Description : Security methods such as private encryption, VLANs and firewalls comes under __________ subject area. a) Accounting Management b) Compliance c) Data Privacy d) All of the mentioned
Last Answer : Data Privacy
Description : PGP is one of the protocols used to provide security at the ……….. It is designed to create authenticated and confidential ………. A. application layer, e-mails. B. Network layer, packets C. application layer, packets D. network layer , e-mails
Last Answer : A. application layer, e-mails
Description : VLANs and IP addresses resources are made available to end user via? A. Server virtualization. B. Client virtualization. C. End-user virtualization. D. IaaS
Last Answer : Server virtualization
Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE
Last Answer : Network Monitor
Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the bus speed. ii) It is multipoint configuration. A) True, True B) B) True, False C) False, True D) False, False
Last Answer : A) True, True
Description : What is one advantage of setting up a DMZ(Demilitarized Zone) with two firewalls? a. You can control where traffic goes in the three networks b. You can do stateful packet filtering c. You can do load balancing d. Improve network performance
Last Answer : a. You can control where traffic goes in the three networks
Description : Congestion control can control traffic entry into a telecommunications network, so to avoid _________ a. Congestive connection b. Connection collapse c. Congestive collapse d. Collapse congestive
Last Answer : c. Congestive collapse
Description : A firewall is a network security system ______based that controls incoming and outgoing network traffic based on a set of rules: a) Hardware b) Software c) Both hardware or software d) None of These
Last Answer : c) Both hardware or software
Description : Which among the following is correct: a) Network firewalls are a software appliance running on general purpose hardware or hardware based firewall computer appliances that filter traffic between two or more networks. b ... traffic in and out of that single machine c) Both of Above d) None of These
Last Answer : c) Both of Above
Description : With reference to Traffic Collision Avoidance Systems, the difference between TCAS I and II is that: a. TCAS II can provide Traffic Advisories and Resolution Advisories whilst TCAS I can only provide Traffic ... C or Mode S. d. TCAS II can only be to aircraft which are equipped with EFIS
Last Answer : a. TCAS II can provide Traffic Advisories and Resolution Advisories whilst TCAS I can only provide Traffic Advisories
Description : In IEEE 802.11, _______ isan optionalaccess method that can be implemented inan infrastructure network (not in an ad hocnetwork). A) DCF B) PCF C) either (a) or (b) D) neither (a) nor (b)
Last Answer : PCF
Description : A ring SONET network can be _________. A) unidirectional B) bidirectional. C) either (a) or (b) D) neither (a) nor (b)
Last Answer : bidirectional.
Description : A linear SONET network can be __________. A) point-to-point B) multipoint C) either (a) or (b) D) neither (a) nor (b)
Last Answer : point-to-point
Description : The sender is a router thathas receiveda datagram destinedfor a host on thesame network. The logical address that mustbe mapped to a physical address is ______. A) thedestination IP address in the datagram ... IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : thedestination IP address in the datagram header
Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above
Last Answer : the IP address of therouter found inthe routing table
Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b
Last Answer : B. -i
Description : The _____ layer uses data compression to reduce the number of bits to be transmitted. a. presentation b. network c. data link d. application
Last Answer : a. presentation
Description : An unauthorized user is a network _______ issue. A) Performance B) Reliability C) Security D) All the above
Last Answer : Security
Description : Frequencyof failure and network recovery time after a failure are measures of the_______of a network. A) Performance B) Reliability C) Security D) Feasibility
Last Answer : Reliability
Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS
Last Answer : Virtual Private Network
Description : Security based connection is provided by which layer? a. Network layer b. Session layer c. Application layer d. Transport layer
Last Answer : d. Transport layer
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : Which of the following are true about firewalls? 1) Filters network traffic 2) Can be either a hardware or software device 3) Follows a set of rules 4) All the above
Last Answer : 4) All the above
Description : Which of the following are true about firewalls? 1 Filters network traffic 2 Can be either a hardware or software device 3 Follows a set of rules 4 All the above
Last Answer : 4 All the above
Description : How can we reduce the network traffic?
Last Answer : Replication of data in distributed environment. - Using snapshots to replicate data. - Using remote procedure calls.
Description : Autotransformer starters or compensators are sometimes used with polyphase induction motors to _____________. A. reduce the voltage applied to the motor during the starting period B. increase the voltage for ' ... to be either stepped up or down, depending on the application, to ensure full torque
Last Answer : Answer: A
Description : The subnet gets increasingly loaded with packets causing increase in delay in the delivery of packets, which can lead to more retransmission, and ultimately increasing more and more traffic. This is a concept called as _________ A. blockage B. Traffic jam. C. Congestion D. both a and b
Last Answer : C. Congestion
Description : Which type of channel it is where the number of users are stable and the traffic is not bursts? A. static channel B. dynamic channel C. free channel D. both a and c
Last Answer : A. static channel
Description : If a firm, or a network firm, has a direct financial interest in an audit client of the firm, the self-interest threat created would be so significant no safeguard could reduce the threat to an acceptable ... that the remaining interest is no longer material. c. Either a or b d. Neither a nor b
Last Answer : Dispose of the financial interest
Description : The............................. Is a collection of protocols designed by Internet Engineering TaskForce(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Last Answer : A) IPsec
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Last Answer : B) i, iii, iv and v only
Description : The …………………………. Is a collection of protocols designed by Internet Engineering Task Force(IETF) to provide security for a packet at the Network level. A) IPsec B) Netsec C) Packetsec D) Protocolsec
Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks ... only C) ii, iii, iv and v only D) All i, ii, iii, iv and v
Description : __________ is a measure of whether the operation is inside or outside the security boundary or network firewall. a) Per b) P c) Pre d) All of the mentioned
Last Answer : All of the mentioned
Description : What does PPTP stand for ? Point to Point Transmission Protocol Point to Point Transfer Protocol Point to Point Tunneling Protocol Point to Point Traffic Protoco
Last Answer : Point to Point Tunneling Protocol
Description : Which of the following communication modes support two-way traffic but in only one direction at a time? a. simplex b. half duplex c. three-quarters duplex d. all of the above e. none of the above
Last Answer : half duplex
Description : In ATM, the ______ layerprovides routing, traffic management, switching, and multiplexing services. A) physical B) ATM C) AAL D) none of the above
Last Answer : ATM
Description : The communication modethat supports two-way traffic but only one direction at atime is A. simplex B. duplex C. half duplex D. multiplex E. None of the above
Description : Which of the communication modes support two way traffic but in only once direction of a time? A) Simplex B) Half-duplex C) Three - quarter's duplex D) Full duplex
Last Answer : B) Half-duplex
Description : Which algorithm is used to shape the bursty traffic into a fixed rate traffic by averaging the data rate? a. solid bucket algorithm b. spanning tree algorithm c. hocken helm algorithm d. leaky bucket algorithm
Last Answer : d. leaky bucket algorithm
Description : A layer-4 firewall (a device that can look at all protocol headers up to the transport layer) CANNOT a. block entire HTTP traffic during 9:00PM and 5 :0OAM b. block all ICMP traffic c. stop ... address d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Last Answer : d. block TCP traffic from a specific user on a multi-user system during 9:00PM and 5:00AM
Description : Transport layer can identify the symptoms of overload nodes using _________ a. Flow control b. Traffic control c. Byte orientation d. Data integrity
Last Answer : b. Traffic control
Description : Buffer overrun can be reduced by using what? a. Traffic control b. Flow control c. Byte orientation d. Data integrity
Last Answer : b. Flow control
Description : __________ do not take their decisions on measurements or estimates of the current traffic and topology. a. Static algorithms b. Adaptive algorithms c. Non - adaptive algorithms d. Recursive algorithms
Last Answer : c. Non - adaptive algorithms
Description : Which one of the following algorithm is not used for congestion control? a. traffic aware routing b. admission control c. load shedding d. routing information protocol
Last Answer : d. routing information protocol
Description : In_______, collisions are avoidedthrough theuse of three strategies: the interframe space, the contention window,and acknowledgments. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)
Last Answer : CSMA/CA
Description : Toavoid collisions on wireless networks, ________was invented. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)
Description : In ________,a station monitors the medium after it sends a frame to see if the transmission was successful. If so, the station is finished. If, however, there is a collision, the frameis sentagain. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b)
Last Answer : CSMA/CD
Description : __________ augments the CSMA algorithm todetect collision. A) CSMA/CA B) CSMA/CD C) either (a)or (b) D) both (a) and (b
Description : In _______, collisions are avoided through the use of three strategies: the interframe space, the contention window, and acknowledgments. A. CSMA/CA B. CSMA/CD C. either (a) or (b) D. both (a) and (b)
Last Answer : A. CSMA/CA