100%(3)3 out of 3 people found this document helpful
This preview shows page 1 - 3 out of 13 pages.
Question 1 (1 point) Question 1 UnsavedQuestion 1 options:SaveQuestion 2 (1 point) Question 2 UnsavedQuestion 2 options:SaveQuestion 3 (1 point) Question 3 UnsavedQuestion 3 options:SaveQuestion 4 (1 point) Question 4 UnsavedQuestion 4 options:SaveQuestion 5 (1 point) Question 5 UnsavedQuestion 5 options:SaveQuestion 6 (1 point) Question 6 UnsavedQuestion 6 options:SaveQuestion 7 (1 point) Question 7 UnsavedQuestion 7 options:What security standard below was created to protect credit card data and transactions, requiring network segmentation as part of security controls? CALEAHIPAAPCI DSSCAARAThe Priority Code Point field in a frame consists of how many bits? A SecurID key chain fob from RSA security generates a password that changes how often?What authentication protocol sends authentication information in cleartext without encryption? What two types of agents are used to check compliance with network security policies? dissolvable agenttemporary agentpersistent agentpermanent agentWhat component of SIP is a server that responds to user agent clients' requests for session initiation and termination?The PPP headers and trailers used to create a PPP frame that encapsulates Network layer packets vary between 8 and 10 bytes in size due to what field?
SaveQuestion 8 (1 point) Question 8 UnsavedWhen using DiffServ, what type of forwarding utilizes a minimum departure rate from a given node, which is then assigned to each data stream?Question 8 options:SaveQuestion 9 (1 point) Question 9 UnsavedSaveQuestion 10 (1 point) Question 10 UnsavedQuestion 10 options:SaveQuestion 11 (1 point) Question 11 UnsavedMost UNIX and Linux desktop operating systems provide a GUI application for easily viewing and filtering the information in system logs.Question 11 options:10SaveQuestion 12 (1 point) Question 12 UnsavedQuestion 12 options:EAPTLSWAPSSLSaveQuestion 13 (1 point) Question 13 UnsavedQuestion 13 options:FCSFECencryptionassured forwardingprioritized forwardingscaled forwardingexpedited forwarding