Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of what standard below?
  • IEEE 802.1x
  • ​Supplicant
  • Virtualization
  • Transport Layer
In what type of cloud computing does the customer have the highest level of control?
  • Network Layer
  • FTP - File Transfer Protocol
  • Cloud Software as a Service
  • Cloud Infrastructure as a Service
A means of managing and presenting computer resources by function without regard to their physical layout or location..
  • Virtualization
  • host elasticity
  • ​Supplicant
  • loop protection
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
  • True
  • False
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
  • False
  • ICMP
  • VLAN
  • DNS
A log that is used to record which user performed an action and what that action was..
  • Audit Log
  • ​Supplicant
  • Network Layer
  • telnet
An instance of a particular state of a virtual machine that can be saved for later use.
  • Audit Log
  • community string
  • snapshot
  • ​Supplicant
An older TCP/IP protocol and an application used for text-based communication
  • telnet
  • router
  • False
  • TCP/IP
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
  • telnet
  • router
  • True
  • TCP/IP
Technique to prevent broadcast storms by using the IEEE 802.1d standard spanning-tree algorithm (STA).
  • loop protection
  • host elasticity
  • ​Supplicant
  • Virtualization
A TCP/IP protocol that uses Secure Sockets Layer or Transport Layer Security to encrypt commands sent over the control port (port 21) in an FTP session.
  • FTP - File Transfer Protocol
  • loop protection
  • FTPS - FTP Secure
  • Transport Layer
The ability to easily expand or contract resources in a virtualized environment.
  • ​Supplicant
  • host elasticity
  • loop protection
  • Network Layer
An unsecure TCP/IP protocol that is commonly used for transferring files
  • telnet
  • FTP - File Transfer Protocol
  • Cloud Infrastructure as a Service
  • loop protection
At what level of the OSI model does the IP protocol function?
  • host elasticity
  • Transport Layer
  • Audit Log
  • Network Layer
What is the term used for a device that requests permission from an authenticator to join a network?​
  • TCP/IP
  • ​Supplicant
  • host elasticity
  • loop protection
Which of the three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user?
  • FTPS - FTP Secure
  • Cloud Infrastructure as a Service
  • Transport Layer
  • Cloud Software as a Service
What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
  • router
  • ​Supplicant
  • TCP/IP
  • ICMP
The capability for devices to exchange low-level control messages is provided by what protocol below?
  • VLAN
  • ICMP
  • TCP/IP
  • True
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
  • VLAN
  • False
  • ICMP
  • True
​What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting?
  • router
  • Sticky
  • ICMP
  • TCP/IP
0 h : 0 m : 1 s

Answered Not Answered Not Visited Correct : 0 Incorrect : 0