7 DOMAINS OF IT INFRASTRUCTURE Flashcards
Domain 1 of IT INFRASTRUCTURE is ___.
User Domain
Domain 2 of IT INFRASTRUCTURE is ___.
Workstation Domain
Domain 3 of IT INFRASTRUCTURE is ___.
LAN Domain
Domain 4 of IT INFRASTRUCTURE is ___.
LAN-WAN Domain
Domain 5 of IT INFRASTRUCTURE is ___.
Remote access Domain
Domain 6 of IT INFRASTRUCTURE is ___.
WAN Domain
Domain 7 of IT INFRASTRUCTURE is ___.
System/Application Domain
The ___ Domain includes people. This includes employees, contractors, or consultants.
User Domain
___ can visit risky Web sites, and download and execute infected software. A USB drive plugged into a computer could cause a virus. This is found in the first domain called ___.
- Remote access Domain
- Application Domain
- User Domain
- Workstation Domain
User Domain
The ___ domain is the end user’s computer. It is susceptible to malicious software, aka malware. If a system is infected, the malware can cause significant harm. Which of the following addresses this?
- Remote access Domain
- Application Domain
- User Domain
- Workstation Domain
Workstation Domain
The ___ Domain is the area that is inside the firewall. It can be a few systems connected together in a small home business or a large network with thousands of computers.
LAN Domain
Network devices such as hubs, switches, and routers are used to connect the systems together on the ___.
- Local area network
- Land area network
- Wide area network
- Work area network
Local area network
The internal ___ is generally considered a trusted zone.
- WAN
- LAN
- WWW
- USB
LAN
The ___ Domain connects the local area network to the wide area network and is considered a trusted zone since it is controlled by a company.
- Application Domain
- User Domain
- LAN-WAN Domain
- Workstation Domain
LAN-WAN Domain
The area between the trusted and untrusted zones is protected with one or more firewalls and is found in the ___ Domain
LAN-WAN Domain
The area between between the trusted and untrusted zones is protected by at least one firewall and is called the ___ or edge. Security here is referred to as ___ protection or edge protection.
- Patch/Patch
- Protected/Protected
- Boundary/boundary
- None of the above
Boundary/boundary
A high level of security is required to keep the ___ Domain safe.
- Application Domain
- User Domain
- LAN-WAN Domain
- Workstation Domain
LAN-WAN Domain
Mobile workers often need access to the private LAN when they are away from the company. ___ is used to grant mobile workers this access. ___ can be granted via direct dial-up connections or using a virtual private network connection.
- Internet Protocol
- Remote Access
- Granted Connection
- None of the above
Remote Access
Remote access can be granted via direct dial-up connections or using a ___ connection.
- VPN Virtual Private Network
- CPN Company Private Network
- RPN Remote Protocol Network
- None of the above
VPN Virtual Private Network
The public network used by ___ is most commonly the Internet.
- CPN Company Private Network
- VPN Virtual Private Network
- RPN Remote Protocol Network
- None of the above
VPN Virtual Private Network
Vulnerabilities exist at two stages of the VPN connection. ___ and ___. (Select two)
- Authentication
- Credentials
- When passed between the user and server
- Clear text
Authentication
AND
When passed between the user and server
If data is sent in clear text, an attacker can capture and read the data.
TRUE OR FALSE
TRUE
A tunneling protocol will encrypt the traffic sent over the network. This make it ___ for attackers to capture and read data.
- Less likely
- More difficult
- Less difficult
- None of the above
More difficult
For many businesses, the ___ is the Internet.
- LAN
- LAN to WAN
- WAN
- All the above
WAN