DRAG DROP
Drag and Drop the layers of TCP/IP model according to their level of data encapsulation.
Select and Place:
DRAG DROP
A wireless network uses multiple modulation schemes to make the signal strong so that it can travel far. These modulation schemes work with a certain IEEE standard. Choose and drop the correct standards in the right pane according to the modulation scheme.
Select and Place:
You work as a Network Administrator for ABC Inc. The company uses a secure wireless network. John complains to you that his computer is not working properly. What type of security audit do you need to conduct to resolve the problem?
A. Non-operational audit
B. Dependent audit
C. Independent audit
D. Operational audit
You work as a Network Administrator for XYZ CORP. The company has a Linux-based network. You need to configure a firewall for the company. The firewall should be able to keep track of the state of network connections traveling across the network.
Which of the following types of firewalls will you configure to accomplish the task?
A. A network-based application layer firewall
B. Host-based application firewall
C. An application firewall
D. Stateful firewall
What does a firewall check to prevent certain ports and applications from getting the packets into an Enterprise?
A. The network layer headers and the session layer port numbers
B. The transport layer port numbers and the application layer headers
C. The application layer port numbers and the transport layer headers
D. The presentation layer headers and the session layer port numbers
Which of the following commands is most useful for viewing large files?
A. cat
B. less
C. touch
D. cp
John works as a Network Administrator for Perfect Solutions Inc. The company has a Linux-based network. John is working as a root user on the Linux operating system. He has recently backed up his entire Linux hard drive into the my_backup.tgz file. The size of the my_backup.tgz file is 800MB. Now, he wants to break this file into two files in which the size of the first file named my_backup.tgz.aa should be 600MB and that of the second file named my_backup.tgz.ab should be 200MB.
Which of the following commands will John use to accomplish his task?
A. split --verbose -b 200m my_backup.tgz my_backup.tgz
B. split --verbose -b 200m my_backup.tgz my_backup.tgz
C. split --verbose -b 600m my_backup.tgz my_backup.tgz
D. split --verbose -b 600m my_backup.tgz my_backup.tgz
In a network, a data packet is received by a router for transmitting it to another network. For forwarding the packet to the other available networks, the router is configured with a static or a dynamic route.
What are the benefits of using a static route?
A. It is a fault tolerant path.
B. It reduces load on routers, as no complex routing calculations are required.
C. It reduces bandwidth usage, as there is no excessive router traffic.
D. It provides precise control over the routes that packets will take across the network.
The routing algorithm uses certain variables to create a metric of a path. It is the metric that actually determines the routing path.
In a metric, which of the following variables is used to define the 'largest size' of a message that can be routed?
A. Load
B. MTU
C. Hop count
D. Bandwidth
Adam works as a Security Analyst for Umbrella Inc. He is retrieving large amount of log data from syslog servers and network devices such as Router and switches. He is facing difficulty in analyzing the logs that he has retrieved. To solve this problem, Adam decides to use software called Sawmill. Which of the following statements are true about Sawmill?
A. It incorporates real-time reporting and real-time alerting.
B. It is used to analyze any device or software package, which produces a log file such as Web servers, network devices (switches and routers etc.), syslog servers etc.
C. It is a software package for the statistical analysis and reporting of log files.
D. It comes only as a software package for user deployment.