Proxy, DNS, Security, Cloud, AI, ML, Webtech Flashcards
A proxy server
1) hides your IP
2) can encrypt data
3) can block access to certain web pages, based on IP address or contents
4) can function as firewall
5) can cache sites
All of them
a strong option for popular websites that need to balance the load of many incoming requests
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy
reverse proxy
helps prevent identity theft and keep your browsing habits private
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy
anonymous proxy
They can prevent a website from serving you targeted marketing content based on your location
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy
anonymous proxy
This passes a false IP address for clients while identifies itself as a proxy
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
distorting proxy
This periodically change the IP address they present to the web server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
High anonymity proxy
TOR Network is an example of
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
High anonymity proxy
This provides encryption between the client and the server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
SSL proxy
Cache cannot be used with
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy
SSL proxy
Top level domain
http://bsnl.co.in
1) co.in
2) .in
3) bsnl.co.in
4) bsnl
.in
(root domain is the hidden dot at the end like .in. .com.)
in DNS, FQDN stands for
Fully Qualified Domain Name
How many DNS root servers are available?
13
operated by 12 different organizations
Root server replies to resolver with
1) IP address of site
2) IP address of TLD server
3) IP address of authoritative server
IP address of TLD server
TLD: Top Level Domain
TLD server stores address information for
1) top level domains
2) root server
3) both
top level domains
(.net, .com, .org etc.)
TLD server replies to resolver with
1) IP address of site
2) IP address of root server
3) IP address of authoritative name server
IP address of authoritative server
The final authority about IP address of a site
1) root server
2) TLD server
3) authoritative name server
authoritative name server
DNS response for IPv4 address
1) A record
2) AA record
3) AAA record
4) AAAA record
A
DNS response for IPv6 address
1) A record
2) AA record
3) AAA record
4) AAAA record
AAAA
The _______ record resolves domain names to domain names
1) A record
2) CNAME record
3) MX record
4) SOA record
CNAME records
DNS record pointing to mail servers
1) A record
2) CNAME record
3) MX record
4) SOA record
MX record
The _______ record stores administrative information about a DNS zone.
1) A record
2) CNAME record
3) MX record
4) SOA record
SOA (start of authority)
The _____ provides
the name of the authoritative name
server within a domain.
1) MX record
2) CNAME record
3) NS record
4) SOA record
NS (Name Server)
The _______ points to a server and a service by including a port number.
1) MX record
2) SRV record
3) NS record
4) SOA record
SRV (service record)
The _______ record resolves domain names to IP addresses
1) A record
2) AAAA record
3) PTR record
4) SOA record
1) A record (IPv4)
2) AAAA record (IPv6)
The _______ record resolves IP addresses to domain names
1) A record
2) AAAA record
3) PTR record
4) SOA record
PTR record
All DNS records also have a ________ and indicates how often a DNS server will refresh that record.
1) TTL
2) TLT
TTL, which stands for time-to-live,
Information Security Components or Qualities are
1) Confidentiality
2) Integrity
3) Availability
4) Authenticity
1,2,3
Confidentiality - Preventing disclosure of information to unauthorized
individuals or systems
Integrity - Data shall not be modified without authorization.
Availability - must be available when it is needed
Sender Policy Framework (SPF) is against
1) spoofing
2) spamming
spoofing emails
(SPF is an email authentication method)
in WiFi security, WPA stands for
Wi-Fi Protected Access
in WiFi security, WEP stands for
Wired Equivalent Privacy
Types of DNS queries
1) Recursive
2) Iterative
3) non-recursive
all of them
Different kinds of firewalls
1) packet filters
2) application gateways
3) proxy servers
all of them
_______firewall examines each packet based on Source IP address, Destination IP address, TCP/UDP source port and TCP/UDP destination port
1) static packet filters
2) circuit-level gateways
static packet filters
- Logging capabilities are limited here
- Does not support user authentication
Is a router with an access list a firewall?
(a router with packet filtering
capabilities)
1. Yes
2. No
Yes
___________ firewalls are susceptible to IP
spoofing
1) static packet filters
2) circuit-level gateways
static packet filters
Larger enterprises can also use _________ as part of a layered defense to screen potentially harmful traffic between internal departments.
1) static packet filters
2) circuit-level gateways
static packet filters
_________ monitor TCP handshakes and other network protocol session initiation messages across the network
1) static packet filters
2) circuit-level gateways
circuit-level gateways
(They don’t inspect the packets themselves)
packet filtering firewall is
1) Stateful Inspection Firewall
2) Stateless Firewall
3) Application-Level Gateway Firewall
4) Next-Generation Firewall
Stateless Firewall
_______ is referred to as a proxy
firewall
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall
Application-Level Gateway Firewall
_________ monitors TCP handshakes and other network protocol session initiation messages
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall
circuit-level gateways
- works in seesion layer
_________ works in session layer
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall
circuit-level gateways
- monitors TCP handshakes and other network protocol session initiation messages
_________checks contents of the packets in addition to headers
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall
3 and 4
This type of firewall is situated at Layer 3 and Layer 4 of the Open Systems Interconnection (OSI) model.
1) Stateful Inspection Firewall
2) Stateless Firewall
3) Application-Level Gateway Firewall
4) Next-Generation Firewall
Stateful Inspection Firewall
MSSPs offer cloud-based firewalls. MSSP stands for
Managed Security Service Providers
Storage virtualization is commonly used in
1) NAS
2) SAN
SAN: storage area networks
Humanoid robot
1) Erica
2) Sophia
3) Ameca
all of them
Three types of machine learning
1) supervised learning
2) reinforcement learning
3) unsupervised learning
machine learns from known datasets (set of training examples), and then predict
the output.
1) supervised learning
2) reinforcement learning
3) unsupervised learning
supervised learning
Classifications and Regression are algorithms for
1) supervised learning
2) reinforcement learning
3) unsupervised learning
supervised learning
An AI agent is trained by giving some commands, and on each action, an agent gets a reward as a feedback. Using these feedbacks, agent improves its performance
1) supervised learning
2) reinforcement learning
3) unsupervised learning
reinforcement learning
can be positive or negative reinforcement
The agent needs to learn from patterns without corresponding output values. The algorithms are trained with data which is neither labeled nor classified
1) supervised learning
2) reinforcement learning
3) unsupervised learning
unsupervised learning
Clustering and Association are algorithms for
1) supervised learning
2) reinforcement learning
3) unsupervised learning
unsupervised learning
Algorithms for supervised learning
1) Association
2) Classifications
3) Clustering
4) Regression
Classifications and Regression
Algorithms for unsupervised learning
1) Association
2) Classifications
3) Clustering
4) Regression
Clustering and Association
enables a computer system to understand and process human language such as English
1) NLP
2) DNS
NLP: Natural Language processing
The Input and output of NLP applications can be
1) speech
2) text
3) image
4) all the above
1 and 2
speech or text
_______ provides the ability to an AI agent to mimic the human brain.
1) NLP
2) Deep learning
Deep learning
Deep learning can use
1) supervised learning
2) unsupervised learning
3) both
both
PHP is used in
1) Server-side scripting
2) Command line scripting
3) Writing desktop applications
4) All of the above
All of the above
You can make a PHP script to run it without any server or browser T/F
True
You only need the PHP parser to use it this way. This type of usage is ideal for scripts regularly executed using cron (on *nix or Linux) or Task Scheduler (on Windows). These scripts can also be used for simple text processing tasks
_____ is ideal for scripts regularly executed using cron (on *nix or Linux) or Task Scheduler (on Windows)
1) PHP for Server-side scripting
2) PHP for Command line scripting
3) PHP for Writing desktop applications
PHP for Command line scripting
PHP-GTK is used for
1) Server-side scripting
2) Command line scripting
3) Writing desktop applications
4) All of the above
Writing desktop applications
PHP can output
1) HTML
2) images
3) PDF
4) flash movies
all of them
________ is a dynamic language where you can safely modify a program while it is running.
1) PHP
2) Java
Java
REPL in python implementation stands for
Read Eval Print Loop
Melissa was a
1) Boot sector viruses
2) E-mail virus
3) worm
E-mail virus
______ attach itself to a file
1) virus
2) worm
virus
______ copies itself across the network without attachment
1) virus
2) worm
worm
_______ can be used to conduct distributed denial of service attacks or to send spam email
1) zombies
2) proxy server
zombies
Refers to a computer that connects to the Internet and is controlled by unauthorized third party without permission and awareness of computer’s user
______ refers to a computer that connects to the Internet and is controlled by unauthorized third party without permission and awareness of computer’s user
1) zombies
2) proxy server
zombies
can be used to conduct distributed denial of service attacks or to send spam email
An E-mail virus
1) MyDoom
2) Melissa
Melissa
Microsoft suffered an attack from a DDoS called ____
1) MyDoom
2) Melissa
MyDoom
Sender ID Framework (SIDF) is used to counter
1) Virus
2) E-mail spoofing
3) Phishing
E-mail spoofing and Phishing
All administrative domains registered with the
Internet form a hierarchical structure, called _____
DNS domain namespace
An administrative domain is a group of computers in a single administrative unit.
All DNS servers fall into one of four categories:
1) Recursive resolvers
2) root name servers
3) TLD name servers
4) authoritative name servers
In DNS lookup process (when there is no caching), these four DNS servers work mutually to resolve the IP address for a specified domain name
Root name server is managed by
1) ICAAN
2) IANA
ICAAN: Internet Corporation for Assigned Names and Numbers
TLD name server is managed by
1) ICAAN
2) IANA
IANA: Internet Assigned Numbers Authority
ISO/IEC 27002 is an information security standard
T
Typically, an attacker sends an e-mail message that seems it has originated from a legitimate Internet address.
1) spoofing
2) phishing
3) spamming
phishing
Virtualization is mainly used for
1) Network Virtualization
2) Server Virtualization
3) Storage Virtualization
4) all of them
all of them
Two major roles in Service-Oriented Architecture
1) Service Provider
2) Service Transporter
3) Service consumer
1) Service Provider
3) Service consumer
A virtual assistant
1) Erica
2) Sophia
3) Ameca
4) TeslaBot
TeslaBot
speech recognition system can be
1) Speaker Dependent
2) Speaker Independent
3) either 1 or 2
either 1 or 2
which one is correct
1) JVM is part of JRE
2) JRE is part of JVM
JVM is part of JRE
Python can be treated in
1) a procedural way
2) an object-oriented way
3) a functional way
4) all the above
ll the above