865 538
Quiz by , created more than 1 year ago

administering a secure network

35
0
0
865 538
Created by 865 538 about 7 years ago
Close

nsf_07(8)

Question 1 of 10

1

Broadcast storms can be prevented with ____.

Select one of the following:

  • a. spanning tree

  • b. loop protection

  • c. Dijkstra’s algorithm

  • d. 802.11x

Explanation

Question 2 of 10

1

DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.

Select one of the following:

  • a. WINS

  • b. DHCP

  • c. BIND

  • d. finger

Explanation

Question 3 of 10

1

IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.

Select one of the following:

  • a. Presentation Layer

  • b. Transport Layer

  • c. Network Layer

  • d. Data link Layer

Explanation

Question 4 of 10

1

Routers operate at the ____ Layer.

Select one of the following:

  • a. Transport

  • b. Presentation

  • c. Network

  • d. Application

Explanation

Question 5 of 10

1

SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.

Select one of the following:

  • a. OID

  • b. entity

  • c. MIB

  • d. community string

Explanation

Question 6 of 10

1

TCP port ____ is the FTP control port used for passing FTP commands.

Select one of the following:

  • a. 19

  • b. 20

  • c. 21

  • d. 22

Explanation

Question 7 of 10

1

IEEE 802.1x is commonly used on wireless networks.

Select one of the following:

  • True
  • False

Explanation

Question 8 of 10

1

TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 10

1

TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.

Select one of the following:

  • True
  • False

Explanation

Question 10 of 10

1

Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.

Select one of the following:

  • a. hypercard

  • b. supervisor

  • c. hypervisor

  • d. kernel

Explanation