Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which of the following options is a protocol used to encrypt

Question 1 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which of the following options is a protocol used to encrypt data travelling a network? Select one: a. IPsec b. SMB c. Kerberos d. EFS Question 2 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which AP feature is useful when you have many guests accessing your network and you dont want them to be able to access the computers of other guests? Select one: a. VLAN mode b. Bridge mode c. AP isolation d. MAC filtering Question 3 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text How do VPNs encapsulate encrypted packets with additional headers to be correctly routed by internet devices? Select one: a. Authenticating b. Tunneling c. Concentrating d. Auditing Question 4 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which of the following commands can be used to configure the DNS server on your computer? Select one: a. nslookup b. netsh c. ipconfig d. arp Question 5 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which address from the following list acts as the identifier for an entire subnet? Select one: a. network address (ID) b. hardware address c. directed broadcast address d. loopback address e. local broadcast address f. startup source address Question 6 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which protocol from the given list can be used to assign a PC's IP address with subnet mask automatically? Select one: a. ARP b. TCP c. IP d. DHCP e. DNS Question 7 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text The protocol _____ can be used to map IP network addresses to the hardware addresses used by a data link protocol. Select one: a. MAC b. ARP c. DNS d. NAT Question 8 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text The __________ layer in the TCP/IP stack includes HTTP for web browsing. Select one: a. WAN b. protocol c. transport d. port e. hardware f. network interface card g. ISP h. operating system i. LAN j. standard k. data link l. application m. network n. physical Question 9 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text The process called ________ is used to establish a TCP connection with the destination device. Select one: a. windowing b. three-way handshake c. flow control d. encapsulation Question 10 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which of the following is NOT an Internetwork/Network layer protocol? Select one: a. ICMP b. ARP c. IP d. UDP Question 11 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which configuration feature can you use on a switch to group a network into more than one broadcast domains? Select one: a. IGMP b. Port security c. STP d. VLANs Question 12 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text You are the network administrator for a company that uses a private addressing scheme for its internal network. You have 10 workstations that regularly access the Internet. What process must be in operation on your network to allow all these workstations to have access to the Internet using only one public IP address? Select one: a. DNS b. DHCP c. TCP d. PAT e. UPD Question 13 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text In a switching table, each record contains two parts: _______. Select one: a. application and destination port number b. MAC address and switch port number c. destination network and next Hop d. IP address and exit interface Question 14 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Each IPv6 address is made up of _________ bits. Select one: a. 64 b. 256 c. 48 d. 128 e. 32 Question 15 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text The ____________ can be configured to provide rules applied to port numbers or IP addresses to allow or prevent a list of hosts or networks from using network resources or services. Select one: a. Spanning Tree Protocol b. MAC filtering c. Dynamic routing d. Access control lists Question 16 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text From the following options, which are IPv6 features to enhance IPv4? (Choose all that apply) Select one or more: a. Larger address space b. Works at the Internetwork and Transport layers c. Built-in security d. Connectionless communication Question 17 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which procedure specifies what resources users can access and the tasks they can perform on a network? Select one: a. Authentication b. Access control c. Authorization d. Auditing Question 18 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which of the following terms refers to attacking a Web server by forcing it to respond to a flood of ping packets so that the server is not able to respond to normal (genuine) service requests? Select one: a. DoS b. Worm c. DDR d. ICMP Question 19 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text A router operates in ________ layer. Select one: a. Transport b. Network Access c. Application d. Internetwork Question 20 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text From the following options, select all that are in the guidelines of a security policy (choose all that apply). Select one or more: a. should be enforceable b. easy for users to understand c. clearly state the policy objectives d. uses legal terminology to protect the organization Question 21 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Subnetting is used to _________. Select one: a. define network and host portions of an IP address. b. allow user to use a computer's name rather than its address c. allow automated IP address configuration d. provide encryption in a TCP/IP network Question 22 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which of the following features are provided by TCP? Select one or more: a. congestion control b. data delivery c. segmentation of data d. error control e. addressing f. connection setup g. flow control Question 23 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which of the following is considered a Layer 3 device? Select one: a. Repeater b. Hub c. Router d. Switch Question 24 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Which address is described as _________ that a datagram sent to this address will be received by the sender? Select one: a. network address b. hardware address c. local broadcast address d. directed broadcast address e. loopback address f. startup source address Question 25 Not yet answered Marked out of 1.00 Not flaggedFlag question Question text Most users identify server computers in the Internet using: Select one: a. URLs b. domain names c. protocol numbers d. hardware addresses e. port numbers f. IP addresses

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Flash XML Applications Use AS2 And AS3 To Create Photo Galleries Menus And Databases

Authors: Joachim Schnier

1st Edition

0240809173, 978-0240809175

More Books

Students also viewed these Databases questions