Test 1

Free CCIE Security Practice Exam

Try Free CCIE Security Practice Exam prepared by Certiology

Start Exam

1. A protocol that allows data file transfer from one device to another using the connectionless protocol is known as





2. What of the following best describes the execution of applications that monitor and control managed devices?





3. The configuration register is composed of how many bits?





4. What way is used, when the physical access to a router is not possible?





5. What should a user use for exchanging the information between the NAS and client?





6. The large numbers representing the current date and time is termed as





7. Which of the below is described as an author that provides digital certificates and binds data items within a certificate?





8. UNIS command is composed of how many parts?





9. The username or password encryption is supported by





10. UNIX operating system was developed in





11. The cisco secure policy manager is also known as





12. Internet is an example of





13. A form of dynamic NAT that maps multiple, unregistered IP addresses to a single registered IP address by using different ports is explained by





14. Which of the following are the important bodies for the network administrators and the intruders?





15. Which of the following is the component of intrusion detection system?





16. The developer of SSL HandShake Protocol is





17. Which of the following is used to detect and warn devices of any collisions?





18. The web browsers, web servers and transfer files makes use of





19. What are the main components of the cisco routers?





20. The recovery of the lost password is described as