CS240 Exam 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The following is a valid method for creating an image:

-Issuing interactive commands-Using a dockerfile-Importing from a tarball file

A small firm wants to use port address translation (PAT) to enable the office computers to access the Internet. The computers use internal private addresses in the range of 192.68.1.100 through 192.68.1.200. The shared public IP address is 172.124.10.10. Computers on this network can send data to and from the internet using the shared public IP address and a _____?

172.122.40.41:1055192.168.1.18:1055

All of the following are true of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), except: A) UDP's primary service is packet routing. B) UDP provides best effort with no guarantee of delivery. C) TCP provides a reliable end-to-end communication channel for IP packets. D) TCP guarantees the delivery of each IP packet via a TCP envelope.

A

Containers provide all of the following advantages except:

A better UI for application code

What is a wireless access point?

A hardware device that allows WiFi devices to connect to a wired network. It acts as a bridge between the wireless and wired network

When a wireless access point point transmits data, all computers within range will receive it. What wired network device that we studied transmits data in this manner?

A hub is a wired network device that transmits data to all connected devices, similar to how a wireless access point broadcasts data to all computers within range

Carl is a network engineer. He is hardening a server to make it less vulnerable to attacks. What is the most secure method of handling open ports?

Apply the deny-all principle and enable those ports that are needed

What allows the Internet Assigned Numbers Authority (IANA) to segment any address space to define larger or smaller networks as needed, giving far more flexibility to allocate networks of virtually any size without wasting large blocks of IP addresses?

Classless Inter-Domain Routing (CIDR)

Which application architecture leverages workstation processing, balances network I/O, and separates processing functions from data?

Client/server

In which application architecture was the application server (appServer) introduced?

Cloud computing/ N-tier

Which of the following is true about Docker containers:

Containers optimize the software supply chain

All of the following are valid states for a Docker process except _____________. running deleted paused exited

Deleted

Which Application Layer threat occurs when an attacker consumes the resources on a target computer for things it was not intended to be doing, thus preventing normal use of network resources for legitimate purposes?

Denial of service (DoS)

The Docker Development Platform automates all of the following except: creating code shipping code testing code deploying code

Deploying code

By default, your Docker environment is configured to pull images from _____________.

Docker hub

Which of the following converts fully qualified domain names (FQDNs) into numeric IP addresses or IP addresses into FQDNs?

Domain Name System (DNS)

True or False? A Network Layer address and a Media Access Control (MAC) address are the same thing.

False

True or False? In half-duplex mode, both ends of a connection can communicate simultaneously.

False

Which of the following is an OSI Layer 4 (Transport Layer) service that manages the pacing of data transmissions to avoid collisions and congestion?

Flow control Fragmentation / reassembly

Which of the following is an OSI Layer 3 (Network Layer) protocol suite that authenticates and encrypts each IP packet to provide secure IP communication?

Internet Protocol Security (IPSec)

Which of the following is an OSI Layer 3 (Network Layer) protocol that queries the status of devices or services and reports on those that are not available?

Internet control message protocol (ICMP)

Docker is often used to containerize legacy applications (previously created/released applications). This is done for the following reasons, except: Question options: the return on investment is huge it takes no time or effort to do this yields more than 50% savings in maintenance costs yeilds up to 90% reduction in time between deployments of new releases

It takes no time or effort to do this

Which OSI layer is 802.11

Layer 2, data link

Which OSI layer is 802.3 in?

Layer 2, data link

Which OSI layer is ICMP in?

Layer 3, network

Which OSI layer is IPv4 in?

Layer 3, network

Which OSI layer is TCP in?

Layer 4, transport

Which OSI layer is PAP in?

Layer 5, session

Alpine is a Docker image based on the ___________ operating system.

Linux

Daniel is planning to switch his network from IPv4 to IPv6. He currently runs Address Resolution Protocol (ARP) to manage local Media Access Control (MAC) addresses. When he moves to IPv6, what protocol must he use instead of ARP?

Neighbor discovery protocol (NDP)

The Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) operate at the:

OSI Transport Layer

The Application Layer of the OSI model:

Serves as the primary interface for application software to interact with networks

The Session Layer of the OSI model:

Sets up, manages, and terminates connections between applications on source and destination computers

Docker containers have revolutionized the __________________________.

Software supply chain

The Linux command to see all users who are currently logged in is _____________.

THIS IS WRONG

What is the one common goal of the protocols WEP, WPA, WPA2, WPA3? What are the two main functions they perform to achieve their goal?

The common goal is to secure wireless communications. They achieve this by providing encryption (confidentiality) and authentication (ensuring the identity of the parties involved)

Which Application Layer threat is typically disguised as a useful program to trick the user into downloading it?

Trojan Horse

True or False? A dual stack operating system supports both IPv4 and IPv6 using two separate network stacks for IP.

True

True or False? A port is a number that tells a server what type of service the client is requesting.

True

True or False? An instance of a service listening for traffic on a specific port is called a socket.

True

True or False? Cloud computing makes it possible for organizations of any size to lease data center infrastructure and implement an N-tier architecture.

True

True or False? The Presentation Layer of the OSI model converts data into standard formats, such as American Standard Code for Information Interchange (ASCII), for application program use.

True

True or False? The Session Layer (OSI Layer 5) is the first layer that connects packets together into conversations.

True

True or False? The term "3-tier architecture" refers to the separate tiers represented by the client, appServer, and database server.

True

True or False? The user interface is where front-end software interfaces with a computer user.

True

True or False? When a web browser initiates a connection, it sends an HTTP request to a web server.

True

What is a WLAN

Wireless Local Area Network, is a type of network that allows devices to connect and communicate wirelessly within a limited geographic area

The layer of the OSI model that interacts with a human rather than another technological element is:

application

For the command: $docker container run -d --name helloThere alpine /bin/sh -c "while true; do prinf 'hello there.../n'; sleep 5; done" -d tells docker to run the container as a _________________________.

background process

Each image starts with a _____________________layer. Some examples are: Alpine, Ubuntu, and CentOS

base

The Linux command to display the contents of a file to the screen is _____________.

cat

The Linux command to go back to the parent directory is ____________________.

cd

The Linux command used to change directory is _______________.

cd

Images are stored in repositories on the Docker ___________________ .

hub

The Docker ___________________ is a public registry that anyone can use to store images.

hub

The layers of a container image are ______________________________.

immutable (layer cannot ever be changed)

A container has lots of associated data that characterizes its behavior, this is called its metadata. To obtain the metadata for a container use the _______________ command.

inspect

The command $docker container ls will ____________________.

list all running containers on the host system

The Linux command used to create a new directory (folder) is __________.

mkdir

For the command: $docker container run -d --name helloThere alpine /bin/sh -c "while true; do prinf 'hello there.../n'; sleep 5; done" --name is used to ___________________.

name the process

The Linux OS is compatible with the editor _________________.

nano, vi, and emacs

The Presentation Layer of the OSI model:

on the sending computer, is responsible for formatting and coding high level data that comes from applications into a form that is acceptable for transmitting on the network

Each virtual machine requires it's own _______________________.

operating system

Containers reduce the complexity of the software supply chain by _______________________________.

packaging software the same way, regardless of the OS distributing software the same way, regardless of the setup testing software the same way, regardless of the platform

The command to upload an image to a registry so it can shared with others, is docker image _______________.

push

The Linux command used to delete a file is ________________.

rm

The Linux command to delete a directory is _____________.

rmdir

If a Docker container is stopped, it can be restarted using the command _____________________________.

start

The Linux command to get the tree for the current directory is _______________.

tree .

A container name must be ______________.

unique

The following is an example of custom image for a _________________________.

web application

The Linux OS is basically a ____________________________.

file system

To ship a custom image, it must be assigned a _______________________________.

globally unique name

True or False? IP supports both connectionless and connection-oriented upper layer protocols.

True

True or False? IPv4 addresses are written as four separate 8-bit numbers separated by periods or dots.

True

True or False? IPv6 addresses are expressed as eight groups of four hexadecimal digits with each group separated by colons.

True

True or False? Placing nodes that communicate frequently in the same subnetwork can reduce the overhead required to route packets between the nodes.

True

True or False? The OSI Network Layer provides network IP addressing for packets.

True

True or False? The OSI Transport Layer provides flow control, fragmentation/reassembly, error control, and acknowledgment of delivery.

True

True or False? When the Time To Live (TTL) value in an IP packet header reaches zero, the current router drops the packet.

True

Which of the following is a hierarchical naming system that allows organizations to associate host names with IP address name spaces?

Domain name systems (DNS)

Which of the following is an OSI Layer 4 (Transport Layer) service that ensures the source and destination computers work together to detect when packets do not arrive within a reasonable time period, and then retransmit missing packets?

Error control

Which OSI layer is SSL in?

Layer 6, presentation

Which OSI layer is DHCP in?

Layer 7, application

Which OSI layer is DNS in?

Layer 7, application

Which OSI layer is FTP in?

Layer 7, application

Which OSI layer is HTTP in?

Layer 7, application

Which OSI layer is SMTP in?

Layer 7, application

The Linux Operating System is _____________.

Open source, stable, and secure

In the 1990's, the computer industry shifted from the use of mainframes to ________________.

PC's

A mobile client station uses two main scanning techniques to find an access point sort can be a wireless network. What is the difference between passive scanning and active scanning?

Passive scanning involves listening for beacon frames sent by access points, while active scanning involves the client station sending probe requests to find available access points

What maps internal IP addresses to public or external IP addresses?

Port address translation (PAT)

Maria is a network analyst for an enterprise. She is creating guidelines for network personnel to apply to business issues that may need a new software application to resolve. Which of the following is the best overall approach?

Understand the business problem, identify a business solution, and then identify a technical solution

The Docker ______________ is the primary way that Docker users interact with Docker.

client

Images are templates from which _____________________ are created.

containers

Docker containers are assigned IDs that are created using SHA-256. SHA-256 is all of the following except _________________. a hash function used to create unique IDs irreversible and secure easy to hack

easy to hack


Kaugnay na mga set ng pag-aaral

Sequences and Summation Formulas

View Set

Основы языковедения

View Set

Secondary 5 Grammar: If-Clauses (Questions and Answers)

View Set

Hurst Review Core Content: Fluid/Electrolyte Lecture

View Set

Mizzou Medical Ethics, Troy Hall, exam 2

View Set

Introduction to Computer Programming (Quiz questions Exam 1)

View Set

States and Union Territories of India Maps and Capitals

View Set