Additional Network Questions

¡Supera tus tareas y exámenes ahora con Quizwiz!

What network technology uses fixed-length cells to carry data? ARCHNET ATM Ethernet FDDI

B

Restricting Bluetooth device discovery relies on the secrecy of what? MAC Address Symmetric Key Private Key Public Key

A

What is the most secure type of EAP? EAP-TLS EAP-TILS LEAP PEAP

A

Which of the following authentication protocols uses a three-way authentication handshake? CHAP EAP Kerberos PAP

A

What WAN Protocol has no error recovery, relying on higher-level protocols to provide reliability? ATM Frame Relay SMDS X.25

B

What network cable type can transmit the most data at the longest distance? Coaxial Fiber Optic Shielded Twisted Pair (STP) Unshielded Twisted Pair (UTP)

B

Secure Shell (SSH) servers listen on what port and protocol? TCP port 20 TCP port 21 TCP port 22 TCP port 22

C

What are the names of the OSI model, in order from bottom up? Physical, Data Link, Transport, Network, Session, Presentation, Application Physical, Network, Data Link, Transport, Session, Presentation, Application Physical, Data Link, Network, Transport, Session, Presentation, Application Physical, Data Link, Network, Transport, Presentation, Session, Application

C

What device operated at Layer 2 of the OSI model? Hub Firewall Switch Router

C

Which endpoint security technique is the most likely to prevent a previously unknown attach fro being successful? Signature-based anti-virus Host Intrusion Detection Systems (HIDS) Application Whitelisting Perimeter firewall

C

Accessing an IPv6 network via an IPv4 network is called what? CIDR NAT Translation Tunneling

D

What is the most secure type of firewall? Packet Filter Stateful Firewall Circuit-level Proxy Firewall Application-layer Proxy Firewall

D

Which protocol should be used for an audio streaming server, where some loss is acceptable? IP ICMP TCP UDP

D

Which transmission mode is supported by both HDLC and SDLC? Asynchronous Balanced Mode (ABM) Asynchronous Response Mode (ABM) Normal Balanced Mode (NBM) Normal Response Mode (NBM)

D

Which wireless security protocol is also known as the RSN (Robust Security Network) and implements the full 802.11i standard? AES WEP WPA WPA2

D


Conjuntos de estudio relacionados

Cognitive Psychology, exam 1 (study for final)

View Set

Ch 17 Innate Nonspecific Host Defenses

View Set

Chapter 11-13 test for intro to business

View Set

POSTPARTUM NEWBORN AND INFANT EXAM

View Set

Health Assessment Exam 1, Health Assessment - MS, Neuro, & GU, Health Assessment Exam 2

View Set