QUESTIONS WITH CORRECT ANSWERS
GRADED A+
◍ Infrastructure layer.
Answer: is made up of the physical switches in the network. These switches
forward the network traffic to their destinations and communicates with
control layer via SBI.
◍ Trend Lines.
Answer: Visual tool used to analyze progress over time
◍ Endrew F. (2017).
Answer: IEPs must enable meaningful and ambitious progress
◍ Open Virtual Switch (OVS).
Answer: Open-source implementation of a distributed programmable virtual
multi-layer switch. Generally consist of flow tables, with each flow entry
having match conditions and associated actions. Communicates with the
controller using a secure channel, and generally uses the OpenFlow
protocol.
◍ Security mechanism - Automated Recovery.
Answer: In the case of security attacks, leading to service disruption, the
proactive and reactive security recovery mecha nisms can help in
maintaining optimal service availability.
◍ Reconnaissance.
Answer: The attacker gathers information on the target before the actual
attack starts.
◍ SDLC Operations and Maintenance Phase.
, Answer: Configuration management and controlContinuous monitoring
◍ netfilter framework.
Answer: The iptables firewall works by interacting with the packet filtering
hooks in the Linux kernel's networking stack. It is a command-line interface
to the packet filtering functionality in netfilter.
◍ IDEA Consent.
Answer: Parent approval is required before conducting assessments
◍ VXLAN (Virtual Extensible LAN).
Answer: Network virtualization technology that attempts to improve the
scalability problems associated with large cloud computing deployments. It
uses a VLAN-like encapsulation technique to encapsulate layer 2 Ethernet
frames within layer 4 UDP packets
◍ Security mechanism - Controller-App Plane Trust.
Answer: Controller and application plane components should use autonomic
trust management mecha nisms based on mutual-trust and delegated trust
(3rd part such as the Certi fi cate Authority to establish trust).
◍ physical network.
Answer: Visible and physically presented to connect physical computers.
◍ Pre-Referral Interventions.
Answer: Supports provided before special education evaluation; cannot
delay evaluation under IDEA
◍ East / Westbound interfaces.
Answer: Are meant for communication between groups or federations of
controllers.
◍ Formal Assessments.
Answer: Standardized tests that are reliable and comparable but may miss
context (e.g., state reading exam)
◍ Sahara.
Answer: OpenStack module formerly called Savanna, provides big data
, services by providing Elastic MapReduce and ability to provision Hadoop.
◍ VM-FW-R3.
Answer: NIST 800-125B recommendation that states for both subnet-level
and kernel-based virtual firewalls, it is preferable if the firewall is integrated
with a virtualization management platform rather than being accessible only
through a stand alone console.
◍ host-based logging.
Answer: This approach minimizes the network traffic by transfer ring logs
into a centralized log server; however, it incurs significant manage ment
overhead to retrieve logging data from individual hosts.
◍ MTD - Redundancy.
Answer: Creates multiple replicas of a network component in order to
maintain an optimal level of service in case of network attacks like DDoS
attacks. Another benefit is that we can create decoys in the network for
increasing the discovery time of the actual target.
◍ IEEE 1588.
Answer: Standard for a Precision Time Protocol (PTP) that enables precise
synchronization of clocks in measurement and control systems implemented
with technologies such as network communication, local computing, and
distributed objects.
◍ Validity.
Answer: Extent to which an assessment measures what it is intended to
measure; includes content, construct, and predictive validity
◍ Software-Defined Networks (SDN).
Answer: This architecture decouples the network control and forwarding
functions enabling the network control to become directly programmable
and the underlying infrastructure to be abstracted for applications and
network services.
◍ Attack.
Answer: An action triggered by deploying an attacking method, when a