Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) geohashing
B) geofencing
C) geolocating
D) geolocking
Correct Answer
verified
Multiple Choice
A) EAP-TLS
B) Protected EAP (PEAP)
C) EAP-FAST
D) LEAP
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Advanced Encryption Standard (AES)
B) Rivest Cipher 4 (RC4)
C) Blowfish
D) Data Encryption Standard (DES)
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Only one root port, which is the bridge's port that is closest to the root bridge, can forward.
B) Only one root port, which is the bridge's port that is furthest from the root bridge, can forward.
C) All ports can forward frames to the root bridge, provided they are not in a down state.
D) All ports will forward frames to the root bridge, unless a BPDU is received back on that same port.
Correct Answer
verified
Multiple Choice
A) authentication
B) authorization
C) accounting
D) accessibility
Correct Answer
verified
Multiple Choice
A) STP must first select the root bridge, or master bridge.
B) STP examines the possible paths between all other bridges.
C) STP disables links that are not part of a shortest path.
D) STP begins to block BPDUs on non-designated ports.
Correct Answer
verified
Multiple Choice
A) Transparent Interconnection of Lots of Links (TRILL)
B) Shortest Path Bridging (SPB)
C) Rapid Spanning Tree Protocol (RSTP)
D) Multiple Spanning Tree Protocol (MSTP)
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Rapid Spanning Tree Protocol (RSTP)
B) Transparent Interconnection of Lots of Links (TRILL)
C) Shortest Path Bridging (SPB)
D) Multiple Spanning Tree Protocol (MSTP)
Correct Answer
verified
Multiple Choice
A) It is an advanced intrusion protection system with a GUI-frontend.
B) It is a system used to evaluate data from security devices and generate alerts.
C) It is an intellectual property protection software that prevents data links, and generates alerts.
D) It is a system that monitors security device hardware availability.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The Network layer protocol used for the packet.
B) The Transport layer protocol used for the packet.
C) The source or destination TCP/UDP port number in the packet.
D) The operating system used by the source or destination device.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) RBAC allows a network administrator to base privileges and permissions around a detailed description of a user's roles or jobs.
B) RBAC allows users to decide for themselves who has access to that user's resources.
C) RBAC organizes resources into hierarchical classifications, such as "confidential" or "top secret".
D) RBAC is the most restrictive method of access control.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) stateful firewall
B) stateless firewall
C) content-filtering firewall
D) packet-filtering firewall
Correct Answer
verified
Showing 21 - 40 of 50
Related Exams