7 DOMAINS OF IT INFRASTRUCTURE Flashcards

1
Q

Domain 1 of IT INFRASTRUCTURE is ___.

A

User Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain 2 of IT INFRASTRUCTURE is ___.

A

Workstation Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Domain 3 of IT INFRASTRUCTURE is ___.

A

LAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Domain 4 of IT INFRASTRUCTURE is ___.

A

LAN-WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Domain 5 of IT INFRASTRUCTURE is ___.

A

Remote access Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Domain 6 of IT INFRASTRUCTURE is ___.

A

WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domain 7 of IT INFRASTRUCTURE is ___.

A

System/Application Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ___ Domain includes people. This includes employees, contractors, or consultants.

A

User Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ can visit risky Web sites, and download and execute infected software. A USB drive plugged into a computer could cause a virus. This is found in the first domain called ___.

  1. Remote access Domain
  2. Application Domain
  3. User Domain
  4. Workstation Domain
A

User Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ___ domain is the end user’s computer. It is susceptible to malicious software, aka malware. If a system is infected, the malware can cause significant harm. Which of the following addresses this?

  1. Remote access Domain
  2. Application Domain
  3. User Domain
  4. Workstation Domain
A

Workstation Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ___ Domain is the area that is inside the firewall. It can be a few systems connected together in a small home business or a large network with thousands of computers.

A

LAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network devices such as hubs, switches, and routers are used to connect the systems together on the ___.

  1. Local area network
  2. Land area network
  3. Wide area network
  4. Work area network
A

Local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The internal ___ is generally considered a trusted zone.

  1. WAN
  2. LAN
  3. WWW
  4. USB
A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ___ Domain connects the local area network to the wide area network and is considered a trusted zone since it is controlled by a company.

  1. Application Domain
  2. User Domain
  3. LAN-WAN Domain
  4. Workstation Domain
A

LAN-WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The area between the trusted and untrusted zones is protected with one or more firewalls and is found in the ___ Domain

A

LAN-WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The area between between the trusted and untrusted zones is protected by at least one firewall and is called the ___ or edge. Security here is referred to as ___ protection or edge protection.

  1. Patch/Patch
  2. Protected/Protected
  3. Boundary/boundary
  4. None of the above
A

Boundary/boundary

17
Q

A high level of security is required to keep the ___ Domain safe.

  1. Application Domain
  2. User Domain
  3. LAN-WAN Domain
  4. Workstation Domain
A

LAN-WAN Domain

18
Q

Mobile workers often need access to the private LAN when they are away from the company. ___ is used to grant mobile workers this access. ___ can be granted via direct dial-up connections or using a virtual private network connection.

  1. Internet Protocol
  2. Remote Access
  3. Granted Connection
  4. None of the above
A

Remote Access

19
Q

Remote access can be granted via direct dial-up connections or using a ___ connection.

  1. VPN Virtual Private Network
  2. CPN Company Private Network
  3. RPN Remote Protocol Network
  4. None of the above
A

VPN Virtual Private Network

20
Q

The public network used by ___ is most commonly the Internet.

  1. CPN Company Private Network
  2. VPN Virtual Private Network
  3. RPN Remote Protocol Network
  4. None of the above
A

VPN Virtual Private Network

21
Q

Vulnerabilities exist at two stages of the VPN connection. ___ and ___. (Select two)

  1. Authentication
  2. Credentials
  3. When passed between the user and server
  4. Clear text
A

Authentication
AND
When passed between the user and server

22
Q

If data is sent in clear text, an attacker can capture and read the data.
TRUE OR FALSE

A

TRUE

23
Q

A tunneling protocol will encrypt the traffic sent over the network. This make it ___ for attackers to capture and read data.

  1. Less likely
  2. More difficult
  3. Less difficult
  4. None of the above
A

More difficult

24
Q

For many businesses, the ___ is the Internet.

  1. LAN
  2. LAN to WAN
  3. WAN
  4. All the above
A

WAN

25
Q

The WAN Domain is aka ___.

  1. World Wide Web
  2. Wide Area Network
  3. World Acquired Network
  4. None of the above
A

Wide Area Network

26
Q

The WAN Domain connects to ___.

  1. Remote locations
  2. Any available network
  3. Any available in house connection
  4. All the above
A

Remote locations

27
Q

The WAN Domain is #___ in the IT Infrastructure.

  1. Two
  2. Four
  3. Seven
  4. Six
A

Six

28
Q

___ services can include dedicated Internet access and managed services for customers’ routers and firewalls.

  1. LAN
  2. WAN
  3. LAN to WAN
  4. None of the above
A

WAN

29
Q

Networks, routers, and equipment require continuous monitoring and management to keep ___ service available.

  1. LAN
  2. WAN
  3. LAN to WAN
  4. None of the above
A

WAN

30
Q

A significan amour of security is required to keep hosts in the ___ Domain safe.

  1. LAN
  2. WAN
  3. LAN to WAN
  4. None of the above
A

WAN

31
Q

The ___ Domain is the seventh Domain of IT Infrastructure.

  1. LAN
  2. WAN
  3. REMOTE ACCESS
  4. SYSTEM/APPLICATION
A

SYSTEM/APPLICATION

32
Q

SYSTEM/APPLICATION refers to servers that host ___ applications.

  1. IP address
  2. Untrusted Zones
  3. Authentic
  4. Server-level
A

Server-level applications

33
Q

___System servers provide names to IP addresses for clients.

  1. Domain Name System (DNS)
  2. Driven Name System (DNS)
  3. Dominant Name System (DNS)
  4. None of the above
A

Domain Name System (DNS)