In telephony different types of connections are being used. The connection from the
phone company's branch office to local customers is referred to as which of
the following choices?
A. new loop
B. local loop
C. loopback
D. indigenous loop
Give this one a try later!
B. local loop
How would an IP spoofing attack be best classified?
A. Session hijacking attack
B. Passive attack
C. Fragmentation attack
D. Sniffing attack
,Give this one a try later!
A. session hijacking attack
Secure Shell (SSH-2) provides all the following services except:
A. secure remote login
B. command execution
C. port forwarding
D. user authentication
Give this one a try later!
D. user authentication
Why are coaxial cables called "coaxial"?
A. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis.
B. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis
C. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another two concentric physical channels, both running along
the same axis.
D. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running perpendicular
and along the different axis
Give this one a try later!
B. it includes one physical channel that carries the signal surrounded (after
a layer of insulation) by another concentric physical channel, both running
, along the
same axis
Which of the following standards is concerned with message handling?
A. X.400
B. X.500
C. X.509
D. X.800
Give this one a try later!
A. X.400
What is also known as 10Base5?
A. Thinnet
B. Thicknet
C. ARCnet
D. UTP
Give this one a try later!
B. thicknet
Which of the following is a LAN transmission method?
A. Broadcast
B. Carrier-sense multiple access with collision detection (CSMA/CD)
C. Token ring
D. Fiber Distributed Data Interface (FDDI)
Give this one a try later!
, A. Broadcast
A server cluster looks like a:
A. single server from the user's point of view
B. dual server from the user's point of view
C. triple server from the user's point of view
D. quardle server from the user's point of view
Give this one a try later!
A. single server from the user's point of view
Which of the following protocols operates at the session layer (layer 5)?
A. RPC
B. IGMP
C. LPD
D. SPX
Give this one a try later!
A. RPC
If any server in the cluster crashes, processing continues transparently, however, the
cluster suffers some performance degradation. This implementation is sometimes
called a:
A. server farm
B. client farm
C. cluster farm
D. host farm
phone company's branch office to local customers is referred to as which of
the following choices?
A. new loop
B. local loop
C. loopback
D. indigenous loop
Give this one a try later!
B. local loop
How would an IP spoofing attack be best classified?
A. Session hijacking attack
B. Passive attack
C. Fragmentation attack
D. Sniffing attack
,Give this one a try later!
A. session hijacking attack
Secure Shell (SSH-2) provides all the following services except:
A. secure remote login
B. command execution
C. port forwarding
D. user authentication
Give this one a try later!
D. user authentication
Why are coaxial cables called "coaxial"?
A. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis.
B. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running along the
same axis
C. it includes two physical channels that carries the signal surrounded (after a layer of
insulation) by another two concentric physical channels, both running along
the same axis.
D. it includes one physical channel that carries the signal surrounded (after a layer of
insulation) by another concentric physical channel, both running perpendicular
and along the different axis
Give this one a try later!
B. it includes one physical channel that carries the signal surrounded (after
a layer of insulation) by another concentric physical channel, both running
, along the
same axis
Which of the following standards is concerned with message handling?
A. X.400
B. X.500
C. X.509
D. X.800
Give this one a try later!
A. X.400
What is also known as 10Base5?
A. Thinnet
B. Thicknet
C. ARCnet
D. UTP
Give this one a try later!
B. thicknet
Which of the following is a LAN transmission method?
A. Broadcast
B. Carrier-sense multiple access with collision detection (CSMA/CD)
C. Token ring
D. Fiber Distributed Data Interface (FDDI)
Give this one a try later!
, A. Broadcast
A server cluster looks like a:
A. single server from the user's point of view
B. dual server from the user's point of view
C. triple server from the user's point of view
D. quardle server from the user's point of view
Give this one a try later!
A. single server from the user's point of view
Which of the following protocols operates at the session layer (layer 5)?
A. RPC
B. IGMP
C. LPD
D. SPX
Give this one a try later!
A. RPC
If any server in the cluster crashes, processing continues transparently, however, the
cluster suffers some performance degradation. This implementation is sometimes
called a:
A. server farm
B. client farm
C. cluster farm
D. host farm