What protocol suite below is the most commonly used protocol for local area network (LAN) communication?
TCP/IP
At what level of the OSI model does the IP protocol function?
Network Layer
Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?
Transport Layer
The capability for devices to exchange low-level control messages is provided by what protocol below?
ICMP
When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?
community string
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.
DNS
DNS poisoning can be prevented using the latest edition of what software below?
BIND
An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?
21
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?
router
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:
flood guard
How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?
VLAN
When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?
hypervisor
What is the term used for a device that requests permission from an authenticator to join a network??
supplicant
What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?
NetBIOS
List the steps of a DNS lookup.
The steps of DNS lookup begins by first, comparing an IP address against the local host table. If the request is not found in the local table then it is sent to the top-level domain DNS server. The top-level DNS server sends back the IP address of the DNS
Discuss one security advantage to hosts running virtualization.
One advantage of a host running virtualization is the ability to create a snapshot of a particular state of a virtual machine since it can be saved for later use you would not have to worry about changing settings that can break your software or make it v
List and describe the three service models of cloud computing.
The three services are Software as a Service, Platform as a Service and Infrastructure as a Service.
Software as a service (SaaS) allows vendors to provided a way to the vendor's software applications running on a cloud infrastructure.
Platform as a Servi
What are the four fields contained within an ICMP message??
The four fields contained within an ICMP message are the type, code, checksum and message body.