Which of the following acronyms refers to a network security solution combining the functionalitiy of a firewall with additional safeguards such as URL filtering, content inspection or malware inspection?
A. MCGP
B. PGP
C. MTU
D. UTM
What is an example of active eavesdropping?
A. Phishing
B. MITM
C. DDoS
D. Vulcanbot
What is the size of an ATM cell?
A. 42 Bits
B. 78 Bytes
C. 23 Bits
D. 53 Bytes
What type of standard is LTE?
A. 1G
B. 2G
C. 3G
D. 4G
What is the maximum data transfer rate of an OC-12 connection?
A. 9953.28 Mbps
B. 622.08 Mbps
C. 1244.16 Mbps
D. 2488.32 Mbps
What is the typical cable segment length for a copper twisted-pair ethernet cable?
A. 250 Meters
B. 42 Meters
C. 65 Meters
D. 100 Meters
What is the most common type of a DSL internet access?
A. NDSL
B. PDSL
C. ADSL
D. UDSL
Internet Protocol Security (IPsec) reside at:
A. Transport Layer Of The OSI Model
B. Network Layer Of The OSI Model
C. Session Layer Of The OSI Model
D. Presentation Of The OSI Model
What refers to the process of the automated update of a routing table?
A. Static Routing
B. Route Redistribution
C. Dynamic Routing
D. Route Aggregation
Which of the following solutions hide the internal IP addresses by modifying IP addresses by modifying IP address information in IP packet headers while in transit across a traffic routing device?
A. QoS
B. DHCP
C. NAT
D. DNS
Which OSI layer assumes the responsibility for managing network connections between applications?
A. Data Link Layer
B. Session Layer
C. Application Layer
D. Transport Layer
Address Resolution Protocol (ARP) provides what kind of resolution?
A. MAC To IP
B. Domain Name To IP
C. IP To MAC
D. IPV6 To IPV4
What are the characteristic features of satellite internet connections?
A. High Connection Speed
B. Low Connection Speed
C. Signal Latency
D. Interference (Weather Dependent)
What can you do to keep antivirus software up to date?
A. Virus Signature Updates
B. Drive Updates
C. OS Updates
D. Audit Trails
The IEEE 802.16 standards defining high-speed, long distance wireless communication are also commonly referred to as?
A. ISDN
B. SONET
C. WiMAX
D. HSPA+
In the OSI model, session layer is also known as which layer?
A. Layer 5
B. Layer 2
C. Layer 6
D. Layer 5
What is a manually configured routing entry known as?
A. Dynamic Route
B. Default Route
C. Route Redistribution
D. Static Route
What protocol was designed as a secure replacement for Telnet?
A. CHAP
B. LDAP
C. FTP
D. SSH
What twisted-pair copper cabling type is the most commonly used in modern Ethernet networks?
A. CAT5O
B. CAT5E
C. CAT6
D. CAT6B
What does the OSI model acronym stand for?
A. Open Source Integration
B. Open Systems Interconnection
C. Optimisation Service Institute
D. Organisational Service Integration
Which of following commands MS Windows is used to display help information related to a specific network command-line utility?
A. info [command]
B. [command] --help
C. [command] /?
D. man [command]
What does the process of hardening OS involve?
A. Disabling Unnecessary Services
B. Patching Vulnerabilities
C. Fixing Configuration Errors
D. Setting Up A Network-Based Firewall
What solution enables combining several physical ports into a single logical channel?
A. LACP
B. RSPCT
C. VRPR
D. HYSP
What IPsec mode provides entire packet encryption?
A. Payload
B. Transport
C. Tunnel
D. Reserved
What is a type of transmission that takes place in two directions simultaneously?
A. Simplex
B. Amplifier
C. Parallex
D. Full Duplex
What is a solution that provides a shielded environment that protects against signal leakage and eavesdropping?
A. Metasploit
B. Tempest
C. Maltego
D. Github
Which of the following commands would be used to display MAC address in Linux?
A. ifconfig
B. ipconfig/all
C. ipconfig
D. ipconfig –a
What are SHA and MDF examples of?
A. Trust Models
B. Virus Signatures
C. Encryption Algorithms
D. Hash Functions
A type of network covering large geographic areas is commonly referred to as:
A. MAN
B. WLAN
C. WAN
D. LAN
What extends the functionality of a conventional firewall by preventing the execution of malicious code?
A. Stateful Packet Inspection
B. Application Firewall
C. Dynamic Packet Filtering
D. Multi-Layer Switch
Oops! You need to select an answer to continue.