New Year Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Last Attempt 1D0-510 Questions

Page: 3 / 6
Total 170 questions

CIW v5 Founfations Exam Questions and Answers

Question 9

Which IP address is called the loopback address, and can be used for testing and troubleshooting?

Options:

A.

127.0.0.1

B.

10.1.12.251

C.

132.65.18.91

D.

192.23.111.8

Question 10

Your co-worker is not familiar with technical concepts. He asks you to explain Secure Shell (SSH) and the way it works. Which of the following is an appropriate and accurate explanation you can give to this non-technical person?

Options:

A.

SSH uses RSA and public keys to authenticate and encrypt before you can defragment the hard drive.

B.

SSH uses a Telnet-like interface, public keys or standard authentication methods, and then symmetric keys.

C.

SSH allows you to gain secure access to a remote computer and then execute commands to control the system.

D.

SSH uses DSA and RSA to protect authentication information, and asymmetric-key encryption to provide data confidentiality.

Question 11

Which of the following IP addresses is invalid?

Options:

A.

224.199.23.3

B.

24.256.54.255

C.

177.138.23.89

D.

182.255.254.115

Question 12

Which of the following is the best example of a client?

Options:

A.

An FTP site receiving a file

B.

A database fulfilling a query

C.

A workstation sharing a directory

D.

A Web browser querying a database

Page: 3 / 6
Total 170 questions