Which of the following protocols allows a user to store email on the server but synchronize it to a mail application?
A. IMAP
B. SNMP
C. SMTP
D. POP3
Answer: A. IMAP
You might also like to view...
A security engineer is using a sniffer to determine the source of apparently hostile traffic on an organization’s internal routed network. When the engineer examines individual frames, he sees that the source MAC address for the hostile packets matches the MAC address for the router on the local network. What is the best explanation for this?
a. The packets are encapsulated in a tunneling protocol such as PPTP. b. The packets have a spoofed originating MAC address in order to make identification of the hostile node more difficult. c. Frames carrying IP traffic originating on another network will have a MAC address for the local network’s router. d. The packets are IPX protocol, not IP.
Gwen has discovered a program that has copied itself throughout the network. The program does not appear to have a host program and is overloading the network as it replicates. It has even installed a web server on the network and is allowing other computers to connect. What type of malware has Gwen discovered?
A. Worm B. Trojan C. Spyware D. Rootkit
Which router command can be used to check whether the router interfaces are properly configured?
A) router# show ip interface brief B) router(config-router)# show interface ip brief C) router(config)# show ip interface brief D) router> show interface ip brief
It is a(n) _________ design issue whether a computer will have a multiply instruction.
A. architectural B. memory C. elementary D. organizational