Sample Test Questions Domain 4 Flashcards
OSI Layer 2 is divided into two functional sublayers. The upper sublayer is the ___ and is defined in the IEEE 802.2 specification. It communicates with the network layer, which is immediately above the data link layer. Below that is the ___ sublayer, which specifies the interface with the protocol requirements of the physical layer
Logical Link Control (LLC); Media Access Control (MAC)
The ___ architecture often used in e-commerce is a client/server architecture in which the user interface, functional process logic, and data storage run as independent components that are developed and maintained, often on separate platforms
three-tier
a ___ architecture means that one firewall is in place to protect one server
screened-host
___ is an e-mail validation system designed to prevent spam and malicious e-mail by detecting e-mail spoofing. The e-mail server is configured to check with the ___ to verify that an e-mail coming from a specific domain was sent from an IP address that has been sanctioned
Sender Policy Framework (SPF); DNS server
__ in sockets help packets know how to communicate with the right service or protocol on the destination computer
port numbers
___ has been the de facto industry-standard tunneling protocol for years, and but the new de facto standard for VPNs is ___, which is not used over dial-up connections
PPTP; IPSec
___ is often used to send an attacker’s business card to be added to the victim’s contact list in their address book
Bluejacking
Attackers use ___ queries to poison the cache of a DNS server
recursive
when routing takes place on the internet, The ___ functions between each autonomous system (AS) so that each entity just has to know and be using the same exterior routing protocols.
Exterior Gateway Protocol (EGP)
in reality, the Internet is just a network made up of ___ (regions of nodes (networks) that share characteristics and behaviors) and routing protocols
autonomous systems (ASs)
Compared to hardware-based IP phones, ___ make an IP network more vulnerable
softphones
E-mail spoofing is easy to execute because SMTP lacks ___
an adequate authentication mechanism
Many ___ autoconfigure themselves to work on another port if their default port is unavailable and blocked by the firewall
IM clients
___ allows for scoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example
IPv6
- 1__ provides a unique ID for a device
- 1__ provides data encryption, integrity, and origin authentication functionality
- 1__ carries out key agreement functions for the session keys used for data encryption
AR;
AE;
AF
primary and secondary DNS servers synchronize their information through a ___
zone transfer
a DNS server contains records that map hostnames to IP addresses, which are referred to as ___
resource records
Virtual firewalls can be ___, which monitor individual traffic links between virtual machines, or they can be integrated within the hypervisor of a virtualized environment
bridge-mode products
___ is intended to decouple the router’s logical function of making routing decisions and its mechanical function of passing data between interfaces, and to make routing decisions more centrally manageable
Software-defined networking (SDN)
___ are designed to optimize the delivery of content to clients based on their global topological position
Content distribution networks (CDNs)
___ Protocol is commonly used for all VoIP transactions except the actual media exchange between calling or receiving stations
Session Initiation
PPTP encryption takes place in OSI layer ___
2 (the layer VPN operates at)
IP spoofing can be used to hijack sessions between users, but not if they are ___
SSL or IPsec encrypted traffic
SSL is a proprietary protocol, but ___ was developed by a standards body, making it an open-community protocol
TLS
___ encryption encrypts all the data along a specific communication path and provides protection against packet sniffers and eavesdroppers, whereas with ___ encryption only the data payload is encrypted
Link;
end-to-end
the purpose of the ___ layer is to ensure reliable data transfer
transport
With ___, each station senses if a collision has occurred, and notifies all other stations that they need to back off before trying again. With ___ each station announces that it will transmit, notifying all other stations that they will have to wait.
CSMA/CD;
CSMA/CA
A network ___ is anything and everything that is not an infrastructure device
“endpoint”
Virtualized networking means that data transmission does not cross a physical link, creating the security risk that ___
a single compromise of the hypervisor can essentially result in a compromise of the entirety of the virtual network