AH and ESP Protocols Interview/Exam Question-Answer

Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?     ...
Read more

UDP Interview/Exam Question-Answer

Q.1 Return value of the UDP port “Chargen” is _______.        A. String of integers       ...
Read more

TCP Interview/Exam Question-Answer

Q.1 In TCP, sending and receiving data is done as _______.        A. Sequence of characters     ...
Read more

Telnet Interview/Exam Question-Answer Part 2

Q.1 Which one of the following is not true?        A. client programs interact with NVT     ...
Read more

Telnet Interview/Exam Question-Answer Part 1

Q.1 Select correct option for “character at a time” mode?        A. Most text typed is immediately sent ...
Read more

SNMP Interview/Exam Question-Answer

Q.1 Full duplex mode increases the capacity of each domain by ________.        A. 30 to 40 mbps ...
Read more

SMI Interview/Exam Question-Answer

Q.1 Which of the following is not a storage device?        A. RAID Arrays        B. ...
Read more

Virtual Private Networks Interview/Exam Question-Answer

Q.1 When were VPNs introduced into the commercial world?        A. Early 90’s        B. Late ...
Read more

IPSecurity Interview/Exam Question-Answer

Q.1 In tunnel mode, IPSec protects the ______.        A. IP header        B. Entire IP ...
Read more

DHCP Interview/Exam Question-Answer Part – 2

Q.1 After obtaining the IP address, to prevent the IP conflict the client may use _________.        A. ...
Read more

OSI Model

smart_answer13

AH and ESP Protocols Interview/Exam Question-Answer

Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?        A. SHA        B. Kerberos ...

smart_answer13

UDP Interview/Exam Question-Answer

Q.1 Return value of the UDP port “Chargen” is _______.        A. String of integers        B. String of characters        C. ...

smart_answer13

TCP Interview/Exam Question-Answer

Q.1 In TCP, sending and receiving data is done as _______.        A. Sequence of characters        B. Stream of bytes       ...

smart_answer13

Telnet Interview/Exam Question-Answer Part 2

Q.1 Which one of the following is not true?        A. client programs interact with NVT        B. telnet defines a network virtual terminal ...

smart_answer13

Telnet Interview/Exam Question-Answer Part 1

Q.1 Select correct option for “character at a time” mode?        A. Most text typed is immediately sent to the remote host for processing     ...

smart_answer13

SNMP Interview/Exam Question-Answer

Q.1 Full duplex mode increases the capacity of each domain by ________.        A. 30 to 40 mbps        B. 10 to 20 mbps ...

smart_answer13

SMI Interview/Exam Question-Answer

Q.1 Which of the following is not a storage device?        A. RAID Arrays        B. Switch        C. Hub     ...

smart_answer13

Virtual Private Networks Interview/Exam Question-Answer

Q.1 When were VPNs introduced into the commercial world?        A. Early 90’s        B. Late 90’s        C. Early 80’s   ...

smart_answer13

IPSecurity Interview/Exam Question-Answer

Q.1 In tunnel mode, IPSec protects the ______.        A. IP header        B. Entire IP packet        C. IP payload   ...

smart_answer13

DHCP Interview/Exam Question-Answer Part – 2

Q.1 After obtaining the IP address, to prevent the IP conflict the client may use _________.        A. Broader gateway protocol        B. Internet ...

1234 Next