Filters
Question type

Study Flashcards

Which of the following protocols is used to manage network equipment and is supported by most network equipment manufacturers?


A) TCP/IP
B) FTP
C) SNMP
D) SRTP

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Which of the following protocols is unsecured?


A) HTTPS
B) TLS
C) SSL
D) FTP

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

What hardware device can be inserted into a network to allow an administrator to monitor traffic?


A) network tap
B) network mirror
C) shark box
D) shark tap

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

Describe the ways you can use FTP on a local host computer.

Correct Answer

verifed

verified

From a command prompt.Commands can be ty...

View Answer

At what level of the OSI model does the IP protocol function?


A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

DNS poisoning can be prevented using the latest edition of what software below?


A) BIND
B) DHCP
C) WINS
D) finger

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

A

SNMP-managed devices must have an agent or a service that listens for commands and then executes them.

A) True
B) False

Correct Answer

verifed

verified

What are the planes used to allow SDN to virtualize parts of the physical network so that it can be more quickly and easily reconfigured? (Choose all that apply. )


A) data plane
B) management plane
C) control plane
D) Data plane

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

A,D

What type of system is designed to collect and consolidate logs from multiple sources for easy analysis?


A) centralized device log analyzer
B) core device log analyzer
C) network log device
D) system log manager

E) B) and C)
F) All of the above

Correct Answer

verifed

verified

Discuss at least two security advantages of a host running virtualization.

Correct Answer

verifed

verified

The latest security updates can be downl...

View Answer

Trivial File Transfer Protocol (TFTP)uses a more memory when compared to FTP.

A) True
B) False

Correct Answer

verifed

verified

List the steps of a DNS lookup.

Correct Answer

verifed

verified

Step 1.The request for the IP address of...

View Answer

S/MIME can be used when mail is accessed through a web browser.

A) True
B) False

Correct Answer

verifed

verified

False

What hardware component can be inserted into a web server that contains one or more co-processors to handle SSL/TLS processing?


A) SSL/TLS tap
B) SSL/TLS accelerator
C) SSL/TLS access point
D) SSL/TLS mirror

E) All of the above
F) A) and B)

Correct Answer

verifed

verified

Why is the Physical Layer omitted in the TCP/IP model?

Correct Answer

verifed

verified

The Physical Layer is omitted ...

View Answer

When using SNMPv1 or SNMPv2,what piece of information is needed to view information from an agent?


A) entity
B) community string
C) MIB
D) OID

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

TCP/IP uses its own four-layer architecture that includes the Network Interface,Internet,Transport,and Application layers.

A) True
B) False

Correct Answer

verifed

verified

The most popular implementation of DNS is the Unix Internet Name Domain.

A) True
B) False

Correct Answer

verifed

verified

What secure protocol is recommended for voice and video?


A) SRTP
B) S/MIME
C) IMAP
D) IPsec

E) A) and D)
F) A) and B)

Correct Answer

verifed

verified

A DDoS mitigator is a software device that identifies and blocks real-time distributed denial of service (DDoS)attacks.

A) True
B) False

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer