with 100% Correct Answers
Which application layer threat is typically disguised as a useful program to trick the user
into downloading it? - Answer- Trojan horse
Carl is a network engineer. He is hardening a server to make it less vulnerable to
attacks. What is the most secure method of handling open ports? - Answer- Apply the
deny-all principal and enable only those ports that are needed
Maria is a network analyst for an enterprise. She is creating guidelines for network
personnel to apply to business issues that may need a new software application to
resolve. Which of the following is the best overall approach? - Answer- Understand the
business problem, identify a business solution, and then identify a technical solution
True or false? The session Lair (OSI layer, five) is the first layer that connects packets
together into conversations. - Answer- True
True or false? In half duplex mood, both ends of a connection can communicate
simultaneously. - Answer- False
True or false? The application layer of the OSI model got its name from its main
purpose of making receive data presentable to the presentation layer - Answer- False
True or false? The presentation layer of the OSI model converts data into standard
formats, such as American standard code for information, interchange (ASCII), for
application program use. - Answer- True
True or false? The user interface is where front in software interfaces with a computer
user. - Answer- True
True or false? What the OSI model calls and "application" refers to a user application,
such as a web browser. - Answer- False
True or false? The term "3-tier architecture" refers to the separate tiers, represented by
the client, appServer, and database server. - Answer- True
True or false? Cloud computing makes it possible for organizations of any size to lease
data center infrastructure and implement an N-tier architecture. - Answer- True