Which of the following topologies is a type of physical network design where each computer in the network is connected to a central device through an unshielded twisted-pair (UTP) wire?

Which of the following topologies is a type of physical network design where each computer in the network is connected to a central device through an unshielded twisted-pair (UTP) wire?A . Mesh topologyB . Star topologyC . Ring topologyD . Bus topologyView AnswerAnswer: B Explanation: Star topology is a type...

September 22, 2020 No Comments READ MORE +

Fill in the blank with the appropriate term. ______________is a protocol used to synchronize the timekeeping among the number of distributed time servers and clients

FILL BLANK Fill in the blank with the appropriate term. ______________is a protocol used to synchronize the timekeeping among the number of distributed time servers and clients.View AnswerAnswer: NTP Explanation: Network Time Protocol (NTP) is used to synchronize the timekeeping among the number of distributed time servers and clients. It...

September 22, 2020 No Comments READ MORE +

Which of the following is the best way to address this issue?

You are an Administrator for a network at an investment bank. You are concerned about individuals breeching your network and being able to steal data before you can detect their presence and shut down their access. Which of the following is the best way to address this issue?A . Implement...

September 21, 2020 No Comments READ MORE +

Which of the following statements are true about volatile memory? Each correct answer represents a complete solution. Choose all that apply.

Which of the following statements are true about volatile memory? Each correct answer represents a complete solution. Choose all that apply.A . Read-Only Memory (ROM) is an example of volatile memory.B . The content is stored permanently, and even the power supply is switched off.C . The volatile storage device...

September 20, 2020 No Comments READ MORE +

Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?

Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?A . IGMPB . ICMPC . EGPD . OSPFView AnswerAnswer: C Explanation: EGP stands for Exterior Gateway Protocol. It is used for exchanging routing information between two gateways in a network...

September 20, 2020 No Comments READ MORE +

Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?

Which of the following is an intrusion detection system that reads all incoming packets and tries to find suspicious patterns known as signatures or rules?A . HIDSB . IPSC . DMZD . NIDSView AnswerAnswer: D Explanation: A network intrusion detection system (NIDS) is an intrusion detection system that tries to...

September 20, 2020 No Comments READ MORE +

Which of the following is a non-profit organization that oversees the allocation of IP addresses, management of the DNS infrastructure, protocol parameter assignment, and root server system management?

Which of the following is a non-profit organization that oversees the allocation of IP addresses, management of the DNS infrastructure, protocol parameter assignment, and root server system management?A . ANSIB . IEEEC . ITUD . ICANNView AnswerAnswer: D Explanation: ICANN stands for Internet Corporation for Assigned Names and Numbers. ICANN...

September 19, 2020 No Comments READ MORE +

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?

Which of the following refers to the exploitation of a valid computer session to gain unauthorized access to information or services in a computer system?A . SpoofingB . SmurfC . Session hijackingD . PhishingView AnswerAnswer: C Explanation: Session hijacking refers to the exploitation of a valid computer session to gain...

September 19, 2020 No Comments READ MORE +

Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? Each correct answer represents a complete solution. Choose all that apply.

Which of the following is the practice of sending unwanted e-mail messages, frequently with commercial content, in large quantities to an indiscriminate set of recipients? Each correct answer represents a complete solution. Choose all that apply.A . E-mail spamB . Junk mailC . Email spoofingD . Email jammingView AnswerAnswer: AB...

September 19, 2020 No Comments READ MORE +

Which of the following tools is John using to crack the wireless encryption keys?

John works as a professional Ethical Hacker. He has been assigned the project of testing the security of www.we-are-secure.com. He is using a tool to crack the wireless encryption keys. The description of the tool is as follows: „It is a Linux-based WLAN WEP cracking tool that recovers encryption keys....

September 19, 2020 No Comments READ MORE +