Question 1 (1 point)
Saved
Which of the following is a symptom of a DoS attack?
Question 1 options:
unavailability of a particular website
decrease in the amount of spam emails received
automatic increase in network performance
automatic increase in network bandwidth
Question 2 (1 point)
Saved
Which wireless standard has bandwidth up to 54 Mbps and
signals in a regulated frequency spectrum around 5 GHz?
Question 2 options:
802.11a
802.11b
802.11g
802.11i
Question 3 (1 point)
Saved
Android includes media support for which of the
following? (choose all that apply)
Question 3 options:
, AAC
ARM
H.323
H.264
Question 4 (1 point)
Saved
Which two of the following are among the major five actors of
the NIST Cloud Computing Reference Architecture?
Question 4 options:
Cloud Auditor
Cloud Database
Cloud Broker
CloudShareOne
Question 5 (1 point)
Saved
According to the text, by 2018, what percentage of enterprises
will specify Wi-Fi as the default connection?
Question 5 options:
25%
75%
40%
, 60%
Question 6 (1 point)
Saved
A DNS zone transfer (choose two):
Question 6 options:
Uses TCP port 53
Uses UDP port 53
Provides FQDN information about an organization
Is possible with Microsoft DNS servers but not BIND servers
Question 7 (1 point)
Saved
Which cloud deployment model is a multitenant infrastructure
shared among organizations with common characteristics?
Question 7 options:
private cloud
community cloud
public cloud
hybrid cloud
Question 8 (1 point)
Saved
Which of the following uses direct client-to-client (DCC)?
Question 8 options:
, Internet Relay Chat
email clients such as Outlook Express
file sharing with mapped drives
internet browser
Question 9 (1 point)
Saved
Which of the following are some of the main functions of an
intrusion detection system (IDS)? (choose all that apply)
Question 9 options:
performs packet sniffing
blocks rule-based traffic
gathers and analyzes information from a network
performs packet analysis
Question 10 (1 point)
Saved
The following are all password-cracking tools except:
Question 10 options:
John the Ripper
Cain
Hashcat
Hashcalc
Saved
Which of the following is a symptom of a DoS attack?
Question 1 options:
unavailability of a particular website
decrease in the amount of spam emails received
automatic increase in network performance
automatic increase in network bandwidth
Question 2 (1 point)
Saved
Which wireless standard has bandwidth up to 54 Mbps and
signals in a regulated frequency spectrum around 5 GHz?
Question 2 options:
802.11a
802.11b
802.11g
802.11i
Question 3 (1 point)
Saved
Android includes media support for which of the
following? (choose all that apply)
Question 3 options:
, AAC
ARM
H.323
H.264
Question 4 (1 point)
Saved
Which two of the following are among the major five actors of
the NIST Cloud Computing Reference Architecture?
Question 4 options:
Cloud Auditor
Cloud Database
Cloud Broker
CloudShareOne
Question 5 (1 point)
Saved
According to the text, by 2018, what percentage of enterprises
will specify Wi-Fi as the default connection?
Question 5 options:
25%
75%
40%
, 60%
Question 6 (1 point)
Saved
A DNS zone transfer (choose two):
Question 6 options:
Uses TCP port 53
Uses UDP port 53
Provides FQDN information about an organization
Is possible with Microsoft DNS servers but not BIND servers
Question 7 (1 point)
Saved
Which cloud deployment model is a multitenant infrastructure
shared among organizations with common characteristics?
Question 7 options:
private cloud
community cloud
public cloud
hybrid cloud
Question 8 (1 point)
Saved
Which of the following uses direct client-to-client (DCC)?
Question 8 options:
, Internet Relay Chat
email clients such as Outlook Express
file sharing with mapped drives
internet browser
Question 9 (1 point)
Saved
Which of the following are some of the main functions of an
intrusion detection system (IDS)? (choose all that apply)
Question 9 options:
performs packet sniffing
blocks rule-based traffic
gathers and analyzes information from a network
performs packet analysis
Question 10 (1 point)
Saved
The following are all password-cracking tools except:
Question 10 options:
John the Ripper
Cain
Hashcat
Hashcalc