Topic 1: Volume A
Which of the following layers of the OSI model corresponds to the Host-to-Host layer of the TCP/IP model?
A. The transport layer
B. The presentation layer
C. The session layer
D. The application layer
You work as a Network Administrator for Net World Inc. You are required to configure a VLAN for the company. Which of the following devices will you use to physically connect the computers in the VLAN? Each correct answer represents a complete solution. Choose two.
A. Switch
B. Router
C. Bridge
D. Hub E. Repeater
Which of the following encryption methods does the SSL protocol use in order to provide communication privacy, authentication, and message integrity? Each correct answer represents a part of the solution. (Choose two).
A. Public key
B. IPsec
C. MS-CHAP
D. Symmetric
Which of the following security protocols provides confidentiality, integrity, and authentication of network traffic with end-to-end and intermediate-hop security?
A. IPSec
B. SET
C. SWIPE
D. SKIP
The service-oriented modeling framework (SOMF) provides a common modeling notation to address alignment between business and IT organizations. Which of the following principles does the SOMF concentrate on? Each correct answer represents a part of the solution. Choose all that apply.
A. Disaster recovery planning
B. SOA value proposition
C. Software assets reuse
D. Architectural components abstraction
E. Business traceability
Page 16 out of 48 Pages |
Previous |