Topic 2: Volume B
You work as a Network Administrator for Net Perfect Inc. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network. Which of the following types of firewalls will you configure to accomplish the task?
A. Stateful firewall
B. Host-based application firewall
C. A network-based application layer firewall
D. An application firewall
Which of the following protocols is used to compare two values calculated using the Message Digest (MD5) hashing function?
A. CHAP
B. PEAP
C. EAP
D. EAP-TLS
You work as a Network Administrator of a TCP/IP network. You are having DNS resolution problem. Which of the following utilities will you use to diagnose the problem?
A. TRACERT
B. PING
C. IPCONFIG
D. NSLOOKUP
Which of the following is a correct sequence of different layers of Open System Interconnection (OSI) model?
A. Physical layer, data link layer, network layer, transport layer, presentation layer, session layer, and application layer
B. Physical layer, network layer, transport layer, data link layer, session layer, presentation layer, and application layer
C. application layer, presentation layer, network layer, transport layer, session layer, data link layer, and physical layer
D. Physical layer, data link layer, network layer, transport layer, session layer, presentation layer, and application layer
Which of the following categories of access controls is deployed in the organization to prevent all direct contacts with systems?
A. Detective access control
B. Physical access control
C. Technical access control
D. Administrative access control
Page 9 out of 48 Pages |
Previous |