your answer?...

    Will facebook be able to have a successful business model without invading privacy? explain your answer? could facebook take any measures to make this possible? BUSINESS PROBLEM-SOLVING CASE Facebook Privacy: Your Life for Sale Facebook has quickly morphed from a small, niche haps most obviously. Facebook allows you to keep in networking site for mostly Ivy League college stu- touch with your friends, relatives, local restaurants, dents into a publicly traded company with a market and, in short, just about...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT