1001

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Layer 7: Application Layer

Application layer—Describes the interface between two applications, on separate computers

A network administrator wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

DLP Data loss prevention (DLP) is used to classify and protect your organization's confidential and critical data. Within the DLP software, you create rules that prevent users from accidentally or maliciously sharing particular types of data outside your organization. For example, a DLP rule might prevent users from forwarding any business emails outside of the corporate mail domain. Another DLP rule might prevent users from uploading files to a consumer cloud service, like OneDrive or Dropbox. Yet another type of rule would prevent users from copying files to removable media.

Which port needs to be opened on the firewall for DNS?

Domain Name System (DNS) is the primary name resolution service on the Internet and private IP networks. It uses port 53 as the default port.

Jennifer, a client, is searching for a cloud-based service that manages all underlying infrastructure including updating the operating system. Which service would you recommend to her?

Infrastructure as a Service (IaaS) is a cloud computing service that enables a consumer to outsource computing equipment purchases and run their own data center. It is an arrangement in which, rather than purchasing equipment and running your own data center, you rent those resources as an outsourced service. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications. Examples of IaaS include Rackspace's Cloud Servers, Amazon's Elastic Compute Cloud (EC2) service, and Simple Storage Service (S3).

James, a security analyst, is hardening an authentication server. One of the primary requirements is to ensure there is mutual authentication and delegation. Given these requirements, which of the following technologies should he recommend and configure?

Kerberos is an authentication service that is based on a time-sensitive ticket-granting system. It was developed by the Massachusetts Institute of Technology (MIT) to use an SSO method in which the user enters access credentials that are then passed to the authentication server, which contains an access list and permitted access credentials. Kerberos can be used to manage access control to several services by using one centralized authentication server.

Layer 2: Data Link Layer

Layers 2 and 1 are responsible for interfacing with physical hardware on the local network Protocols at these layers are programmed into firmware of a computer's N I C and other hardware Type of networking hardware or technology used on a network determine the Link Layer protocol used Ethernet and Wi-Fi are examples The Link layer puts control information in a Link layer header and at the end of the packet in a trailer Entire Link layer is called a frame

Layer 3: Network Layer

Network layer—Responsible for moving messages from one node to another until they reach the destination host I P adds its own Network layer header to the segment or datagram The entire Network layer message is called a packet I P address—Assigned to each node on a network Network layer uses it to uniquely identify each host I P relies on several routing protocols to find the best route for a packet to take to reach destination I C M P and A R P are examples Network layer protocol will divide large packets into smaller packets Process called fragmentation

Layer 1: Physical Layer

Physical layer—Simplest layer and is responsible for sending bits via a wired or wireless transmission Can be transmitted as: Wavelengths in the air Voltage on a copper wire Light (via fiber-optic cabling)

Layer 6: Presentation Layer

Presentation layer—Responsible for reformatting, compressing, and/or encrypting data in a way that the receiving application can read

Which of the following RAID types should be used to configure two drives for maximum performance?

RAID 0 implements striping, which is the process of spreading data across multiple drives. Striping can dramatically improve read and write performance. You must have at least two physical disk drives to implement striping. RAID 0 takes the contents of files and spread them in roughly even parts across all drives in the RAID array. It allows the CPU to read and write simultaneously on different drives, improving performance.

Which of the following protocols is used for file sharing between MAC OS and Windows OS workstations on a LAN?

Server Message Block (SMB) is a protocol used for file sharing between MAC OS and Windows OS workstations on a local area network (LAN). It helps share resources such as files, printers, and serial ports among computers. In a TCP/IP network, NetBIOS clients, such as Windows systems, use NetBIOS over TCP/IP to connect to servers, and then issue SMB commands to complete tasks such as accessing shared files and printers. AFP is a file transfer protocol similar to SMB.

Layer 5: Session Layer

Session layer—Describes how data between applications is synched and recovered if messages don't arrive intact at the receiving application

Which of the following protocols handles authentication, authorization, and accounting services?

TACACS+ Terminal Access Controller Access Control System Plus (TACACS+) handles authentication, authorization, and accounting (AAA) services. It is an authentication protocol that uses TCP port 49, supports multifactor authentication, and is considered more secure and scalable than RADIUS.

A technician wants to ensure sensitive data is not exfiltrated from the system electronically. Which of the following should be implemented?

The technician should use the data loss prevention (DLP) to ensure sensitive data is not exfiltrated from the system electronically. DLP is used to classify and protect your organization's confidential and critical data. Within the software, you create rules that prevent users from accidentally or maliciously sharing particular types of data outside your organization. For example, a DLP rule might prevent users from forwarding any business emails outside of the corporate mail domain.

Layer 4: Transport Layer

Transport layer—Responsible for transporting Application layer payloads from one application to another Two main Transport layer protocols are: T C P (Transmission Control Protocol)—Makes a connection with the end host, checks whether data was received; called a connection-oriented protocol U D P (User Datagram Protocol)—Does not guarantee delivery by first connecting and checking whether data is received; called a connectionless protocol

Which is a specification for a suite of high-level communication protocols used to create personal area networks with small and low-power digital radios?

Zigbee is a suite of high-level communication protocols used to create personal area networks with small and low-power digital radios. It is an open standard based on the IEEE 802.15.4 PAN standards, maintained by the ZigBee Alliance. It can use a variety of ISM bands, with 2.4 GHz and 915 MHz bands being the most common.


Set pelajaran terkait

10 Implementing Response Objectives

View Set

Chapter 12 Business Policy Final

View Set

Soils, Rocks, and Landforms Unit: Investigation 1

View Set

Tool marks and impression evidence

View Set

chapter 6 animation assessment : kinetic and potential energy

View Set

N320 MedSurg Exam 2 Review: Cellular Regulation, Glucose Regulation and Hormone Regulation

View Set