There are no comments, be the first and leave one below:
Broadcast storms can be prevented with ____.
b. loop protection
d. 802.11x
c. Dijkstra’s algorithm
a. spanning tree
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.
a. WINS
b. DHCP
d. finger
c. BIND
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.
c. Network Layer
d. Data link Layer
b. Transport Layer
a. Presentation Layer
Routers operate at the ____ Layer.
c. Network
d. Application
b. Presentation
a. Transport
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.
b. entity
a. OID
c. MIB
d. community string
TCP port ____ is the FTP control port used for passing FTP commands.
c. 21
a. 19
b. 20
d. 22
IEEE 802.1x is commonly used on wireless networks.
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.
a. hypercard
c. hypervisor
d. kernel
b. supervisor