Proxy, DNS, Security, Cloud, AI, ML, Webtech Flashcards
A proxy server
1) hides your IP
2) can encrypt data
3) can block access to certain web pages, based on IP address or contents
4) can function as firewall
5) can cache sites
All of them
a strong option for popular websites that need to balance the load of many incoming requests
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy
reverse proxy
helps prevent identity theft and keep your browsing habits private
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy
anonymous proxy
They can prevent a website from serving you targeted marketing content based on your location
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy
anonymous proxy
This passes a false IP address for clients while identifies itself as a proxy
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
distorting proxy
This periodically change the IP address they present to the web server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
High anonymity proxy
TOR Network is an example of
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
High anonymity proxy
This provides encryption between the client and the server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
SSL proxy
Cache cannot be used with
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
SSL proxy
Top level domain
http://bsnl.co.in
1) co.in
2) .in
3) bsnl.co.in
4) bsnl
.in
(root domain is the hidden dot at the end like .in. .com.)
in DNS, FQDN stands for
Fully Qualified Domain Name
How many DNS root servers are available?
13
operated by 12 different organizations
Root server replies to resolver with
1) IP address of site
2) IP address of TLD server
3) IP address of authoritative server
IP address of TLD server
TLD: Top Level Domain
TLD server stores address information for
1) top level domains
2) root server
3) both
top level domains
(.net, .com, .org etc.)
TLD server replies to resolver with
1) IP address of site
2) IP address of root server
3) IP address of authoritative name server
IP address of authoritative server
The final authority about IP address of a site
1) root server
2) TLD server
3) authoritative name server
authoritative name server
DNS response for IPv4 address
1) A record
2) AA record
3) AAA record
4) AAAA record
A
DNS response for IPv6 address
1) A record
2) AA record
3) AAA record
4) AAAA record
AAAA
The _______ record resolves domain names to domain names
1) A record
2) CNAME record
3) MX record
4) SOA record
CNAME records
DNS record pointing to mail servers
1) A record
2) CNAME record
3) MX record
4) SOA record
MX record
The _______ record stores administrative information about a DNS zone.
1) A record
2) CNAME record
3) MX record
4) SOA record
SOA (start of authority)
The _____ provides
the name of the authoritative name
server within a domain.
1) MX record
2) CNAME record
3) NS record
4) SOA record
NS (Name Server)
The _______ points to a server and a service by including a port number.
1) MX record
2) SRV record
3) NS record
4) SOA record
SRV (service record)
The _______ record resolves domain names to IP addresses
1) A record
2) AAAA record
3) PTR record
4) SOA record
1) A record (IPv4)
2) AAAA record (IPv6)
The _______ record resolves IP addresses to domain names
1) A record
2) AAAA record
3) PTR record
4) SOA record
PTR record
All DNS records also have a ________ and indicates how often a DNS server will refresh that record.
1) TTL
2) TLT
TTL, which stands for time-to-live,
Information Security Components or Qualities are
1) Confidentiality
2) Integrity
3) Availability
4) Authenticity
1,2,3
Confidentiality - Preventing disclosure of information to unauthorized
individuals or systems
Integrity - Data shall not be modified without authorization.
Availability - must be available when it is needed
Sender Policy Framework (SPF) is against
1) spoofing
2) spamming
spoofing emails
(SPF is an email authentication method)
in WiFi security, WPA stands for
Wi-Fi Protected Access
in WiFi security, WEP stands for
Wired Equivalent Privacy
Types of DNS queries
1) Recursive
2) Iterative
3) non-recursive
all of them
Different kinds of firewalls
1) packet filters
2) application gateways
3) proxy servers
all of them
_______firewall examines each packet based on Source IP address, Destination IP address, TCP/UDP source port and TCP/UDP destination port
1) static packet filters
2) circuit-level gateways
static packet filters
- Logging capabilities are limited here
- Does not support user authentication
Is a router with an access list a firewall?
(a router with packet filtering
capabilities)
1. Yes
2. No
Yes