Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following should not be considered when setting up and configuring P2P-based Frame-Relay subinterfaces?
Correct
Incorrect
An essential reminder for computer networking is that the physical address requires no IP address when setting up and configuring P2P sub-interfaces and Frame Relay.
-
Question 2 of 10
2. Question
Which of the following offers an exhaustive description of how to set up Frame Relay to configure non-update preventing split horizon?
Correct
Incorrect
Please note that the establishment of PVC subinterfaces overcomes split-horizon issues in networking.
-
Question 3 of 10
3. Question
Which of the following statements offers falsified information about web cache?
Correct
Incorrect
Please note that the web cache stores HTML pages to reduce server lag for a short time.
-
Question 4 of 10
4. Question
Which of the following statements describes multiple HTTP requests in HTTP pipelining?
Correct
Incorrect
Kindly note HTTP pipelining offers room for making many requests without the requirement of waiting for multiple responses. This situation creates a strong basis for saving the client’s bandwidth and time.
-
Question 5 of 10
5. Question
Which of the following statements is a falsified attribute of Simple Mail Transfer Protocol (SMTP)?
Correct
Incorrect
SMTP follows a push protocol in which sending server pushes mail to the receiver server. Besides, the receiver server pulls the mail from the sending server.
-
Question 6 of 10
6. Question
Which of the following statements is a falsified attribute of computer networking?
Correct
Incorrect
Please note that there is a likelihood of single IP addresses with multiple hostnames. For instance, fb.com and facebook.com lead to a single IP address.
-
Question 7 of 10
7. Question
Which of the following statements describes the primary role of secure shell (SSH) networking protocol?
Correct
Incorrect
Please note that the SSH protocol offers advanced security features and high encryption through network communications. On that note, SSH can be classified as a cryptographic network protocol.
-
Question 8 of 10
8. Question
What should a client do after obtaining the IP address to prevent the emergence of an IP conflict in a computer network?
Correct
Incorrect
Please note that a client may use an address resolution protocol to map IP and MAC addresses available on the local network.
-
Question 9 of 10
9. Question
Which of the following represents the block cipher that encrypts data in PGP?
Correct
Incorrect
The cipher method BassOmatic was employed to encrypt data in PGP in the mid-20th century. However, Xuejia Lai and James Massey developed IDEA in 1991 that replaced the applicability of the cipher method BassOmatic.
-
Question 10 of 10
10. Question
Which of the following represents difficulties that SAN administrators assume when dealing with multivariate vendors?
Correct
Incorrect
Please note diverse vendors present multiple views that delineate the possibility of a single view.