AH and ESP Protocols Interview/Exam Question-Answer
Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec? ...
Read more
UDP Interview/Exam Question-Answer
Q.1 Return value of the UDP port “Chargen” is _______. A. String of integers ...
Read more
TCP Interview/Exam Question-Answer
Q.1 In TCP, sending and receiving data is done as _______. A. Sequence of characters ...
Read more
Telnet Interview/Exam Question-Answer Part 2
Q.1 Which one of the following is not true? A. client programs interact with NVT ...
Read more
Telnet Interview/Exam Question-Answer Part 1
Q.1 Select correct option for “character at a time” mode? A. Most text typed is immediately sent ...
Read more
SNMP Interview/Exam Question-Answer
Q.1 Full duplex mode increases the capacity of each domain by ________. A. 30 to 40 mbps ...
Read more
SMI Interview/Exam Question-Answer
Q.1 Which of the following is not a storage device? A. RAID Arrays B. ...
Read more
Virtual Private Networks Interview/Exam Question-Answer
Q.1 When were VPNs introduced into the commercial world? A. Early 90’s B. Late ...
Read more
IPSecurity Interview/Exam Question-Answer
Q.1 In tunnel mode, IPSec protects the ______. A. IP header B. Entire IP ...
Read more
DHCP Interview/Exam Question-Answer Part – 2
Q.1 After obtaining the IP address, to prevent the IP conflict the client may use _________. A. ...
Read more