1.
Which of the following layers refers to the higher-level protocols used by most applications for network communication?
2.
Which of the following is the type of documented business rule for protecting information and the systems, which store and process the information
3.
Which of the following is the best known Windows tool for finding open wireless access points?
4.
Which of the following UTP cables supports transmission up to 20MHz?
5.
Which of the following is also known as slag code?
6.
Which of the following commands is used for port scanning?
7.
Which of the following is a physical security device designed to entrap a person on purpose?
8.
Which of the following is a type of scam that entices a user to disclose personal information?
9.
Which of the following UTP cables is NOT suitable for data transmission or Ethernet data work usage?
10.
Which of the following tools is used for wireless LANs detection?