Create an account
For best results, the internetwork should be limited to fewer than how many subnets with an easily predicted traffic pattern (such as arranged consecutively in a straight line)?
Of the four types of routes that can be found in a routing table, which of the following cannot be found?
c. client routes
Which generic authentication method offers encryption of authentication data through the MD5 hashing scheme?
c. Challenge Handshake Authentication Protocol (CHAP)
One example of an NPS Policy Setting includes IP properties that specify IP address assignment behavior. Which of the following is not an option?
b. Client Must Supply an IP Address
Windows Server 2008 includes all of the following routing protocols that can be added to the Routing and Remote Access service with the exception of __________.
Which column of the IP Routing Table indicates the gateway value for each routing table entry?
Which mutual authentication method offers encryption of both authentication data and connection data?
What encryption type is used for dial-up and PPTP-based VPN connections with a 40-bit key?
a. basic encryption
Which one-way authentication method offers encryption of both authentication data and connection data (the same cryptographic key is used in all connections; this method supports older Windows clients, such as Windows 95 and Windows 98)?
802.1X provides port-based security through the use of all of the following components with the exception of a(n) __________.
Which option enables internal clients to connect to the Internet using a single, external IP address?
b. network address translation
Which generic authentication method does not encrypt authentication data?
b. Shiva Password Authentication Protocol (SPAP)
An NPS Network Policy, which is a rule for evaluating remote connections, consists of which of the following items?
d. all of the above
Which of the following is the limited broadcast address that is general for all networks and routers?
What type of connectivity creates a secure point-to-point connection across either a private network or a public network, such as the Internet?
c. virtual private network
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together