Information Technology Reference
In-Depth Information
Which encryption method uses a 168-bit key?
4
a. DES
b. PGP
c. 3DES
d. IPSec
What is AAA?
5
a. Automation, authentication, and accounting
b. Authentication, abomination, and accounting
c. Automation, authorization, and accounting
d. Authentication, authorization, and accounting
RTP operates in which layer of the OSI model?
6
a. Application
b. Session
c. Transport
d. Network
Which H.323 protocol is responsible for call setup and signaling?
7
a. H.245
b. Q.931
c. H.225
d. RTCP
Which unit measures the number of voice calls in one hour?
8
a. Kbps
b. Erlangs
c. DS0
d. FXS
Which feature does not transmit packets when there is silence?
9
a. E&M
b. VAD
c. Dial-Peer
d. DSS
Search WWH ::




Custom Search