Choose a topic to test your knowledge and improve your MCA skills
The DHCP server can provide the _______ of the IP addresses.
DHCP client and servers on the same subnet communicate via _________
After obtaining the IP address, to prevent the IP conflict the client may use ____
What is DHCP snooping?
If DHCP snooping is configured on a LAN switch, then clients having specific ______ can access the network.
IPSec is designed to provide security at the _______
In tunnel mode, IPSec protects the ______
Which component is included in IP security?
WPA2 is used for security in _______
An attempt to make a computer resource unavailable to its intended users is called ______
Extensible authentication protocol is authentication framework frequently used in ______
Pretty good privacy (PGP) is used in ______
PGP encrypts data by using a block cipher called ______
When a DNS server accepts and uses incorrect information from a host that has no authority giving that information, then it is called _________
A ___________ is an extension of an enterprise’s private intranet across a public network such as the internet, creating a secure private connection.
When were VPNs introduced into the commercial world?
What protocol is NOT used in the operation of a VPN?
Which of the following statements is NOT true concerning VPNs?
Traffic in a VPN is NOT _______
VPNs are financially speaking ______
Which layer 3 protocols can be transmitted over an L2TP VPN?
ESP (Encapsulating Security Protocol) is defined in which of the following standards?
L2F was developed by which company?
Which layer of the OSI reference model does PPTP work at?
Which layer of the OSI reference model does IPsec work at?
Storage management comprises of ________
Which of the following is not a storage device?
Which protocols are used for Storage management?
Identify the difficulty a SAN administrator does not incur while dealing with diverse vendors.
How do Storage administrators ensure secure access to storage devices?
Effective Storage management does not include ____
Among the following, identify which task is not involved in Storage Capacity management?
Effect of open standards like SMI(s) is _________
Task of Distributed Management Task Force is not ________
SMI-S Standard uses which of the following?
The application-level protocol in which a few manager stations control a set of agents is called ______
Full duplex mode increases the capacity of each domain by ________
Configuration management can be divided into which two subsystems?
To use a Simple Network Management System, we need _______
The main difference between SNMPv3 and SNMPv2 is _______
In Network Management System, the division that is responsible for controlling access to network based on a predefined policy is called _________
BER stands for ________
Control of the users’ access to network resources through charges is the main responsibility of ________
SNMP is the framework for managing devices in an internet using the ______
Structure of Management Information (SMI), is the guideline of ________
The application layer protocol used by a Telnet application is ________
Which amongst the following statements is correct for “character at a time” mode?
_______ allows you to connect and login to a remote computer
What is the correct syntax to be written in the web browser to initiate a Telnet connection to www.sanfoundry.com?
Telnet is used for _______