AH and ESP Protocols Interview/Exam Question-Answer

Q.1 Which two types of encryption protocols can be used to secure the authentication of computers using IPsec?     ...
Read more

UDP Interview/Exam Question-Answer

Q.1 Return value of the UDP port “Chargen” is _______.        A. String of integers       ...
Read more

TCP Interview/Exam Question-Answer

Q.1 In TCP, sending and receiving data is done as _______.        A. Sequence of characters     ...
Read more

Telnet Interview/Exam Question-Answer Part 2

Q.1 Which one of the following is not true?        A. client programs interact with NVT     ...
Read more

Telnet Interview/Exam Question-Answer Part 1

Q.1 Select correct option for “character at a time” mode?        A. Most text typed is immediately sent ...
Read more

SNMP Interview/Exam Question-Answer

Q.1 Full duplex mode increases the capacity of each domain by ________.        A. 30 to 40 mbps ...
Read more

SMI Interview/Exam Question-Answer

Q.1 Which of the following is not a storage device?        A. RAID Arrays        B. ...
Read more

Virtual Private Networks Interview/Exam Question-Answer

Q.1 When were VPNs introduced into the commercial world?        A. Early 90’s        B. Late ...
Read more

IPSecurity Interview/Exam Question-Answer

Q.1 In tunnel mode, IPSec protects the ______.        A. IP header        B. Entire IP ...
Read more

DHCP Interview/Exam Question-Answer Part – 2

Q.1 After obtaining the IP address, to prevent the IP conflict the client may use _________.        A. ...
Read more