If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
1.MAC address
2.IP address
3.Both MAC address and IP address
4. None of the mentioned
L2F was developed by which company?
1. Microsoft
2.Cisco
3.Blizzard Entertainment
4. IETF
The DHCP server can provide the _______ of the IP addresses.
1.dynamic allocation
2. automatic allocation
3. static allocation
4.all of the mentioned
Which component is included in IP security?
1.Authentication Header (AH)
2.Encapsulating Security Payload (ESP)
3. Internet key Exchange (IKE)
4.all of the mentioned
Which layer 3 protocols can be transmitted over an L2TP VPN?
1.Only IP
2.Only IPX
3.Only ICMP
4. IP and IPX
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.
1. VNP
2. VPN
3.VSN
4.VSPN
After obtaining the IP address, to prevent the IP conflict the client may use ____
1. internet relay chat
2.broader gateway protocol
3. address resolution protocol
4.none of the mentioned
Among the following, identify which task is not involved in Storage Capacity management?
1. Identifying storage systems are approaching full capacity
2.Monitoring trends for each resource
3. Tracking Total capacity, total used, total available
4.Preventing unauthorized access to the storage
An attempt to make a computer resource unavailable to its intended users is called ______
1. Denial-of-service attack
2.Virus attack
3.Worms attack
4.Botnet process
BER stands for ________
1.Basic Encoding Rules
2.Basic Encoding Resolver
3.Basic Encoding Rotator
4.Basic Encoding Router
Configuration management can be divided into which two subsystems?
1. Reconfiguration and documentation
2.Management and configuration
3.Documentation and dialing up
4.Configuration and dialing up
Control of the users’ access to network resources through charges is the main responsibility of ________
1.Reactive Fault Management
2.Reconfigured Fault Management
3.Accounting Management
4. Security Management
DHCP client and servers on the same subnet communicate via _________
1. UDP broadcast
2.UDP unicast
3.TCP broadcast
4. TCP unicast
Effect of open standards like SMI(s) is _________
1.standardization drives software interoperability and interchange ability
2. breaks the old-style dependence on proprietary methods, trade secrets, and single providers
3.builds a strong foundation on which others can quickly build and innovate
4.all of the mentioned
Effective Storage management does not include ____
1.security
2.backups
3.reporting
4. connection
ESP (Encapsulating Security Protocol) is defined in which of the following standards?
1.IPsec
2.PPTP
3.PPP
4.L2TP
Extensible authentication protocol is authentication framework frequently used in ______
1.Wired personal area network
2.Wireless networks
3.Wired local area network
4.Wired metropolitan area network
Full duplex mode increases the capacity of each domain by ________
1.10 to 20 mbps
2.20 to 30 mbps
3. 30 to 40 mbps
4.40 to 50 mbps
How do Storage administrators ensure secure access to storage devices?
1.By using Zoning
2.By putting a physical lock on the storage device
3. By keeping devices shutdown when not in use
4.By keeping devices when used
Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.
1.Proprietary management interfaces
2.Multiple applications to manage storage in the data center
3.No single view
4. Single view
In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________
1.Fault Management
2.Secured Management
3.Active Management
4. Security Management
In tunnel mode, IPSec protects the ______
1.Entire IP packet
2.IP header
3.IP payload
4.IP trailer
IPSec is designed to provide security at the _______
1. Transport layer
2.Network layer
3.Application layer
4.Session layer
PGP encrypts data by using a block cipher called ______
1. International data encryption algorithm
2. Private data encryption algorithm
3.Internet data encryption algorithm
4.Local data encryption algorithm
Pretty good privacy (PGP) is used in ______
1. Browser security
2.Email security
3.FTP security
4.WiFi security
SMI-S Standard uses which of the following?
1.Java RMI
2.CIM-XML/HTTP
3.CORBA
4..NET
SNMP is the framework for managing devices in an internet using the ______
1.TCP/IP protocol
2.UDP
3.SMTP
4.None
Storage management comprises of ________
1.SAN Management
2.Data protection
3.Disk operation
4.all of the mentioned
Structure of Management Information (SMI), is the guideline of ________
1.HTTP
2.SNMP
3. URL
4. MIB
Task of Distributed Management Task Force is not ________
1.to promote interoperability among the management solution providers
2. to act as an interface between the various budding technologies and provide solution to manage various environments
3.to track the operation of the different management solution providers
4.to manage the facility by itself if one of the management solution providers fail
Telnet is used for _______
1.Television on net
2.Network of Telephones
3.Remote Login
4.Teleshopping site
The application layer protocol used by a Telnet application is ________
1.Telnet
2.FTP
3.HTTP
4.SMTP
The application-level protocol in which a few manager stations control a set of agents is called ______
1.HTML
2.TCP
3.SNMP
4.SNMP/IP
The main difference between SNMPv3 and SNMPv2 is _______
1.Management
2.Integration
3. Classification
4.Enhanced security
To use a Simple Network Management System, we need _______
1.Servers
2.IP
3.Protocols
4. Rules
Traffic in a VPN is NOT _______
1. Invisible from public networks
2.Logically separated from other traffic
3. Accessible from unauthorized public networks
4.Restricted to a single protocol in IPsec
VPNs are financially speaking ______
1.Always more expensive than leased lines
2.Always cheaper than leased lines
3.Usually cheaper than leased lines
4.Usually more expensive than leased lines
What is DHCP snooping?
1.techniques applied to ensure the security of an existing DHCP infrastructure
2. encryption of the DHCP server requests
3. algorithm for DHCP
4.none of the mentioned
What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?
1.telnet//www.sanfoundry.com
2. telnet:www.sanfoundry.com
3. telnet://www.sanfoundry.com
4.telnet www.sanfoundry.com
What protocol is NOT used in the operation of a VPN?
1. PPTP
2.IPsec
3.YMUM
4. L2TP
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________
1.DNS lookup
2. DNS hijacking
3.DNS spoofing
4.DNS authorizing
When were VPNs introduced into the commercial world?
1.Early 80’s
2.Late 80’s
3.Early 90’s
4.Late 90’s
Which amongst the following statements is correct for “character at a time†mode?
1.Character processing is done on the local system under the control of the remote system
2.Most text typed is immediately sent to the remote host for processing
3.All text is echoed locally, only completed lines are sent to the remote host
4.All text is processed locally, and only confirmed lines are sent to the remote host
Which layer of the OSI reference model does IPsec work at?
1. Layer 1
2.Layer 2
3.Layer 3
4.Layer 4
Which layer of the OSI reference model does PPTP work at?
1.Layer 1
2. Layer 2
3. Layer 3
4. Layer 4
Which of the following is not a storage device?
1.Switch
2.RAID Arrays
3. Tape drives
4.Hub
Which of the following statements is NOT true concerning VPNs?
1. Financially rewarding compared to leased lines
2. Allows remote workers to access corporate data
3.Allows LAN-to-LAN connectivity over public networks
4.Is the backbone of the Internet
Which protocols are used for Storage management?
1.SNMP
2.LDAP
3.POP3
4.MIB
WPA2 is used for security in _______
1. Ethernet
2.Bluetooth
3.Wi-Fi
4.Email
_______ allows you to connect and login to a remote computer
1.Telnet
2.FTP
3.HTTP
4.SMTP