Broadcast storms can be prevented with ____.
a. spanning tree
b. loop protection
c. Dijkstra’s algorithm
d. 802.11x
DNS poisoning can be prevented by using the latest editions of the DNS software known as ____.
a. WINS
b. DHCP
c. BIND
d. finger
IP is the protocol that functions primarily at the Open Systems Interconnection (OSI) ____.
a. Presentation Layer
b. Transport Layer
c. Network Layer
d. Data link Layer
Routers operate at the ____ Layer.
a. Transport
b. Presentation
c. Network
d. Application
SNMP agents are protected with a password known as a(n) ____ in order to prevent unauthorized users from taking control over a device.
a. OID
b. entity
c. MIB
d. community string
TCP port ____ is the FTP control port used for passing FTP commands.
a. 19
b. 20
c. 21
d. 22
IEEE 802.1x is commonly used on wireless networks.
TCP is responsible for addressing packets and sending them on the correct route to the destination, while IP is responsible for reliable packet transmission.
TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application.
Server virtualization typically relies on the ____, which is software that runs on a physical computer to manage one or more virtual machine operating systems.
a. hypercard
b. supervisor
c. hypervisor
d. kernel