7 DOMAINS OF IT INFRASTRUCTURE Flashcards

1
Q

Domain 1 of IT INFRASTRUCTURE is ___.

A

User Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Domain 2 of IT INFRASTRUCTURE is ___.

A

Workstation Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Domain 3 of IT INFRASTRUCTURE is ___.

A

LAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Domain 4 of IT INFRASTRUCTURE is ___.

A

LAN-WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Domain 5 of IT INFRASTRUCTURE is ___.

A

Remote access Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Domain 6 of IT INFRASTRUCTURE is ___.

A

WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Domain 7 of IT INFRASTRUCTURE is ___.

A

System/Application Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The ___ Domain includes people. This includes employees, contractors, or consultants.

A

User Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

___ can visit risky Web sites, and download and execute infected software. A USB drive plugged into a computer could cause a virus. This is found in the first domain called ___.

  1. Remote access Domain
  2. Application Domain
  3. User Domain
  4. Workstation Domain
A

User Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The ___ domain is the end user’s computer. It is susceptible to malicious software, aka malware. If a system is infected, the malware can cause significant harm. Which of the following addresses this?

  1. Remote access Domain
  2. Application Domain
  3. User Domain
  4. Workstation Domain
A

Workstation Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The ___ Domain is the area that is inside the firewall. It can be a few systems connected together in a small home business or a large network with thousands of computers.

A

LAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network devices such as hubs, switches, and routers are used to connect the systems together on the ___.

  1. Local area network
  2. Land area network
  3. Wide area network
  4. Work area network
A

Local area network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The internal ___ is generally considered a trusted zone.

  1. WAN
  2. LAN
  3. WWW
  4. USB
A

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The ___ Domain connects the local area network to the wide area network and is considered a trusted zone since it is controlled by a company.

  1. Application Domain
  2. User Domain
  3. LAN-WAN Domain
  4. Workstation Domain
A

LAN-WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The area between the trusted and untrusted zones is protected with one or more firewalls and is found in the ___ Domain

A

LAN-WAN Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The area between between the trusted and untrusted zones is protected by at least one firewall and is called the ___ or edge. Security here is referred to as ___ protection or edge protection.

  1. Patch/Patch
  2. Protected/Protected
  3. Boundary/boundary
  4. None of the above
A

Boundary/boundary

17
Q

A high level of security is required to keep the ___ Domain safe.

  1. Application Domain
  2. User Domain
  3. LAN-WAN Domain
  4. Workstation Domain
A

LAN-WAN Domain

18
Q

Mobile workers often need access to the private LAN when they are away from the company. ___ is used to grant mobile workers this access. ___ can be granted via direct dial-up connections or using a virtual private network connection.

  1. Internet Protocol
  2. Remote Access
  3. Granted Connection
  4. None of the above
A

Remote Access

19
Q

Remote access can be granted via direct dial-up connections or using a ___ connection.

  1. VPN Virtual Private Network
  2. CPN Company Private Network
  3. RPN Remote Protocol Network
  4. None of the above
A

VPN Virtual Private Network

20
Q

The public network used by ___ is most commonly the Internet.

  1. CPN Company Private Network
  2. VPN Virtual Private Network
  3. RPN Remote Protocol Network
  4. None of the above
A

VPN Virtual Private Network

21
Q

Vulnerabilities exist at two stages of the VPN connection. ___ and ___. (Select two)

  1. Authentication
  2. Credentials
  3. When passed between the user and server
  4. Clear text
A

Authentication
AND
When passed between the user and server

22
Q

If data is sent in clear text, an attacker can capture and read the data.
TRUE OR FALSE

23
Q

A tunneling protocol will encrypt the traffic sent over the network. This make it ___ for attackers to capture and read data.

  1. Less likely
  2. More difficult
  3. Less difficult
  4. None of the above
A

More difficult

24
Q

For many businesses, the ___ is the Internet.

  1. LAN
  2. LAN to WAN
  3. WAN
  4. All the above
25
The WAN Domain is aka ___. 1. World Wide Web 2. Wide Area Network 3. World Acquired Network 4. None of the above
Wide Area Network
26
The WAN Domain connects to ___. 1. Remote locations 2. Any available network 3. Any available in house connection 4. All the above
Remote locations
27
The WAN Domain is #___ in the IT Infrastructure. 1. Two 2. Four 3. Seven 4. Six
Six
28
___ services can include dedicated Internet access and managed services for customers' routers and firewalls. 1. LAN 2. WAN 3. LAN to WAN 4. None of the above
WAN
29
Networks, routers, and equipment require continuous monitoring and management to keep ___ service available. 1. LAN 2. WAN 3. LAN to WAN 4. None of the above
WAN
30
A significan amour of security is required to keep hosts in the ___ Domain safe. 1. LAN 2. WAN 3. LAN to WAN 4. None of the above
WAN
31
The ___ Domain is the seventh Domain of IT Infrastructure. 1. LAN 2. WAN 3. REMOTE ACCESS 4. SYSTEM/APPLICATION
SYSTEM/APPLICATION
32
SYSTEM/APPLICATION refers to servers that host ___ applications. 1. IP address 2. Untrusted Zones 3. Authentic 4. Server-level
Server-level applications
33
___System servers provide names to IP addresses for clients. 1. Domain Name System (DNS) 2. Driven Name System (DNS) 3. Dominant Name System (DNS) 4. None of the above
Domain Name System (DNS)