92%(25)23 out of 25 people found this document helpful
This preview shows page 44 - 49 out of 68 pages.
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks. Which of the following options will help you achieve your aim? A Firewall B OTA provisioning C HTTP D FTP Which of the following devices is a network interconnectivity device that translates different communication protocols and is used to connect dissimilar network technologies?
Gateway C Router D Repeater What is encapsulation? A Changing the source and destination addresses of a packet B Adding a header and footer to data as it moves down the OSI stack C Verifying a person's identity D Protecting evidence until it has been properly collected Drag the application layer protocols to match them with their descriptions. xplanation: Here are the application layer protocols: �SNTP (Simple Network Time Protocol):Supports time synchronization among network devices�IMAP4 (Internet Message Access Protocol4):Retrieves e-mail from an e-mail server �LDAP (Lightweight Directory Access Protocol):Provides directory services to network clients �HTTPS (Hypertext Transfer Protocol Secure):Securely retrieves content from a web server Which wireless frequency access method offers the greatest throughput with the least interference?
FHSS B DSSS C OFDM D OSPF If you are the victim of a bluejacking attack, what was compromised? Which of the following features does TCP provide? Each correct answer represents a complete solution. Choose all that apply. A Full-duplex communication B Connectionless communication C Data flow management through sliding window D Reliable session
Which Transport layer protocol establishes an end-to-end logical or physical connection between the sender and receiver before transmitting any data? In which of the following orders is the information packaged during encapsulation? Packet, Data, Segment, Frame Which range of ports are set aside by the IANA (International Assigned Numbers Authority) to be used as session source ports?