QUESTIONS WITH SOLUTIONS GRADED A+
◍ DNS.
Answer: Domain Name System: hierarchical naming system associating
host names with IP addresses
◍ Application Layer Controls.
Answer: Application Layer controls are security measures implemented at
the Application Layer to protect applications from threats, such as malware
and unauthorized access.
◍ Mesh Topology.
Answer: A network layout where all nodes are directly connected to all
other nodes, providing fault tolerance and multiple alternate paths.
◍ Category 5, 5e, 6, 6a, 7, or 8 UTP cabling.
Answer: Cabling used to maximize physical distances up to 100 meters or
330 feet
◍ Subnet mask.
Answer: Binary number with 1's in leftmost prefix length positions and 0's
in other bits
◍ repeater.
Answer: A network device that regenerates the Ethernet signal to extend the
physical distance of the network.
◍ Intranet.
Answer: Private, internal network
◍ TIA-568A.
Answer: A wiring standard for RJ-45 connectors and patch panels.
,◍ Client-based Applications.
Answer: An application architecture where processing is done on the client
computer.
◍ Checksum.
Answer: Digit representing the sum of correct digits in digital data for error
detection
◍ Ethernet standards.
Answer: Specifications that define the maximum supported distance for
different GigE and 10 GigE transmission media
◍ Risk Transference.
Answer: Paying an external party to accept the financial impact of a risk
◍ IEEE 802.3 Standards.
Answer: Ethernet standards and protocols established by IEEE
◍ General Data Protection Regulation (GDPR).
Answer: EU legislation protecting personal privacy and regulating
healthcare information
◍ OSI Reference Model.
Answer: A network model that defines seven layers for network
communication.
◍ Application Server.
Answer: Computer that hosts applications for user workstations
◍ Records Retention.
Answer: Practice of retaining records for a specific time interval before
destruction
◍ Community Cloud.
Answer: Cloud infrastructure provisioned for exclusive use by a specific
community of consumers
◍ Governance.
Answer: Process of managing an organization and making decisions
,◍ Crime Prevention through Environmental Design (CPTED).
Answer: Architectural approach to reduce criminal activity
◍ OSI Reference Model.
Answer: The OSI Reference Model is a conceptual framework that
standardizes the functions of a communication system into seven layers,
facilitating interoperability between different network protocols and
technologies.
◍ Hub.
Answer: Hardware device that connects multiple networking devices
◍ Connectionless Protocol.
Answer: Treats each connection individually
◍ Frame format.
Answer: The structure of the 1's and 0's being transmitted.
◍ Resilience.
Answer: Ability to continue providing acceptable service despite challenges
◍ Incident Handling.
Answer: Mitigation of security policy violations and recommended practices
◍ Defense in Depth.
Answer: Information security strategy with multiple layers of controls
◍ Non-repudiation.
Answer: Inability to deny an action or message
◍ AppleTalk.
Answer: Proprietary Layer 3 protocol to exchange packets between Apple
computers
◍ Oversized Packet Attack.
Answer: Sending a network packet larger than expected, causing system
failure
◍ Thinnet.
, Answer: Coaxial cabling used to support 10Base2 LANs.
◍ Cabling.
Answer: The physical wires or cables used to transmit electrical signals.
◍ IPv6.
Answer: Internet Protocol version 6: new standard with larger address size
and additional features
◍ Application Layer.
Answer: The highest layer in the OSI model that interacts directly with users
or other processes.
◍ Protected Health Information (PHI).
Answer: Health information protected by HIPAA
◍ Datagram.
Answer: Packets transmitted across networks
◍ Analog voice communications.
Answer: Communications that use alternating current and transmit digits via
different voltages.
◍ Disaster Recovery Plan (DRP).
Answer: Instructions for recovering critical business functions after a
disruption
◍ Linux.
Answer: Open-source operating system
◍ Structured wiring systems.
Answer: Wiring systems used to support high-speed network connectivity
and LAN switches
◍ Spoofing.
Answer: Spoofing is a vulnerability associated with SMTP where an
attacker impersonates a trusted entity to gain unauthorized access.
◍ MAC address.