Fill in the blank with the appropriate word.
The __________ is composed of the local loop, the central office, and the SS7 network.
A. PSTN
Which of the following techniques allows multiple computers to share one or more IP addresses?
A. DHCP
B. WINS
C. NAT
D. DNS
Which of the following is also known as IP telephony or Internet telephony?
A. Bluetooth
B. ISDN
C. TCP/IP
D. VoIP
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks.
Which of the following options will help you in achieving your aim?
A. Gopher
B. FTP
C. Firewall
D. HTTP
Which of the following components of Voice over IP Networks provides Call Admission Control (CAC), bandwidth control and management, and address translation?
A. Gatekeeper
B. Applications servers
C. MCU (Multipoint Control Unit)
D. IP Phones
Which of the following attacks CANNOT be detected by an Intrusion Detection System (IDS)? Each correct answer represents a complete solution. Choose all that apply.
A. E-mail spoofing
B. Shoulder surfing
C. Port scan attack
D. Denial-of-Service (DoS) attack
Which of the following are the advantages of the Diffserv model? Each correct answer represents a complete solution. Choose two.
A. Highly efficient tools
B. Large number of service classes
C. High scalability
D. Admission control for each request
You work in a company that accesses the Internet frequently. This makes the company's files susceptible to attacks from unauthorized access. You want to protect your company's network from external attacks.
Which of the following options will help you in achieving your aim?
A. Gopher
B. HTTP
C. Firewall
D. FTP
Which of the following have the specifications that a VLAN has? Each correct answer represents a complete solution. Choose two.
A. Broadcast domain
B. Collision domain
C. Intranet VPN
D. IP subnet
Which of the following techniques allows multiple computers to share one or more IP addresses?
A. WINS
B. DNS
C. DHCP
D. NAT