Sample Test Questions Domain 4 Flashcards
OSI Layer 2 is divided into two functional sublayers. The upper sublayer is the ___ and is defined in the IEEE 802.2 specification. It communicates with the network layer, which is immediately above the data link layer. Below that is the ___ sublayer, which specifies the interface with the protocol requirements of the physical layer
Logical Link Control (LLC); Media Access Control (MAC)
The ___ architecture often used in e-commerce is a client/server architecture in which the user interface, functional process logic, and data storage run as independent components that are developed and maintained, often on separate platforms
three-tier
a ___ architecture means that one firewall is in place to protect one server
screened-host
___ is an e-mail validation system designed to prevent spam and malicious e-mail by detecting e-mail spoofing. The e-mail server is configured to check with the ___ to verify that an e-mail coming from a specific domain was sent from an IP address that has been sanctioned
Sender Policy Framework (SPF); DNS server
__ in sockets help packets know how to communicate with the right service or protocol on the destination computer
port numbers
___ has been the de facto industry-standard tunneling protocol for years, and but the new de facto standard for VPNs is ___, which is not used over dial-up connections
PPTP; IPSec
___ is often used to send an attacker’s business card to be added to the victim’s contact list in their address book
Bluejacking
Attackers use ___ queries to poison the cache of a DNS server
recursive
when routing takes place on the internet, The ___ functions between each autonomous system (AS) so that each entity just has to know and be using the same exterior routing protocols.
Exterior Gateway Protocol (EGP)
in reality, the Internet is just a network made up of ___ (regions of nodes (networks) that share characteristics and behaviors) and routing protocols
autonomous systems (ASs)
Compared to hardware-based IP phones, ___ make an IP network more vulnerable
softphones
E-mail spoofing is easy to execute because SMTP lacks ___
an adequate authentication mechanism
Many ___ autoconfigure themselves to work on another port if their default port is unavailable and blocked by the firewall
IM clients
___ allows for scoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example
IPv6
- 1__ provides a unique ID for a device
- 1__ provides data encryption, integrity, and origin authentication functionality
- 1__ carries out key agreement functions for the session keys used for data encryption
AR;
AE;
AF