System Administrator 2026
Transmission delay does not depend on _____________
  • A. Packet length
  • B. Distance between the routers
  • C. Transmission rate
  • D. Bandwidth of medium
Propagation delay depends on ___________
  • A. Packet length
  • B. Transmission rate
  • C. Distance between the routers
  • D. Speed of the cpu
Which of the following is a form of DoS attack?
  • A. Vulnerability attack
  • B. Bandwidth flooding
  • C. Connection flooding
  • D. All of the mentioned
The DoS attack, in which the attacker sends deluge of packets to the targeted host is ________
  • A. Vulnerability attack
  • B. Bandwidth flooding
  • C. Connection flooding
  • D. Udp flooding
Packet sniffers involve ____________
  • A. Active receiver
  • B. Passive receiver
  • C. Legal receiver
  • D. Partially-active receiver
Sniffers can be prevented by using _______________
  • A. Wired environment
  • B. Wifi
  • C. Ethernet LAN
  • D. Switched network
Firewalls are often configured to block ___________
  • A. Udp traffic
  • B. Tcp traffic
  • C. Sensitive traffic
  • D. Best-effort traffic