Sample Test Questions Domain 4 Flashcards

1
Q

OSI Layer 2 is divided into two functional sublayers. The upper sublayer is the ___ and is defined in the IEEE 802.2 specification. It communicates with the network layer, which is immediately above the data link layer. Below that is the ___ sublayer, which specifies the interface with the protocol requirements of the physical layer

A

Logical Link Control (LLC); Media Access Control (MAC)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ___ architecture often used in e-commerce is a client/server architecture in which the user interface, functional process logic, and data storage run as independent components that are developed and maintained, often on separate platforms

A

three-tier

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

a ___ architecture means that one firewall is in place to protect one server

A

screened-host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

___ is an e-mail validation system designed to prevent spam and malicious e-mail by detecting e-mail spoofing. The e-mail server is configured to check with the ___ to verify that an e-mail coming from a specific domain was sent from an IP address that has been sanctioned

A

Sender Policy Framework (SPF); DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

__ in sockets help packets know how to communicate with the right service or protocol on the destination computer

A

port numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

___ has been the de facto industry-standard tunneling protocol for years, and but the new de facto standard for VPNs is ___, which is not used over dial-up connections

A

PPTP; IPSec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

___ is often used to send an attacker’s business card to be added to the victim’s contact list in their address book

A

Bluejacking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Attackers use ___ queries to poison the cache of a DNS server

A

recursive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

when routing takes place on the internet, The ___ functions between each autonomous system (AS) so that each entity just has to know and be using the same exterior routing protocols.

A

Exterior Gateway Protocol (EGP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

in reality, the Internet is just a network made up of ___ (regions of nodes (networks) that share characteristics and behaviors) and routing protocols

A

autonomous systems (ASs)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Compared to hardware-based IP phones, ___ make an IP network more vulnerable

A

softphones

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

E-mail spoofing is easy to execute because SMTP lacks ___

A

an adequate authentication mechanism

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Many ___ autoconfigure themselves to work on another port if their default port is unavailable and blocked by the firewall

A

IM clients

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

___ allows for scoped addresses, which enables an administrator to restrict specific addresses for specific servers or file and print sharing, for example

A

IPv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  1. 1__ provides a unique ID for a device
  2. 1__ provides data encryption, integrity, and origin authentication functionality
  3. 1__ carries out key agreement functions for the session keys used for data encryption
A

AR;
AE;
AF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

primary and secondary DNS servers synchronize their information through a ___

A

zone transfer

17
Q

a DNS server contains records that map hostnames to IP addresses, which are referred to as ___

A

resource records

18
Q

Virtual firewalls can be ___, which monitor individual traffic links between virtual machines, or they can be integrated within the hypervisor of a virtualized environment

A

bridge-mode products

19
Q

___ is intended to decouple the router’s logical function of making routing decisions and its mechanical function of passing data between interfaces, and to make routing decisions more centrally manageable

A

Software-defined networking (SDN)

20
Q

___ are designed to optimize the delivery of content to clients based on their global topological position

A

Content distribution networks (CDNs)

21
Q

___ Protocol is commonly used for all VoIP transactions except the actual media exchange between calling or receiving stations

A

Session Initiation

22
Q

PPTP encryption takes place in OSI layer ___

A

2 (the layer VPN operates at)

23
Q

IP spoofing can be used to hijack sessions between users, but not if they are ___

A

SSL or IPsec encrypted traffic

24
Q

SSL is a proprietary protocol, but ___ was developed by a standards body, making it an open-community protocol

A

TLS

25
Q

___ encryption encrypts all the data along a specific communication path and provides protection against packet sniffers and eavesdroppers, whereas with ___ encryption only the data payload is encrypted

A

Link;

end-to-end

26
Q

the purpose of the ___ layer is to ensure reliable data transfer

A

transport

27
Q

With ___, each station senses if a collision has occurred, and notifies all other stations that they need to back off before trying again. With ___ each station announces that it will transmit, notifying all other stations that they will have to wait.

A

CSMA/CD;

CSMA/CA

28
Q

A network ___ is anything and everything that is not an infrastructure device

A

“endpoint”

29
Q

Virtualized networking means that data transmission does not cross a physical link, creating the security risk that ___

A

a single compromise of the hypervisor can essentially result in a compromise of the entirety of the virtual network