Security.5e.Chapter.8.Quiz.2017

What protocol suite below is the most commonly used protocol for local area network (LAN) communication?

TCP/IP

At what level of the OSI model does the IP protocol function?

Network Layer

Which layer of the OSI model contains the TCP protocol, which is used for establishing connections and reliable data transport between devices?

Transport Layer

The capability for devices to exchange low-level control messages is provided by what protocol below?

ICMP

When using SNMPv1 or SNMPv2, what piece of information is needed to view information from an agent?

community string

Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree.

DNS

DNS poisoning can be prevented using the latest edition of what software below?

BIND

An administrator needs to examine FTP commands being passed to a server. What port should the administrator be monitoring?

21

What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks?

router

The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks:

flood guard

How can a network of physical devices be grouped into logical units, regardless of what network switches they may be connected to?

VLAN

When setting up a server virtualization environment, what component below manages the virtual machine operating systems and supports one or more guest systems?

hypervisor

What is the term used for a device that requests permission from an authenticator to join a network??

supplicant

What transport protocol is used by Windows operating systems to allow applications on separate computers to communicate over a LAN?

NetBIOS

List the steps of a DNS lookup.

The steps of DNS lookup begins by first, comparing an IP address against the local host table. If the request is not found in the local table then it is sent to the top-level domain DNS server. The top-level DNS server sends back the IP address of the DNS

Discuss one security advantage to hosts running virtualization.

One advantage of a host running virtualization is the ability to create a snapshot of a particular state of a virtual machine since it can be saved for later use you would not have to worry about changing settings that can break your software or make it v

List and describe the three service models of cloud computing.

The three services are Software as a Service, Platform as a Service and Infrastructure as a Service.
Software as a service (SaaS) allows vendors to provided a way to the vendor's software applications running on a cloud infrastructure.
Platform as a Servi

What are the four fields contained within an ICMP message??

The four fields contained within an ICMP message are the type, code, checksum and message body.