Copper cabling comes under the _______ layer of the OSI model.
Which of the following protocols are used to provide secure communication between a client and a server over the Internet?
Each correct answer represents a part of the solution. Choose two.
Which of the following two components does Kerberos Key Distribution Center (KDC) consist of?
Each correct answer represents a complete solution. Choose two.
Which of the following entities is used by Routers and firewalls to determine which packets should be forwarded or dropped?
Which of the following key sizes is used by International Data Encryption Algorithm (IDEA)?
International Data Encryption Algorithm (IDEA) is a __________ block cipher.
The TCP/IP protocol suite uses ____ to identify which service a certain packet is destined for.
Which of the following ports is used by a BOOTP server?
Which of the following are the types of access controls?
Each correct answer represents a complete solution. Choose three.
Which of the following is the most secure method of authentication?
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you in achieving your aim?
Which of the following components come under the physical layer of the OSI model?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following occurs when a packet is sent from a source computer to a destination computer?
Which of the following protocols is responsible for the resolution of IP addresses to media access control (MAC) addresses?
Which of the following are intrusion detection device?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GIAC Free Exams |
---|
![]() |