Home
You may like this!
6.
At which layer of the OSI model does a proxy operate?
  • A.
    Physical
  • B.
    Network
  • C.
    Data Link
  • D.
    Application
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Proxies operate at Layer 7, the Application layer of the OSI model. Proxies are capable of filtering network traffic based on content such as keywords and phrases. Because of this, a proxy digs down farther than a packet’s header and reviews the data within the packet as well.
Report
Name Email  
7.
If a device is using node MAC addresses to funnel traffic, what layer of the OSI model is this device working in?
  • A.
    Layer 1
  • B.
    Layer 2
  • C.
    Layer 3
  • D.
    Layer 4
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
A network device that uses MAC addresses for directing traffic resides on Layer 2 of the OSI model. Devices that direct traffic via IP addresses, such as routers, work at Layer 3.
Report
Name Email  
8.
Which OS holds 90 percent of the desktop market and is one of our largest attack surfaces?
  • A.
    Windows
  • B.
    Linux
  • C.
    Mac OS
  • D.
    iOS
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Windows remains king for sheer volume and presence on desktop and servers.
Report
Name Email  
9.
Which port uses SSL to secure web traffic?
  • A.
    443
  • B.
    25
  • C.
    23
  • D.
    80
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Port 443 is used for HTTPS traffic, which is secured by SSL.
Report
Name Email  
10.
What kind of domain resides on a single switchport?
  • A.
    Windows domain
  • B.
    Broadcast domain
  • C.
    Secure domain
  • D.
    Collision domain
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Each port on a switch represents a collision domain.
Report
Name Email