cnt 115 answers.docx

Upload: hikio30

Post on 04-Jun-2018

228 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/14/2019 CNT 115 Answers.docx

    1/23

    Expand AllCollapse All

    ..Course Menu:Network+ (ITNW1458.20101122.257400)

    Announcements .Instructor .Messaging --------------------------------------------------------------------------------

    .Syllabus .Lessons .Web Based Labs .Presentations .Book Ch 1-6 .Quizzes & Exams.Discussion Board

    --------------------------------------------------------------------------------

    .Tools .Communications .Plagarism .Non Course Links .Evaluation .Review Test Submission:Final Exam.ContentUser Lucas Schwartz

    Submitted 2/2/11 7:27 PM

    Name Final Exam

    Status Completed

    Score 226 out of 300 points

    Time Elapsed 57 minutes, and 55 seconds out of 2 hours.

    Instructions

    Question 1 .2 out of 2 points

    ____ is a social engineering practice in which a person attempts to glean access orauthentication information by posing as someone who needs that information.Answer

    Correct Answer:

    Phishing

    . Question 2 .2 out of 2 points

    A GUID (globally unique identifier) is a 128-bit number that ensures that no two objects have____ names.Answer

    Correct Answer:

    duplicate

    . Question 3 .2 out of 2 points

    A computer programmed to act like an IP telephone is known as a(n) ____.Answer

    Correct Answer: softphone

    . Question 4 .2 out of 2 points

    IMAP (Internet Message Access Protocol) is a mail retrieval protocol that was developed as amore sophisticated alternative to ____.Answer

    Correct Answer:

  • 8/14/2019 CNT 115 Answers.docx

    2/23

    POP3

    . Question 5 .2 out of 2 points

    ____ software searches a node for open ports.Answer

    Correct Answer: Port scanner

    . Question 6 .0 out of 2 points

    SIP and H.323 regulate ____ for VoIP or video-over-IP clients and servers.Answer

    Correct Answer:

    call signaling and control

    . Question 7 .0 out of 2 points

    All VoIP calls are carried over the Internet.Answer

    Correct Answer: False

    . Question 8 .2 out of 2 points

    ____ describes the use of any network to carry voice signals using the TCP/IP

    protocol.Answer

    Correct Answer:

    IP telephony

    . Question 9 .0 out of 2 points

    ____ is a method of encrypting TCP/IP transmissions.Answer

    Correct Answer:

    SSL

    . Question 10 .0 out of 2 points

    The combination of a public key and a private key is known as a ____.Answer

    Correct Answer: key pair

    . Question 11 .2 out of 2 points

    A patch is a replacement for an entire software package.Answer

    Correct Answer: False

  • 8/14/2019 CNT 115 Answers.docx

    3/23

    . Question 12 .2 out of 2 points

    ____ is the use of one network to simultaneously carry voice, video, and datacommunications.Answer

    Correct Answer: Convergence

    . Question 13 .2 out of 2 points

    A ____ main function is to examine packets and determine where to direct them based ontheir Network layer addressing information.Answer

    Correct Answer:

    routers

    . Question 14 .0 out of 2 points

    The process of reverting to a previous version of software after attempting to upgrade it isknown as ____.Answer

    Correct Answer:

    backleveling

    . Question 15 .2 out of 2 points

    A ____ is a document (preferably online) that lists every service and software packagesupported within an organization, plus the names of first- and second-level support contacts for

    those services or software packages.Answer Correct Answer:

    supported services list

    . Question 16 .2 out of 2 points

    Network security is more often compromised from the inside thanfrom externalsources.Answer

    Correct Answer: True

    . Question 17 .2 out of 2 points

    A ____ is a program that runs automatically, without requiring a person to start or stopit.Answer

    Correct Answer:

    bot

  • 8/14/2019 CNT 115 Answers.docx

    4/23

    . Question 18 .2 out of 2 points

    Some software errors point to a physical connectivity problem.Answer

    Correct Answer: True

    . Question 19 .0 out of 2 points

    A ____ attack occurs when a hacker uses programs that try a combination of a user ID and

    every word in a dictionary to gain access to the network.Answer

    Correct Answer:

    dictionary

    . Question 20 .2 out of 2 points

    ____ management refers to the detection and signaling of device, link, or componentfaults.Answer

    Correct Answer:

    Fault

    . Question 21 .2 out of 2 points

    A(n) ____ virus changes its characteristics every time it is transferred to a newsystem.Answer

    Correct Answer:

    polymorphic

    . Question 22 .0 out of 2 points

    Above all, keep ____ in mind when you upgrade or install hardware on a network.Answer

    Correct Answer:

    safety

    . Question 23 .2 out of 2 points

    Protection against harmful code involves more than just installing anti-malware

    software.Answer

    Correct Answer: True

    . Question 24 .2 out of 2 points

    ____ are programs that run independently and travel between computers and across

    networks.Answer

  • 8/14/2019 CNT 115 Answers.docx

    5/23

    Correct Answer:

    Worms

    . Question 25 .2 out of 2 points

    SMTP operates from port ____.Answer Correct Answer:

    25

    . Question 26 .2 out of 2 points

    The support and use of multiple processors to handle multiple threads is known as____.Answer

    Correct Answer:

    multiprocessing

    . Question 27 .2 out of 2 points

    When a caller uses an IP telephone, his or her voice is immediately digitized and issued fromthe telephone to the network in ____ form.Answer

    Correct Answer:

    packet

    . Question 28 .0 out of 2 points

    Within a classful addressing subnet mask, the ____ bits indicate that corresponding bits in an

    IPv4 address contain network information.Answer Correct Answer:

    1

    . Question 29 .2 out of 2 points

    The directory containing information about objects in a domain resides on computers called____ controllers.Answer

    Correct Answer:

    domain

    . Question 30 .2 out of 2 points

    ____ is a public key encryption system that can verify the authenticity of an e-mail sender andencrypt e-mail data in transmission.Answer

    Correct Answer:

    PGP

  • 8/14/2019 CNT 115 Answers.docx

    6/23

    . Question 31 .2 out of 2 points

    A ____ is a network device devoted to storage and delivery of frequently requested

    files.Answer

    Correct Answer:

    cache engine

    . Question 32 .2 out of 2 points

    The primary function of the UNIX ____ is to coordinate access to all your computershardware, such as the disks, memory, keyboard, and monitor.Answer

    Correct Answer:

    kernel

    . Question 33 .2 out of 2 points

    A(n) ____ is a password-protected and encrypted file that holds an individuals identificationinformation, including a public key.Answer

    Correct Answer:

    digital certificate

    . Question 34 .0 out of 2 points

    A ____ attack occurs when a hacker tries numerous possible character combinations to find

    the key that will decrypt encrypted data.Answer

    Correct Answer:

    brute force

    . Question 35 .2 out of 2 points

    A ____ firewall is a router (or a computer installed with software that enables it to act as a

    router) that examines the header of every packet of data it receives to determine whether that

    type of packet is authorized to continue to its destination.Answer

    Correct Answer:

    packet-filtering

    . Question 36 .0 out of 2 points

    In classful addressing, Class C IPv4 address host information is located in the ____.Answer

    Correct Answer:

    last 8 bits

    . Question 37 .2 out of 2 points

  • 8/14/2019 CNT 115 Answers.docx

    7/23

    ____is the local storage of frequently needed files that would otherwise be obtained from an

    external source.Answer

    Correct Answer:

    Caching

    . Question 38 .2 out of 2 points

    ____ is a fundamental property of wire that depends on a wires molecular structure and

    size.Answer

    Correct Answer:

    Resistance

    . Question 39 .2 out of 2 points

    ____ protocols are the rules that computers follow to accomplish authentication.Answer

    Correct Answer:

    Authentication

    . Question 40 .2 out of 2 points

    An off-the-shelf workstation can be programmed to act like an IP telephone.Answer

    Correct Answer: True

    . Question 41 .2 out of 2 points

    A ____ is a correction, improvement, or enhancement to a particular piece of a softwareapplication.Answer

    Correct Answer:

    patch

    . Question 42 .2 out of 2 points

    A(n) ____ is a pictorial representation of computer functions that, in the case of NOSs,enables administrators to manage files, users, groups, security, printers, and so on.Answer

    Correct Answer:

    GUI

    . Question 43 .2 out of 2 points

    IP telephones are directly connected to the local loop.Answer

    Correct Answer: False

  • 8/14/2019 CNT 115 Answers.docx

    8/23

  • 8/14/2019 CNT 115 Answers.docx

    9/23

    110

    . Question 51 .2 out of 2 points

    A workgroup is a group of interconnected computers that share each others resources without

    relying on a central ____.Answer Correct Answer:

    server

    . Question 52 .2 out of 2 points

    Resistance is measured in ____.Answer

    Correct Answer:

    ohms

    . Question 53 .2 out of 2 points

    A network management agent is a ____ that collects information about a devices operationand provides it to the network management application.Answer

    Correct Answer:

    software routine

    . Question 54 .2 out of 2 points

    A program that disguises itself as something useful but actually harms your system is called a

    ____.Answer

    Correct Answer: Trojan horse

    . Question 55 .2 out of 2 points

    The process where one network management console collects data from multiple networked

    devices at regular intervals is known as ____.Answer

    Correct Answer:

    polling

    . Question 56 .2 out of 2 points

    ____ is a type of media capable of storing digitized data and that uses a laser to write data to it

    and read data from it.Answer

    Correct Answer:

    Optical media

    . Question 57 .2 out of 2 points

  • 8/14/2019 CNT 115 Answers.docx

    10/23

    A key component in managing networks is identifying and tracking its hardware and softwarethrough ____ management.Answer

    Correct Answer:

    asset

    . Question 58 .2 out of 2 points

    When used on a copper-based cable, a continuity tester applies a small amount of ____ toeach conductor at one end of the cable.Answer

    Correct Answer:

    voltage

    . Question 59 .0 out of 2 points

    ____ is a specialized storage device or group of storage devices that provides centralizedfault-tolerant data storage for a network.Answer

    Correct Answer:

    NAS

    . Question 60 .2 out of 2 points

    Every UNIX and Linux system contains full documentation of UNIX commands in the ____pages.Answer

    Correct Answer:

    man

    . Question 61 .2 out of 2 points

    A program similar to mtr, ____, is available as a command-line utility in Windows XP, Vista,Server 2003, and Server 2008.Answer

    Correct Answer:

    pathping

    . Question 62 .2 out of 2 points

    ____ is a measure of how well a network service matches its expected performance.Answer

    Correct Answer:

    QoS

    . Question 63 .2 out of 2 points

    A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery,while providing power to a network device through its battery.Answer

  • 8/14/2019 CNT 115 Answers.docx

    11/23

    Correct Answer:

    online

    . Question 64 .0 out of 2 points

    ____ are often considered third-level support.Answer Correct Answer:

    Help desk coordinators

    . Question 65 .2 out of 2 points

    In ____ addressing, only Class A, Class B, and Class C addresses are recognized.Answer

    Correct Answer:

    classful

    . Question 66 .0 out of 2 points

    Among all video-over-IP applications, ____ is perhaps the simplest.Answer

    Correct Answer:

    streaming video

    . Question 67 .2 out of 2 points

    An example of a popular mail server is ____.Answer

    Correct Answer:

    Microsoft Exchange Server

    . Question 68 .0 out of 2 points

    IMAP4 servers require less storage space and usually more processing resources than POPservers do.Answer

    Correct Answer: False

    . Question 69 .2 out of 2 points

    In CIDR, conventional network class distinctions do not exist.Answer

    Correct Answer: True

    . Question 70 .2 out of 2 points

    The most comprehensive and complex upgrade involving network hardware is a(n) ____upgrade.Answer

  • 8/14/2019 CNT 115 Answers.docx

    12/23

    Correct Answer:

    backbone

    . Question 71 .0 out of 2 points

    A(n) ____ is a graphical representation of a networks devices andconnections.Answer Correct Answer:

    network diagram

    . Question 72 .2 out of 2 points

    The more data you gather while establishing your networks baseline, the less accurate yourprediction will be.Answer

    Correct Answer: False

    . Question 73 .2 out of 2 points

    ____ are often considered first-level support.Answer

    Correct Answer:

    Help desk analysts

    . Question 74 .0 out of 2 points

    IPTV, videoconferencing, streaming video, and IP multicasting belong to the range ofservices known as ____.Answer

    Correct Answer: video over IP

    . Question 75 .0 out of 2 points

    ____ management is the collection, storage, and assessment of information related to theversions of software installed on every network device and every devices hardware

    configuration.Answer

    Correct Answer:

    Configuration

    . Question 76 .2 out of 2 points

    The use of certificate authorities to associate public keys with certain users is known as____.Answer

    Correct Answer:

    PKI

  • 8/14/2019 CNT 115 Answers.docx

    13/23

    . Question 77 .2 out of 2 points

    A(n) ____ is a list that organizes resources and associates them with their

    characteristics.Answer

    Correct Answer:

    directory

    . Question 78 .2 out of 2 points

    Because backbone upgrades are expensive and time consuming, the first step in approachingsuch a project is to ____ it.Answer

    Correct Answer:

    justify

    . Question 79 .2 out of 2 points

    A benefit to using an NTFS partition is that it can be read by older operating systems, such asWindows 95, Windows 2000 Professional, and early versions of UNIX.Answer

    Correct Answer: False

    . Question 80 .2 out of 2 points

    In a ____ attack, a person redirects or captures secure transmissions as they occur.Answer

    Correct Answer:

    man-in-the-middle

    . Question 81 .2 out of 2 points

    ____ involves manipulating certain characteristics of packets, data streams, or connections to

    manage the type and amount of traffic traversing a network or interface at any moment.Answer

    Correct Answer:

    Traffic shaping

    . Question 82 .2 out of 2 points

    Using VoIP over a WAN allows an organization to avoid paying long-distance telephonecharges, a benefit known as ____.Answer

    Correct Answer:

    toll bypass

    . Question 83 .2 out of 2 points

  • 8/14/2019 CNT 115 Answers.docx

    14/23

    Human errors, ignorance, and omissions cause more than half of all security breaches

    sustained by networks.Answer

    Correct Answer: True

    . Question 84 .2 out of 2 points

    ____ is one of the most important functions an NOS provides.Answer

    Correct Answer:

    Client support

    . Question 85 .2 out of 2 points

    A VPN ____ authenticates VPN clients and establishes tunnels for VPN connections.Answer

    Correct Answer:

    concentrator

    . Question 86 .2 out of 2 points

    Tone generators and tone locators are used to determine characteristics about a cable.Answer

    Correct Answer: False

    . Question 87 .0 out of 2 points

    The standard message format specified by SMTP allows for lines that contain no more than

    ____ ASCII characters.Answer Correct Answer:

    1000

    . Question 88 .2 out of 2 points

    UNIX was one of the first operating systems to implement a ____ file system.Answer

    Correct Answer:

    hierarchical

    . Question 89 .2 out of 2 points

    In general, a(n) ____ is a private switch that accepts and interprets both analog and digital

    voice signals.Answer

    Correct Answer:

    IP-PBX

    . Question 90 .2 out of 2 points

  • 8/14/2019 CNT 115 Answers.docx

    15/23

    Active Directory organizes multiple domains hierarchically in a domain ____.Answer

    Correct Answer:

    tree

    . Question 91 .2 out of 2 points

    A ____ is a software-based tool that continually monitors network traffic from a server orworkstation attached to the network.Answer

    Correct Answer:

    network monitor

    . Question 92 .2 out of 2 points

    notation takes the form of the network ID followed by a(n) ____, followed by the number ofbits that are used for the extended network prefix.Answer

    Correct Answer:

    forward slash ( / )

    . Question 93 .2 out of 2 points

    ____ messaging is a service that makes several forms of communication available from asingle user interface.Answer

    Correct Answer:

    Unified

    . Question 94 .2 out of 2 points

    ____ signaling functions are more limited than those performed by the protocols in the H.323group.Answer

    Correct Answer:

    SIP

    . Question 95 .0 out of 2 points

    A(n) ____ is a deviation from a specified level of system performance for a given period oftime.Answer

    Correct Answer:

    failure

    . Question 96 .0 out of 2 points

    The core of all UNIX and Linux systems is called the kernel.Answer

  • 8/14/2019 CNT 115 Answers.docx

    16/23

    Correct Answer: True

    . Question 97 .2 out of 2 points

    Solaris employs the file system called ____ for its native file system type.Answer

    Correct Answer: UFS

    . Question 98 .2 out of 2 points

    Most wireless testing tools contain more powerful antennas than a workstation NIC.Answer

    Correct Answer: True

    . Question 99 .2 out of 2 points

    SIP and H.323 account for communication between media gateways.Answer

    Correct Answer: False

    . Question 100 .0 out of 2 points

    By default, the 802.11 standard offers substantial security.Answer

    Correct Answer: False

    . Question 101 .2 out of 2 points

    Because the octets equal to 0 and 255 are ____, only the numbers 1 through 254 can be used

    for host information in an IPv4 address.Answer

    Correct Answer:

    reserved

    . Question 102 .2 out of 2 points

    ____ are frames that are not actually data frames, but aberrations caused by a device

    misinterpreting stray voltage on the wire.Answer Correct Answer:

    Ghosts

    . Question 103 .0 out of 2 points

    A router that is not configured to drop packets that match certain suspicious characteristics isan example of a risk associated with ____.Answer

  • 8/14/2019 CNT 115 Answers.docx

    17/23

    Correct Answer:

    transmission and hardware

    . Question 104 .0 out of 2 points

    An administrator can discover the host name assigned to a client by using the ____utility.Answer

    Correct Answer:

    hostname

    . Question 105 .0 out of 2 points

    When more than two people participate in a videoconference, for example, in a point-to-multipoint or multipoint-to-multipoint scenario, a video ____ is required.Answer

    Correct Answer:

    bridge

    . Question 106 .2 out of 2 points

    ____ is intended to eliminate single points of failure.Answer

    Correct Answer:

    Redundancy

    . Question 107 .0 out of 2 points

    ____ upgrades represent modifications to all or part of an application that are designed to

    enhance functionality or fix problems related to software.Answer Correct Answer:

    Application

    . Question 108 .2 out of 2 points

    A(n) ____ is a computer that manages multiple media gateways.Answer

    Correct Answer:

    MGC

    . Question 109 .2 out of 2 points

    ____ is the telltale factor for ascertaining where faults in a cable lie.Answer

    Correct Answer:

    Impedance

    . Question 110 .2 out of 2 points

  • 8/14/2019 CNT 115 Answers.docx

    18/23

    The term ____ memory refers to the RAM chips that are installed on the computers system

    board and whose sole function is to provide memory to that machine.Answer

    Correct Answer:

    physical

    . Question 111 .2 out of 2 points

    Encryption is the last means of defense against data theft.Answer

    Correct Answer: True

    . Question 112 .2 out of 2 points

    Mesh topologies and ____ topologies are good choices for highly available enterprise

    networks.Answer

    Correct Answer:

    SONET rings

    . Question 113 .2 out of 2 points

    A ____ usually results from a bad NIC.Answer

    Correct Answer:

    jabber

    . Question 114 .2 out of 2 points

    In a ____ cable, the transmit and receive wire pairs in one of the connectors arereversed.Answer

    Correct Answer:

    crossover

    . Question 115 .0 out of 2 points

    For a cabling upgrade, the best way to ensure that future upgrades go smoothly is to carefullydocument the existing cable after making any upgrades.Answer

    Correct Answer: False

    . Question 116 .2 out of 2 points

    A(n) ____ is a self-contained, well-defined task within a process.Answer

    Correct Answer:

    thread

  • 8/14/2019 CNT 115 Answers.docx

    19/23

    . Question 117 .2 out of 2 points

    Documenting and capturing an accurate picture of a networks physical and logical elements

    are initial steps in understanding the network.Answer

    Correct Answer: True

    . Question 118 .2 out of 2 points

    A ____ attack occurs when a system becomes unable to function because it has been delugedwith data transmissions or otherwise disrupted.Answer

    Correct Answer:

    denial-of-service

    . Question 119 .2 out of 2 points

    ____ is preferred over TCP for real-time applications such as telephone conversations andvideoconferencing.Answer

    Correct Answer:

    UDP

    . Question 120 .0 out of 2 points

    ____ scanning techniques attempt to identify malware by discovering malware-like

    behavior.Answer

    Correct Answer:

    Heuristic

    . Question 121 .2 out of 2 points

    A ____ can be used to intercept a telephone conversation.Answer

    Correct Answer:

    butt set

    . Question 122 .0 out of 2 points

    A____ is a small electronic device that issues a signal on a wire pair.Answer Correct Answer:

    tone generator

    . Question 123 .0 out of 2 points

    The ____ utility allows you to view a hosts routing table.Answer

    Correct Answer:

  • 8/14/2019 CNT 115 Answers.docx

    20/23

    route

    . Question 124 .0 out of 2 points

    The result from ANDing 11001111 with 10010001 is ____.Answer

    Correct Answer: 10000001

    . Question 125 .2 out of 2 points

    In ____, both computers verify the credentials of the other.Answer

    Correct Answer:

    mutual authentication

    . Question 126 .0 out of 2 points

    Power that is free from noise is called ____ power.Answer

    Correct Answer:

    clean

    . Question 127 .2 out of 2 points

    Continuity testers can test only copper cable.Answer

    Correct Answer: False

    . Question 128 .2 out of 2 points

    ____ detects malware by comparing current characteristics of files and disks against an

    archived version of these characteristics to discover any changes.Answer

    Correct Answer:

    Integrity checking

    . Question 129 .2 out of 2 points

    Within a classful addressing, ____ is the default subnet mask for a Class C address.Answer

    Correct Answer: 255.255.255.0

    . Question 130 .0 out of 2 points

    In classful addressing, the Class B IPv4 address network ID is located in the ____.Answer

    Correct Answer:

    first 16 bits

  • 8/14/2019 CNT 115 Answers.docx

    21/23

    . Question 131 .0 out of 2 points

    Many streaming video services - and nearly all of those issued over a public network, such asthe Internet - are examples of ____ transmissions.Answer

    Correct Answer: unicast

    . Question 132 .0 out of 2 points

    A ____ is a major change to a software packages existing code.Answer

    Correct Answer:

    software upgrade

    . Question 133 .0 out of 2 points

    A networked ____ is perhaps the simplest device to add.Answer

    Correct Answer:

    workstation

    . Question 134 .2 out of 2 points

    On a network using TCP/IP, some nodes may use multiple IP addresses.Answer

    Correct Answer: True

    . Question 135 .2 out of 2 points

    ____ provides redundancy through a process called disk mirroring.Answer

    Correct Answer:

    RAID Level 1

    . Question 136 .2 out of 2 points

    Naming (or addressing) conventions in Active Directory are based on the ____ namingconventions.Answer

    Correct Answer: LDAP

    . Question 137 .2 out of 2 points

    The gateways that make up the Internet backbone are called ____ gateways.Answer

    Correct Answer:

    core

  • 8/14/2019 CNT 115 Answers.docx

    22/23

    . Question 138 .2 out of 2 points

    An example of a popular client email software is ____.Answer

    Correct Answer:

    Microsoft Outlook

    . Question 139 .2 out of 2 points

    Logical connectivity problems often prove more difficult to isolate and resolve than physicalconnectivity problems.Answer

    Correct Answer: True

    . Question 140 .2 out of 2 points

    Before using a network monitor or protocol analyzer on a network, it is important to knowwhat ____ on your network normally looks like.Answer

    Correct Answer:

    traffic

    . Question 141 .2 out of 2 points

    It is more difficult to transmit VoIP and video over IP signals over a packet-switched networkthan it is to transmit data signals.Answer

    Correct Answer: True

    . Question 142 .0 out of 2 points

    The goal of fault-tolerant systems is to prevent failures from progressing to faults.Answer

    Correct Answer: False

    . Question 143 .2 out of 2 points

    A security policy should state exactly which hardware, software, architecture, or protocolswill be used to ensure security.Answer

    Correct Answer: False

    . Question 144 .2 out of 2 points

    A(n) ____ is a graphical representation of a networks wired infrastructure.Answer

  • 8/14/2019 CNT 115 Answers.docx

    23/23

    Correct Answer:

    wiring schematic

    . Question 145 .2 out of 2 points

    ____ management refers to monitoring how well links and devices are keeping up with thedemands placed on them.Answer

    Correct Answer:

    Performance

    . Question 146 .2 out of 2 points

    ____ scanning detects malware by comparing a files content with known malware signaturesin a signature database.Answer

    Correct Answer:

    Signature

    . Question 147 .2 out of 2 points

    Many network engineers consider ____ to be superior to MGCP.Answer

    Correct Answer:

    MEGACO

    . Question 148 .2 out of 2 points

    An archive ____ is a file attribute that can be checked or unchecked to indicate whether the

    file must be archived.Answer Correct Answer:

    bit

    . Question 149 .2 out of 2 points

    RADIUS and TACACS belong to a category of protocols known as AAA (____).Answer

    Correct Answer:

    authentication, authorization, and accounting

    . Question 150 .2 out of 2 points

    POP3s design makes it best suited to users who retrieve their mail from the same workstationall the time.Answer

    Correct Answer: True