Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
View Answer
Short Answer
Correct Answer
verified
View Answer
Multiple Choice
A) PAP
B) CHAP
C) TCP
D) S/Telnet
Correct Answer
verified
Multiple Choice
A) PAP
B) SSH
C) EAP
D) CHAP
Correct Answer
verified
Multiple Choice
A) UDP port 49 and TCP port 50 for login
B) UDP port 49 and TCP port 49 for login
C) UDP port 49 and UDP port 50 for login
D) TCP port 49 and UDP port 50 for login
Correct Answer
verified
Multiple Choice
A) Availability,Accounting,Confidentiality
B) Availability,Integrity,Confidentiality
C) Start,Stop,Update
D) Start,Stop,Delete
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control
Correct Answer
verified
Multiple Choice
A) Real Access Device Invisible Users Solution
B) Rational Available Device Incremental Users Service
C) Remote Authentication Dial-In User Service
D) Remote Authentication Device Invisible Users Solution
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) TCP port 1812 for authentication and TCP port 1813 for accounting
B) TCP port 1812 for accounting and TCP port 1813 for authentication
C) UDP port 1812 for authentication and UDP port 1813 for accounting
D) UDP port 1812 for accounting and UDP port 1813 for authentication
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) Mandatory access control
B) Discretionary access control
C) Role-based access control
D) Rule-based access control
Correct Answer
verified
Short Answer
Correct Answer
verified
Short Answer
Correct Answer
verified
Multiple Choice
A) Authorization device
B) Available device
C) Serial device
D) Another user
Correct Answer
verified
Multiple Choice
A) Confidentiality
B) Integrity and confidentiality
C) Confidentiality and availability
D) Integrity and availability
Correct Answer
verified
Multiple Choice
A) Mandatory access control
B) Discretionary Access Control
C) Role-based access control
D) Rule-based access control
Correct Answer
verified
Showing 21 - 40 of 46
Related Exams