CS240 Exam 2
The following is a valid method for creating an image:
-Issuing interactive commands-Using a dockerfile-Importing from a tarball file
A small firm wants to use port address translation (PAT) to enable the office computers to access the Internet. The computers use internal private addresses in the range of 192.68.1.100 through 192.68.1.200. The shared public IP address is 172.124.10.10. Computers on this network can send data to and from the internet using the shared public IP address and a _____?
172.122.40.41:1055192.168.1.18:1055
All of the following are true of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), except: A) UDP's primary service is packet routing. B) UDP provides best effort with no guarantee of delivery. C) TCP provides a reliable end-to-end communication channel for IP packets. D) TCP guarantees the delivery of each IP packet via a TCP envelope.
A
Containers provide all of the following advantages except:
A better UI for application code
What is a wireless access point?
A hardware device that allows WiFi devices to connect to a wired network. It acts as a bridge between the wireless and wired network
When a wireless access point point transmits data, all computers within range will receive it. What wired network device that we studied transmits data in this manner?
A hub is a wired network device that transmits data to all connected devices, similar to how a wireless access point broadcasts data to all computers within range
Carl is a network engineer. He is hardening a server to make it less vulnerable to attacks. What is the most secure method of handling open ports?
Apply the deny-all principle and enable those ports that are needed
What allows the Internet Assigned Numbers Authority (IANA) to segment any address space to define larger or smaller networks as needed, giving far more flexibility to allocate networks of virtually any size without wasting large blocks of IP addresses?
Classless Inter-Domain Routing (CIDR)
Which application architecture leverages workstation processing, balances network I/O, and separates processing functions from data?
Client/server
In which application architecture was the application server (appServer) introduced?
Cloud computing/ N-tier
Which of the following is true about Docker containers:
Containers optimize the software supply chain
All of the following are valid states for a Docker process except _____________. running deleted paused exited
Deleted
Which Application Layer threat occurs when an attacker consumes the resources on a target computer for things it was not intended to be doing, thus preventing normal use of network resources for legitimate purposes?
Denial of service (DoS)
The Docker Development Platform automates all of the following except: creating code shipping code testing code deploying code
Deploying code
By default, your Docker environment is configured to pull images from _____________.
Docker hub
Which of the following converts fully qualified domain names (FQDNs) into numeric IP addresses or IP addresses into FQDNs?
Domain Name System (DNS)
True or False? A Network Layer address and a Media Access Control (MAC) address are the same thing.
False
True or False? In half-duplex mode, both ends of a connection can communicate simultaneously.
False
Which of the following is an OSI Layer 4 (Transport Layer) service that manages the pacing of data transmissions to avoid collisions and congestion?
Flow control Fragmentation / reassembly
Which of the following is an OSI Layer 3 (Network Layer) protocol suite that authenticates and encrypts each IP packet to provide secure IP communication?
Internet Protocol Security (IPSec)
Which of the following is an OSI Layer 3 (Network Layer) protocol that queries the status of devices or services and reports on those that are not available?
Internet control message protocol (ICMP)
Docker is often used to containerize legacy applications (previously created/released applications). This is done for the following reasons, except: Question options: the return on investment is huge it takes no time or effort to do this yields more than 50% savings in maintenance costs yeilds up to 90% reduction in time between deployments of new releases
It takes no time or effort to do this
Which OSI layer is 802.11
Layer 2, data link
Which OSI layer is 802.3 in?
Layer 2, data link
Which OSI layer is ICMP in?
Layer 3, network
Which OSI layer is IPv4 in?
Layer 3, network
Which OSI layer is TCP in?
Layer 4, transport
Which OSI layer is PAP in?
Layer 5, session
Alpine is a Docker image based on the ___________ operating system.
Linux
Daniel is planning to switch his network from IPv4 to IPv6. He currently runs Address Resolution Protocol (ARP) to manage local Media Access Control (MAC) addresses. When he moves to IPv6, what protocol must he use instead of ARP?
Neighbor discovery protocol (NDP)
The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) operate at the:
OSI Transport Layer
The Application Layer of the OSI model:
Serves as the primary interface for application software to interact with networks
The Session Layer of the OSI model:
Sets up, manages, and terminates connections between applications on source and destination computers
Docker containers have revolutionized the __________________________.
Software supply chain
The Linux command to see all users who are currently logged in is _____________.
THIS IS WRONG
What is the one common goal of the protocols WEP, WPA, WPA2, WPA3? What are the two main functions they perform to achieve their goal?
The common goal is to secure wireless communications. They achieve this by providing encryption (confidentiality) and authentication (ensuring the identity of the parties involved)
Which Application Layer threat is typically disguised as a useful program to trick the user into downloading it?
Trojan Horse
True or False? A dual stack operating system supports both IPv4 and IPv6 using two separate network stacks for IP.
True
True or False? A port is a number that tells a server what type of service the client is requesting.
True
True or False? An instance of a service listening for traffic on a specific port is called a socket.
True
True or False? Cloud computing makes it possible for organizations of any size to lease data center infrastructure and implement an N-tier architecture.
True
True or False? The Presentation Layer of the OSI model converts data into standard formats, such as American Standard Code for Information Interchange (ASCII), for application program use.
True
True or False? The Session Layer (OSI Layer 5) is the first layer that connects packets together into conversations.
True
True or False? The term "3-tier architecture" refers to the separate tiers represented by the client, appServer, and database server.
True
True or False? The user interface is where front-end software interfaces with a computer user.
True
True or False? When a web browser initiates a connection, it sends an HTTP request to a web server.
True
What is a WLAN
Wireless Local Area Network, is a type of network that allows devices to connect and communicate wirelessly within a limited geographic area
The layer of the OSI model that interacts with a human rather than another technological element is:
application
For the command: $docker container run -d --name helloThere alpine /bin/sh -c "while true; do prinf 'hello there.../n'; sleep 5; done" -d tells docker to run the container as a _________________________.
background process
Each image starts with a _____________________layer. Some examples are: Alpine, Ubuntu, and CentOS
base
The Linux command to display the contents of a file to the screen is _____________.
cat
The Linux command to go back to the parent directory is ____________________.
cd
The Linux command used to change directory is _______________.
cd
Images are stored in repositories on the Docker ___________________ .
hub
The Docker ___________________ is a public registry that anyone can use to store images.
hub
The layers of a container image are ______________________________.
immutable (layer cannot ever be changed)
A container has lots of associated data that characterizes its behavior, this is called its metadata. To obtain the metadata for a container use the _______________ command.
inspect
The command $docker container ls will ____________________.
list all running containers on the host system
The Linux command used to create a new directory (folder) is __________.
mkdir
For the command: $docker container run -d --name helloThere alpine /bin/sh -c "while true; do prinf 'hello there.../n'; sleep 5; done" --name is used to ___________________.
name the process
The Linux OS is compatible with the editor _________________.
nano, vi, and emacs
The Presentation Layer of the OSI model:
on the sending computer, is responsible for formatting and coding high level data that comes from applications into a form that is acceptable for transmitting on the network
Each virtual machine requires it's own _______________________.
operating system
Containers reduce the complexity of the software supply chain by _______________________________.
packaging software the same way, regardless of the OS distributing software the same way, regardless of the setup testing software the same way, regardless of the platform
The command to upload an image to a registry so it can shared with others, is docker image _______________.
push
The Linux command used to delete a file is ________________.
rm
The Linux command to delete a directory is _____________.
rmdir
If a Docker container is stopped, it can be restarted using the command _____________________________.
start
The Linux command to get the tree for the current directory is _______________.
tree .
A container name must be ______________.
unique
The following is an example of custom image for a _________________________.
web application
The Linux OS is basically a ____________________________.
file system
To ship a custom image, it must be assigned a _______________________________.
globally unique name
True or False? IP supports both connectionless and connection-oriented upper layer protocols.
True
True or False? IPv4 addresses are written as four separate 8-bit numbers separated by periods or dots.
True
True or False? IPv6 addresses are expressed as eight groups of four hexadecimal digits with each group separated by colons.
True
True or False? Placing nodes that communicate frequently in the same subnetwork can reduce the overhead required to route packets between the nodes.
True
True or False? The OSI Network Layer provides network IP addressing for packets.
True
True or False? The OSI Transport Layer provides flow control, fragmentation/reassembly, error control, and acknowledgment of delivery.
True
True or False? When the Time To Live (TTL) value in an IP packet header reaches zero, the current router drops the packet.
True
Which of the following is a hierarchical naming system that allows organizations to associate host names with IP address name spaces?
Domain name systems (DNS)
Which of the following is an OSI Layer 4 (Transport Layer) service that ensures the source and destination computers work together to detect when packets do not arrive within a reasonable time period, and then retransmit missing packets?
Error control
Which OSI layer is SSL in?
Layer 6, presentation
Which OSI layer is DHCP in?
Layer 7, application
Which OSI layer is DNS in?
Layer 7, application
Which OSI layer is FTP in?
Layer 7, application
Which OSI layer is HTTP in?
Layer 7, application
Which OSI layer is SMTP in?
Layer 7, application
The Linux Operating System is _____________.
Open source, stable, and secure
In the 1990's, the computer industry shifted from the use of mainframes to ________________.
PC's
A mobile client station uses two main scanning techniques to find an access point sort can be a wireless network. What is the difference between passive scanning and active scanning?
Passive scanning involves listening for beacon frames sent by access points, while active scanning involves the client station sending probe requests to find available access points
What maps internal IP addresses to public or external IP addresses?
Port address translation (PAT)
Maria is a network analyst for an enterprise. She is creating guidelines for network personnel to apply to business issues that may need a new software application to resolve. Which of the following is the best overall approach?
Understand the business problem, identify a business solution, and then identify a technical solution
The Docker ______________ is the primary way that Docker users interact with Docker.
client
Images are templates from which _____________________ are created.
containers
Docker containers are assigned IDs that are created using SHA-256. SHA-256 is all of the following except _________________. a hash function used to create unique IDs irreversible and secure easy to hack
easy to hack