Upwork Networking

/Upwork Networking

Windows Server 2008 Test 2016

1. Which of the following file systems fully utilizes all the features of Windows Server 2008 such as domains and active directory? Answers: FAT FAT32 NTFS All of the above 2. Which of the following commands will you use to take the backup of BCD in a "C:Backup" folder? Answers: Bcdedit /backup "C:BackupBCD-backup" Bcdedit /copy [...]

By | November 5th, 2015|Upwork Networking|0 Comments

Voice Over IP Test 2016

1. Which of the following are the major VoIP protocols? Answers: SIP H.323 SMTP MGCP FTP RTP RTCP 2. What are the three main steps required in the analog-to-digital conversion process? Answers: Compression Encoding Filtering Recording Sampling Quantization 3. What are the three elements of a security policy necessary for a VoIP network? Answers: Transport [...]

By | November 5th, 2015|Upwork Networking|0 Comments

Virtual Private Network Test 2016

1. Due to which of the following reasons do you need to revoke a certificate? Answers: The private key used for authentication has been compromised The identity certificate has been compromised The certificate is no longer used The certificate has expired 2. Which of the following are the types of VPN? Answers: GRE L2TP PPTP [...]

By | November 5th, 2015|Upwork Networking|0 Comments

TCP/IP Test 2016

1. Which statements are true regarding UDP? Answers: It is a connectionless service It is less reliable as compared to TCP It uses handshaking It is slow as compared to TCP 2. Which are the two valid IP addresses in the subnets of 192.168.10.0 network with a subnet mask of 255.255.255.248? Answers: 192.168.10.1 192.168.10.24 192.168.10.63 [...]

By | November 5th, 2015|Upwork Networking|0 Comments

Networking Concepts Test 2016

1. Which of the following ranges are reserved as private addresses? Answers: 192.168.0.0 - 192.255.255.255 172.16.0.0 - 172.255.255.255 10.0.0.0 - 10.255.255.255 172.16.0.0 - 172.31.255.255 2. What is a checksum? Answers: An error detection technique A network troubleshooting device Another name for protocol header Another name for protocol trailer 3. What is multiplexing? Answers: Allowing multiple [...]

By | November 5th, 2015|Upwork Networking|0 Comments

Internet Security Test 2016

1. Which of the following are the components of a UTM appliance? Answers: Firewall Gateway Antispam Gateway Antivirus IDS/IPS 2. Which of the following are Virus propagation techniques? Answers: Master Boot Record File Infection Server Boot Record Macro Infection Slave Boot Record 3. Which of the following measures are taken to enhance the security of [...]

By | November 5th, 2015|Upwork Networking|0 Comments

Firewall Concepts Test 2016

1. Which of the following is helped by Logging? Answers: Health of the Firewalls Status of the Firewalls Troubleshooting the issues Monitoring the Firewalls 2. Which of the protocols listed below will you scan at the Gateway to block the Spam Mails? Answers: HTTP SMTP POP3 IMAP 3. Which of the following are Encryption algorithms? [...]

By | November 5th, 2015|Upwork Networking|0 Comments

CISCO Test 2016

1. Which command/s will you use to configure static routing on a router? Answers: Router(config)# ip route static Router(config)# ip route 0.0.0.0 0.0.0.0 172.16.0.1 Router(config)# ip route 10.0.0.0 255.0.0.0 172.16.0.1 Router(config)# ip route 192.168.1.0 255.255.255.0 E1 Router(config)# ip route 255.255.255.255 0.0.0.0 127.0.0.1 2. Which information is exchanged by Cisco devices on which CDP is running? [...]

By | November 4th, 2015|Upwork Networking|0 Comments

Cisco Networking Test 2016

1. Which of the following routing protocols support VLSM? Answers: RIP v1 RIP v2 IGRP EIGRP OSPF 2. Which of the following devices can be connected using a Rollover cable? Answers: Router Ethernet Port to Router Ethernet Port Switch Console Port to PC COM Port Switch Ethernet Port to Switch Ethernet Port Router Ethernet Port [...]

By | November 4th, 2015|Upwork Networking|0 Comments

Apache Server Test (2.0 Family) 2016

1. Which of the following levels are available in the SSLVerifyClient directive? Answers: none optional require optional_no_ca 2. Which are the two types of user authentication options available in the AuthType directive? Answers: Basic MD5 Digest Encrypt 3. Which protocols are available in the SSLProtocol directive? Answers: SSLv2 SSLv3 TLSv1 None of the above 4. [...]

By | November 4th, 2015|Upwork Networking|0 Comments