Chicklet

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

It is the interface on R1 used to send data that is destined for 10.1.1.0/24.

Consider the following routing table entry for R1: D 10.1.1.0/24 [90/2170112] via 209.165.200.226, 00:00:05, Serial0/0/0 What is the significance of the Serial0/0/0?

an address that reaches a specific group of hosts

What type of address is 01-00-5E-0A-00-02?

0607:1234:aa10:ba01

A device has an IPV6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What is the interface ID of the device?

This is a private IP address.

A high school in New York (school A) is using videoconferencing technology to establish student interactions with another high school (school B) in Russia. The videoconferencing is conducted between two end devices through the Internet. The network administrator of school A configures the end device with the IP address 209.165.201.10. The administrator sends a request for the IP address for the end device in school B and the response is 192.168.25.10. Neither school is using a VPN. The administrator knows immediately that this IP will not work. Why?

It will discard the frame.

What will a host on an Ethernet network do if it receives a frame with a unicast destination MAC address that does not match its own MAC address?

to act as a single trusted machine used to launch connections to sensitive systems

In software development, what is the purpose of a jump box?

when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data

In what two situations would UDP be better than TCP as the preferred transport protocol? (Choose two.)

when a faster delivery mechanism is needed when applications do not need to guarantee delivery of the data

In what two situations would UDP be the preferred transport protocol over TCP? (Choose two.)

Source Address: Fourth Field FCS: Seventh Field Destination Address: Third Field Ether Type: Fifth Field Preamble: First Field Data: Sixth Field SFD: Second Field

Match the Layer 2 frame field names to the correctly ordered locations for an Ethernet frame. Fields should be ordered from the beginning of the Ethernet frame to the end.

Internet Layer: - Physical Layer: 1 Session Layer: 5 Presentation Layer: 6 Transport Layer: 4 Data Link Layer: 2 Network Access Layer: - Application Layer: 7 Network Layer: 3

Match the OSI layer to the layer number. (Not all options are used.)

Cheat Sheet Series: Explains ways to mitigate command security issues in web applications Dependency Check: Looks for known vulnerabilities in code DefectDojo: Streamlines the code testing process ModSecurity Core Rule Set: Generic attack detection rules used with web application firewalls

Match the OWASP resource with a description.

Edge: Locate computing as close as possible to the user Hybrid: Made up of two or more clouds. Each part remains distinctive and separate object. Both are connected using single architecture Private: Intended for specific organization or entity. Can be set up using private network of an organization

Match the cloud model to its description. (Not all options are used.)

Production: Contains code that has been tested multiple times Testing: Includes automated tools such as henkins, CircleCI, or Travis CI and is often integrated with version control system Development: Where coding takes place Staging: Structurally as close to the actualy production environment as possible

Match the environments in the four-tier development environment structure to the description.

The gateway address is in the wrong subnet.

Refer to the exhibit. A computer that is configured with the IPv4 address as shown in the exhibit is unable to access the internet. What is the problem?​

209.165.202.129

Refer to the exhibit. An organization is using static NAT to translate the private IP address of Host A to a single public IP address leased from the ISP. Which address is the inside global address of Host A?

203.0.113.5: Outside Global 203.0.113.14: - 192.0.2.2: - 192.0.2.1: Inside Global 10.130.5.1: - 10.130.5.76: Inside Local

Refer to the exhibit. The PC is sending a packet to the Server on the remote network. Router R1 is performing NAT overload. From the perspective of the PC, match the NAT address type with the correct IP address. (Not all options are used.)

A record

What IPv4-related DNS record type is used by a DNS server in response to a host requesting for a web server address via the URL?

nslookup

What command can a technician use on a computer to see if DNS is functioning properly?

A virtual machine runs its own operating system.

What is a characteristic of a virtual machine running on a PC?

A new environment is created with the new code in it, while the old environment is held in reserve in case users experience problems.

What is a characteristic of the blue-green upgrade deployment strategy?

CI/CD

What is a philosophy for software deployment used in the field of DevOps?

has a lower latency appropriate for high-performance computing applications

What is one advantage of using the cut-through switching method instead of the store-and-forward switching method?

traps

What is the common term given to SNMP log messages that are generated by network devices and sent to the SNMP server?

to manually query the name servers to resolve a given host name

What is the function of the Nslookup utility?

namespaces

What is used to isolate the different parts of a running container?

SQL injection

Which attack involves the insertion of malicious code into SQL statements?

semicolons ;

Which characters are used to separate batched SQL statements?

sanitizing untrusted content

Which mitigation method is effective against cross-site scripting?

reverse proxy

Which security device is used to make responses to client requests look like they all come from the same server?

load balancing

Which solution improves web response time by deploying multiple web servers and DNS servers?

It allows users to circumvent existing authentication requirements.

Which statement is a characteristic of the broken access control threat to web applications?

limiting the read access to specific fields of a table or joins of tables

Which technique is used to help mitigate SQL injection attacks?

Docker

Which technology is used to containerize applications and allows them to run in a variety of environments?

network transport

Which two OSI model layers have the same functionality as two layers of the TCP/IP model? (Choose two.)


Set pelajaran terkait

Chapter 11- Measuring the Cost of Living

View Set

Chapter 37: Nursing Care of the Child With an Infectious or Communicable Disorder

View Set

Art History 225B Post-Impressionism & SYmbolism

View Set

Iggy Chapter 34: Care of Patients with Dysrhythmias

View Set

Managerial Accounting, 4e (Whitecotton) Chapter 2 Job Order Costing

View Set

Psychosis and Schizophrenia Nursing Review

View Set