Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
A network point that provides entrance into another network is called as
B. Gateway
B. Gateway
See lessMAC addresses are also known as?
C. both and b above
C. both and b above
See lessFrom the options below, which suits best for MODEM?
A. a device that modulates an analog carrier signal to encode digital information
A. a device that modulates an analog carrier signal to encode digital information
See lessIP4 is more commonly used than IPv6?
A. True
A. True
See lessWhat is the port number for HTTP?
B. 80
B. 80
See lessWhich of the following protocols below work in the application layer?
D. Both a and d above
D. Both a and d above
See lessTransport layer of OSI model lies between Network and layer
D. Presentation
D. Presentation
See lessPing command works on which protocol?
A. ICMP
A. ICMP
See lessEIGRP can support ____________
D. all of the mentioned
D. all of the mentioned
See lessWhat is the purpose of a shadow honeypot?
C. to randomly check suspicious traffic identified by an anomaly detection system
C. to randomly check suspicious traffic identified by an anomaly detection system
See less