Correct Answer : Option (D) : All of the above
Explanation : SSH used public key authentication, Password authentication, Host based authentication, keyboard authentication and authentication of servers.
Correct Answer : Option (A) : IP address
Explanation : We use DHCP to allow the hosts to acquire their ip addresses dynamically which is better than visiting each and every host on the network and configure all of this information manually.
Correct Answer : Option (C) : Both IPv6 and IPv4
Explanation : DHCP is used for both IPv4 and IPv6 addressing. With DHCP you get to let the hosts know about the change dynamically, and hosts update their info themselves.
Correct Answer : Option (B) : For a limited period
Explanation : The IP address offered to a client is only for a limited period of time. There is actually a certain amount of time that the client can use and keep this IP address.
Correct Answer : Option (B) : 67
Explanation : 67 is the UDP port number that is used as the destination port of a server. Whereas UDP port number 68 is used by the client.
Explanation : When a host acquires multiple offers of IP addresses from different DHCP servers, the host will broadcast a dhcp request identifying the server whose offer has been accepted.
Correct Answer : Option (C) : techniques applied to ensure the security of an existing DHCP infrastructure
Explanation : DHCP snooping is a security feature that is used in OS of a network in the layer 2. This technology prevents unauthorized DHCP servers offering IP addresses to DHCP clients.
Correct Answer : Option (C) : Both MAC address and IP address
Explanation : The DHCP snooping is done to prevent unauthorized IP addresses being offered by unauthorized servers. This features allows only specific mac addresses and IP addresses to access the network.
Correct Answer : Option (A) : Network layer
Explanation : IPSec is a set of protocols used to provide authentication, data integrity and confidentiality between two machines in an IP network. In the TCP/IP model, it provides security at the IP layer i.e. the network layer.
Correct Answer : Option (B) : Entire IP packet
Explanation : In the tunnel mode, IPSec adds control bits into the packets to encrypt the entire packet between the IPSec endpoints. Using encryption, it provides secure communication between the two endpoints.