Which of the following statements about incremental backup are true?
Which of the following statements about incremental backup are true?
Each correct answer represents a complete solution. Choose two.
Which of the following protocols is used by VPN for tunneling?
You work as a Network Administrator for Blue Bell Inc. The company has a TCP-based network. The
company has two offices in different cities. The company wants to connect the two offices by using a
public network. You decide to configure a virtual private network (VPN) between the offices. Which
of the following protocols is used by VPN for tunneling?
Which of the following topologies should John use to accomplish the task?
John
works as a Network Administrator for NetPerfect Inc. The company has a Windows-based network.
John has been assigned a project to build a network for the sales department of the company. It is
important for the LAN to continue working even if there is a break in the cabling. Which of the
following topologies should John use to accomplish the task?
Which of the following encryption algorithms are based on block ciphers?
Which
of the following encryption algorithms are based on block ciphers?
Which of the following types of authentication mechanism is used here?
Adam
works as a Network Administrator. He discovers that the wireless AP transmits 128 bytes of
plaintext, and the station responds by encrypting the plaintext. It then transmits the resulting
ciphertext using the same key and cipher that are used by WEP to encrypt subsequent network
traffic. Which of the following types of authentication mechanism is used here?
Choose two.
The
OSI model is the most common networking model used in the industry. Applications, network
functions, and protocols are typically referenced using one or more of the seven OSI layers. Of the
following, choose the two best statements that describe the OSI layer functions. Each correct answer
represents a complete solution. Choose two.
Which of the following is the technology of indoor or automotive environmental comfort?
Which
of the following is the technology of indoor or automotive environmental comfort?
Which of the following protocols provides certificate-based authentication for virtual private networks (VPNs)
Which
of the following protocols provides certificate-based authentication for virtual private networks
(VPNs)?
Which of the following types of ciphers are included in the historical ciphers?
Which
of the following types of ciphers are included in the historical ciphers? Each correct answer
represents a complete solution. Choose two.
Which of the following security protocols provides confidentiality, integrity, and authentication of network t
Which
of the following security protocols provides confidentiality, integrity, and authentication of network
traffic with end-to-end and intermediate-hop security?