Exam 2: Introduction to Networking
Exam 1: Introduction to Information Security50 Questions
Exam 2: Introduction to Networking50 Questions
Exam 3: Cryptography50 Questions
Exam 4: Firewall Technologies and Administration50 Questions
Exam 5: Network Authentication and Remote Access Using Vpn50 Questions
Exam 6: Network Monitoring and Intrusion Detection and Prevention Systems50 Questions
Exam 7: Wireless Network Security49 Questions
Exam 8: Security of Web Applications50 Questions
Exam 9: Network Vulnerability Assessment49 Questions
Exam 10: Auditing, Monitoring, and Logging50 Questions
Exam 11: Contingency Planning and Networking Incident Response50 Questions
Exam 12: Digital Forensics50 Questions
Select questions type
Which port number is used by the Telnet protocol?
Free
(Multiple Choice)
4.8/5
(42)
Correct Answer:
D
The process of modification or manipulation of the medium so that it can carry the message is known as ____________________.
Free
(Short Answer)
4.8/5
(40)
Correct Answer:
modulation
Match each item with a statement below.
a.Application
f.Data Link
b.Presentation
g.Physical
c.Session
h.Internet
d.Transport
i.Subnet
e.Network
-A TCP/IP network model layer that includes the Data Link layer and the Physical layer.
Free
(Short Answer)
4.7/5
(33)
Correct Answer:
I
In ____ polling, the central control unit, usually a server, polls each client to determine if it has traffic to transmit.
(Multiple Choice)
4.8/5
(34)
Which term refers to unwanted noise from a signal coming across the media at multiple frequencies?
(Multiple Choice)
4.8/5
(37)
____ is now the de facto industry standard for short range wireless communications between devices.
(Multiple Choice)
4.8/5
(35)
Match each item with a statement below.
a.Application
f.Data Link
b.Presentation
g.Physical
c.Session
h.Internet
d.Transport
i.Subnet
e.Network
-An OSI network model layer responsible for networking support.
(Short Answer)
4.8/5
(37)
Which protocol is used for modifying and querying directory services?
(Multiple Choice)
4.8/5
(37)
Match each item with a statement below.
a.Application
f.Data Link
b.Presentation
g.Physical
c.Session
h.Internet
d.Transport
i.Subnet
e.Network
-An OSI network model layer responsible for providing reliable end-to-end transfer of data between user applications.
(Short Answer)
4.7/5
(26)
Match each item with a statement below.
a.Application
f.Data Link
b.Presentation
g.Physical
c.Session
h.Internet
d.Transport
i.Subnet
e.Network
-An OSI network model layer responsible for communications between networks.
(Short Answer)
4.9/5
(46)
At the physical layer, a(n) ____________________ is a device that provides a physical connection between a system and a network.
(Short Answer)
4.9/5
(42)
Which protocol is typically used for applications such as streaming media?
(Multiple Choice)
4.9/5
(33)
Match each item with a statement below.
a.Application
f.Data Link
b.Presentation
g.Physical
c.Session
h.Internet
d.Transport
i.Subnet
e.Network
-An OSI network model layer responsible for placing the transmission signal carrying the message onto the communications media.
(Short Answer)
4.7/5
(33)
Describe the primary focus of security at the Physical layer and explain where it is most problematic.
(Essay)
4.8/5
(33)
Showing 1 - 20 of 50
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)