Which script will find unsafe permissions (sendmail related) ?
Which OSI layer uses segments? a. Application b. Presentation c. Session d. Transport
What kind of cables can be called UTP cables ?
which file tells the dhcp daemon where to find its configuration?
Tell me which protocol can be applied when you want to transfer files between different platforms, such between unix systems and windows servers?
You want to connect 2 buildings together that are 1000 meters apart and communicate at 100 Mbps and provide some security on the cable. What do you choose? a. Fiber optic
2 examples of DCE devices ? a. modems b. routers c. computers d. interface cards
A subnet's mask is 255.255.255.240. How many nodes can this subnet have?
How long is the "Destination Address" field in an Ethernet frame? a. 2 bytes b. 4 bytes c. 6 bytes d. 8 bytes
What routing protocols have you configured?
What is RAID 1 ?
What is the the advantage of address sharing?
In improved Distance Vector Protcols, there is a rule that no router will send a routing update via the interface it learnt of the route in the first place. This is called _____________ ?