1.
Which of the following header fields in TCP/IP protocols involves Ping of Death attack?
2.
Which of the following protocols is used for E-mail?
3.
Which of the following modems offers wireless communication under water?
4.
Which of the following protocols is used by the Remote Authentication Dial In User Service (RADIUS) client/server protocol for data transmission?
5.
Which of the following applications is used for the statistical analysis and reporting of the log files?
6.
Which of the following devices helps in connecting a PC to an ISP via a PSTN?
7.
Which of the following systems monitors the operating system detecting inappropriate activity, writing to log files, and triggering alarms?
8.
Which of the following is a Cisco product that performs VPN and firewall functions?
9.
Which of the following is NOT a WEP authentication method?
10.
Which of the following helps in blocking all unauthorized inbound and/or outbound traffic?