Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What works as an E-mail message transfer agent?

A.

SMTP

B.

SNMP

C.

S-RPC

D.

S/MIME

Which of the following is the most secure firewall implementation?

A.

Dual-homed host firewalls

B.

Screened-subnet firewalls

C.

Screened-host firewalls

D.

Packet-filtering firewalls

Which OSI/ISO layer is the Media Access Control (MAC) sublayer part of?

A.

Transport layer

B.

Network layer

C.

Data link layer

D.

Physical layer

Which OSI/ISO layers are TCP and UDP implemented at?

A.

Application layer

B.

Presentation layer

C.

Session layer

D.

Transport layer

When a station communicates on the network for the first time, which of the following protocol would search for and find the Internet Protocol (IP) address that matches with a known Ethernet address?

A.

Address Resolution Protocol (ARP).

B.

Reverse Address Resolution Protocol (RARP).

C.

Internet Control Message protocol (ICMP).

D.

User Datagram Protocol (UDP).

Which of the following ports does NOT normally need to be open for a mail server to operate?

A.

Port 110

B.

Port 25

C.

Port 119

D.

Port 143

What protocol is used on the Local Area Network (LAN) to obtain an IP address from it's known MAC address?

A.

Reverse address resolution protocol (RARP)

B.

Address resolution protocol (ARP)

C.

Data link layer

D.

Network address translation (NAT)

A group of independent servers, which are managed as a single system, that provides higher availability, easier manageability, and greater scalability is:

A.

server cluster

B.

client cluster

C.

guest cluster

D.

host cluster

Which of the following is the biggest concern with firewall security?

A.

Internal hackers

B.

Complex configuration rules leading to misconfiguration

C.

Buffer overflows

D.

Distributed denial of service (DDOS) attacks

Which of the following protocols operates at the session layer (layer 5)?

A.

RPC

B.

IGMP

C.

LPD

D.

SPX

What layer of the ISO/OSI model do routers normally operate at?

A.

Data link layer

B.

Session layer

C.

Transport layer

D.

Network layer

Secure Shell (SSH-2) provides all the following services except:

A.

secure remote login

B.

command execution

C.

port forwarding

D.

user authentication

Which of the following transmission media would NOT be affected by cross talk or interference?

A.

Copper cable

B.

Radio System

C.

Satellite radiolink

D.

Fiber optic cables

What is the greatest danger from DHCP?

A.

An intruder on the network impersonating a DHCP server and thereby misconfiguring the DHCP clients.

B.

Having multiple clients on the same LAN having the same IP address.

C.

Having the wrong router used as the default gateway.

D.

Having the organization's mail server unreachable.

Which of the following does NOT use token-passing?

A.

ARCnet

B.

FDDI

C.

Token-ring

D.

IEEE 802.3

Which of the following layers provides end-to-end data transfer service?

A.

Network Layer.

B.

Data Link Layer.

C.

Transport Layer.

D.

Presentation Layer.

Each data packet is assigned the IP address of the sender and the IP address of the:

A.

recipient.

B.

host.

C.

node.

D.

network.

Which one of the following is usually not a benefit resulting from the use of firewalls?

A.

reduces the risks of external threats from malicious hackers.

B.

prevents the spread of viruses.

C.

reduces the threat level on internal system.

D.

allows centralized management and control of services.

How many bits of a MAC address uniquely identify a vendor, as provided by the IEEE?

A.

6 bits

B.

12 bits

C.

16 bits

D.

24 bits

Which of the following was designed to support multiple network types over the same serial link?

A.

Ethernet

B.

SLIP

C.

PPP

D.

PPTP