Engg. tutorials

  • Instrumentation and Control Lab
  • Control systems assignment
  • Shape memory alloy SMA actuator
  • Dielectric elastomer
  • EM theory lecture notes
  • GATE question papers
  • JAM question papers
  • Kalman filter tutorial
  • Nonlinear estimation
  • Certified Ethical Hacker (CEHv9) Questions and answers

    29. An Internet Service Provider (ISP) has a need to authenticate users connecting using analog modems, Digital Subscriber Lines (DSL), wireless data services, and Virtual Private Networks (VPN) over a Frame Relay network. Which AAA protocol is most likely able to handle this requirement?

    A. TACACS+


    C. Kerberos


    30. Risks = Threats x Vulnerabilities is referred to as the:

    A. Risk equation

    B. Threat assessment

    C. BIA equation

    D. Disaster recovery formula

    < Prev.Page             CEHv9 Home             Next page>