Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the following represents the tasks that an OSPF router conducts when it receives an LSA with a higher sequence number?
Correct
Incorrect
Please note that when LSA reaches the OSPF router an addition to the database occurs.
-
Question 2 of 10
2. Question
Which of the following represents the tasks that an OSPF router conducts when it receives an LSA with a higher sequence number?
Correct
Incorrect
Please note that when LSA reaches the OSPF router with a lower sequence number an LSU update is sent to source router.
-
Question 3 of 10
3. Question
Which of the following statements represent the basic OSPF configuration process?
Correct
Incorrect
Please note that OSPF configuration requires [Router ospf] [process-id], [wildcard-mask] area [area-id] for OSPF routing protocol and interfaces selection.
-
Question 4 of 10
4. Question
Which of the following evidences OSPF adjacencies?
Correct
Incorrect
Please note that the show IP OSPF neighbor is capable of describing OSPF adjacencies such as neighbors and nodes.
-
Question 5 of 10
5. Question
Which of the following evidence the significance of detecting an anomaly?
Correct
Incorrect
Kindly note the establishment of a protocol enables engine scaling based on the growth of rule sets.
-
Question 6 of 10
6. Question
Which of the following statements defines a false positive?
Correct
Incorrect
Please note a false positive exhibits nefarious activities, which may represent legitimate networks.
-
Question 7 of 10
7. Question
Which of the following evidence the actual role of a shadow honeypot?
Correct
Incorrect
Please note that the shadow honeypot facilitates randomly assessment of potential traffic through the anomaly detection system.
-
Question 8 of 10
8. Question
Which of the following represent the traffic layers that commercial IDSes use to generate signatures?
Correct
Incorrect
Please note that the traffic layers use network and transport layers.
-
Question 9 of 10
9. Question
Which of the following statements outlines a promising character of the signature-based IDSes?
Correct
Incorrect
Please note that signature-based IDSes scan the available packets to identify potential attack files.
-
Question 10 of 10
10. Question
Which of the following statement is a falsified representation of RTCP?
Correct
Incorrect
Please note that RTCP facilitates in delivery of data.