Information Technology Reference
In-Depth Information
Which AAA function determines which resources are accessed?
a. Accounting
20
b. Authorization
c. Authentication
d. TACACS
Which authentication protocol separates each AAA function into separate modules?
a. Kerberos
21
b. RADIUS
c. TACACS+
d. AAA
Which AAA function identifies the user?
a. Accounting
22
b. Authorization
c. Authentication
d. TACACS
Which algorithm does the Cisco PIX Firewall use?
a. Adaptive Security Algorithm
23
b. Authoritative Security Algorithm
c. Authenticating Security Algorithm
d. Access Security algorithm
Which of the following are QoS tools that you can use for VoIP networks?
a. CQ and TCP compression
24
b. CRTP and WFQ
c. DES and CRTP
d. ATM and UDP header compression
An IPX address consists of what?
a. 32-bit network and 8-bit host part
25
b. 24-bit network part and 8-bit host part
c. 24-bit network part and 48-bit host part
d. 32-bit network part and 48-bit host part
Search WWH ::




Custom Search