6.
At which layer of the OSI model does a proxy operate?
- A.Physical
- B.Network
- C.Data Link
- D.Application
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Proxies operate at Layer 7, the Application layer of the OSI model. Proxies are capable of filtering network traffic based on content such as keywords and phrases. Because of this, a proxy digs down farther than a packet’s header and reviews the data within the packet as well. |
7.
If a device is using node MAC addresses to funnel traffic, what layer of the OSI model
is this device working in?
- A.Layer 1
- B.Layer 2
- C.Layer 3
- D.Layer 4
- Answer & Explanation
- Report
Answer : [B]
Explanation :
Explanation :
A network device that uses MAC addresses for directing traffic resides on Layer 2 of the OSI model. Devices that direct traffic via IP addresses, such as routers, work at Layer 3. |
8.
Which OS holds 90 percent of the desktop market and is one of our largest attack
surfaces?
- A.Windows
- B.Linux
- C.Mac OS
- D.iOS
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Windows remains king for sheer volume and presence on desktop and servers. |
9.
Which port uses SSL to secure web traffic?
- A.443
- B.25
- C.23
- D.80
- Answer & Explanation
- Report
Answer : [A]
Explanation :
Explanation :
Port 443 is used for HTTPS traffic, which is secured by SSL. |
10.
What kind of domain resides on a single switchport?
- A.Windows domain
- B.Broadcast domain
- C.Secure domain
- D.Collision domain
- Answer & Explanation
- Report
Answer : [D]
Explanation :
Explanation :
Each port on a switch represents a collision domain. |
- Pages
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40