Filters
Question type

Study Flashcards

What is the term used for a device that requests permission from an authenticator to join a network?​


A) ​Remote client
B) ​Supplicant
C) Widget
D) ​Requester

Correct Answer

verifed

verified

Matching -Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA) ​


A) Audit log
B) Event log
C) File Transfer Protocol (FTP)
D) Flood guard
E) FTP Secure (FTPS)
F) Host elasticity
G) Loop protection
H) Snapshot
I) Telnet
J) Virtualization

Correct Answer

verifed

verified

What are the two types of community strings?

Correct Answer

verifed

verified

There are two types of communi...

View Answer

At what level of the OSI model does the IP protocol function?


A) Transport Layer
B) Network Layer
C) Data link Layer
D) Presentation Layer

Correct Answer

verifed

verified

List the steps in an 802.1x authentication procedure.

Correct Answer

verifed

verified

If approved, the supplicant can now join the network and transmit data.

Despite its promise to dramatically impact IT, cloud computing raises significant security concerns.

Correct Answer

verifed

verified

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?


A) bridge
B) router
C) switch
D) hub

Correct Answer

verifed

verified

Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices?


A) Application Layer
B) Presentation Layer
C) Network Layer
D) Transport Layer

Correct Answer

verifed

verified

Matching -​The ability to easily expand or contract resources in a virtualized environment.


A) Audit log
B) Event log
C) File Transfer Protocol (FTP)
D) Flood guard
E) FTP Secure (FTPS)
F) Host elasticity
G) Loop protection
H) Snapshot
I) Telnet
J) Virtualization

Correct Answer

verifed

verified

F

Matching -​Log that documents any unsuccessful events and the most significant successful events.


A) Audit log
B) Event log
C) File Transfer Protocol (FTP)
D) Flood guard
E) FTP Secure (FTPS)
F) Host elasticity
G) Loop protection
H) Snapshot
I) Telnet
J) Virtualization

Correct Answer

verifed

verified

List the steps of a DNS lookup.

Correct Answer

verifed

verified

Step 1. The request for the IP address o...

View Answer

Why is the Physical Layer omitted in the TCP/IP model?

Correct Answer

verifed

verified

The Physical Layer is omitted in the TCP...

View Answer

Matching -A feature that controls a device's tolerance for unanswered service requests and helps to prevent a DoS or DDoS attack.​


A) Audit log
B) Event log
C) File Transfer Protocol (FTP)
D) Flood guard
E) FTP Secure (FTPS)
F) Host elasticity
G) Loop protection
H) Snapshot
I) Telnet
J) Virtualization

Correct Answer

verifed

verified

D

Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.


A) WINS
B) NIS
C) TACACS+
D) DNS

Correct Answer

verifed

verified

List and describe the three service models of cloud computing.

Correct Answer

verifed

verified

Cloud Software as a Service (SaaS). In t...

View Answer

____________________ computing is a model for enabling convenient, on-demand network access to a shared pool of configurable computing resources that can be rapidly provisioned and released with minimal management effort or service provider interaction.

Correct Answer

verifed

verified

DNS poisoning can be prevented using the latest edition of what software below?


A) BIND
B) DHCP
C) WINS
D) finger

Correct Answer

verifed

verified

Matching -​An older TCP/IP protocol and an application used for text-based commmunication


A) Audit log
B) Event log
C) File Transfer Protocol (FTP)
D) Flood guard
E) FTP Secure (FTPS)
F) Host elasticity
G) Loop protection
H) Snapshot
I) Telnet
J) Virtualization

Correct Answer

verifed

verified

Matching -​A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.


A) Audit log
B) Event log
C) File Transfer Protocol (FTP)
D) Flood guard
E) FTP Secure (FTPS)
F) Host elasticity
G) Loop protection
H) Snapshot
I) Telnet
J) Virtualization

Correct Answer

verifed

verified

With operating system virtualization, a(n) ____________________ system is the native operating system to the hardware.

Correct Answer

verifed

verified

Showing 1 - 20 of 50

Related Exams

Show Answer