Proxy, DNS, Security, Cloud, AI, ML, Webtech Flashcards

1
Q

A proxy server
1) hides your IP
2) can encrypt data
3) can block access to certain web pages, based on IP address or contents
4) can function as firewall
5) can cache sites

A

All of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a strong option for popular websites that need to balance the load of many incoming requests
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy

A

reverse proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

helps prevent identity theft and keep your browsing habits private
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy

A

anonymous proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They can prevent a website from serving you targeted marketing content based on your location
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy

A

anonymous proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This passes a false IP address for clients while identifies itself as a proxy
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

distorting proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This periodically change the IP address they present to the web server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

High anonymity proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOR Network is an example of
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

High anonymity proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This provides encryption between the client and the server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

SSL proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cache cannot be used with
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

SSL proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Top level domain
http://bsnl.co.in
1) co.in
2) .in
3) bsnl.co.in
4) bsnl

A

.in
(root domain is the hidden dot at the end like .in. .com.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in DNS, FQDN stands for

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many DNS root servers are available?

A

13
operated by 12 different organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Root server replies to resolver with
1) IP address of site
2) IP address of TLD server
3) IP address of authoritative server

A

IP address of TLD server
TLD: Top Level Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TLD server stores address information for
1) top level domains
2) root server
3) both

A

top level domains
(.net, .com, .org etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TLD server replies to resolver with
1) IP address of site
2) IP address of root server
3) IP address of authoritative name server

A

IP address of authoritative server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The final authority about IP address of a site
1) root server
2) TLD server
3) authoritative name server

A

authoritative name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS response for IPv4 address
1) A record
2) AA record
3) AAA record
4) AAAA record

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS response for IPv6 address
1) A record
2) AA record
3) AAA record
4) AAAA record

A

AAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The _______ record resolves domain names to domain names
1) A record
2) CNAME record
3) MX record
4) SOA record

A

CNAME records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DNS record pointing to mail servers
1) A record
2) CNAME record
3) MX record
4) SOA record

A

MX record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The _______ record stores administrative information about a DNS zone.
1) A record
2) CNAME record
3) MX record
4) SOA record

A

SOA (start of authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The _____ provides
the name of the authoritative name
server within a domain.
1) MX record
2) CNAME record
3) NS record
4) SOA record

A

NS (Name Server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The _______ points to a server and a service by including a port number.
1) MX record
2) SRV record
3) NS record
4) SOA record

A

SRV (service record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The _______ record resolves domain names to IP addresses
1) A record
2) AAAA record
3) PTR record
4) SOA record

A

1) A record (IPv4)
2) AAAA record (IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The _______ record resolves IP addresses to domain names
1) A record
2) AAAA record
3) PTR record
4) SOA record

A

PTR record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

All DNS records also have a ________ and indicates how often a DNS server will refresh that record.
1) TTL
2) TLT

A

TTL, which stands for time-to-live,

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Information Security Components or Qualities are
1) Confidentiality
2) Integrity
3) Availability
4) Authenticity

A

1,2,3
Confidentiality - Preventing disclosure of information to unauthorized
individuals or systems
Integrity - Data shall not be modified without authorization.
Availability - must be available when it is needed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Sender Policy Framework (SPF) is against
1) spoofing
2) spamming

A

spoofing emails
(SPF is an email authentication method)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

in WiFi security, WPA stands for

A

Wi-Fi Protected Access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

in WiFi security, WEP stands for

A

Wired Equivalent Privacy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Types of DNS queries
1) Recursive
2) Iterative
3) non-recursive

A

all of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Different kinds of firewalls
1) packet filters
2) application gateways
3) proxy servers

A

all of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

_______firewall examines each packet based on Source IP address, Destination IP address, TCP/UDP source port and TCP/UDP destination port
1) static packet filters
2) circuit-level gateways

A

static packet filters
- Logging capabilities are limited here
- Does not support user authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Is a router with an access list a firewall?
(a router with packet filtering
capabilities)
1. Yes
2. No

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

___________ firewalls are susceptible to IP
spoofing
1) static packet filters
2) circuit-level gateways

A

static packet filters

36
Q

Larger enterprises can also use _________ as part of a layered defense to screen potentially harmful traffic between internal departments.
1) static packet filters
2) circuit-level gateways

A

static packet filters

37
Q

_________ monitor TCP handshakes and other network protocol session initiation messages across the network
1) static packet filters
2) circuit-level gateways

A

circuit-level gateways
(They don’t inspect the packets themselves)

38
Q

packet filtering firewall is
1) Stateful Inspection Firewall
2) Stateless Firewall
3) Application-Level Gateway Firewall
4) Next-Generation Firewall

A

Stateless Firewall

39
Q

_______ is referred to as a proxy
firewall
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall

A

Application-Level Gateway Firewall

40
Q

_________ monitors TCP handshakes and other network protocol session initiation messages
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall

A

circuit-level gateways
- works in seesion layer

41
Q

_________ works in session layer
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall

A

circuit-level gateways
- monitors TCP handshakes and other network protocol session initiation messages

42
Q

_________checks contents of the packets in addition to headers
1) static packet filters
2) circuit-level gateways
3) Application-Level Gateway Firewall
4) Next-Generation Firewall

A

3 and 4

43
Q

This type of firewall is situated at Layer 3 and Layer 4 of the Open Systems Interconnection (OSI) model.
1) Stateful Inspection Firewall
2) Stateless Firewall
3) Application-Level Gateway Firewall
4) Next-Generation Firewall

A

Stateful Inspection Firewall

44
Q

MSSPs offer cloud-based firewalls. MSSP stands for

A

Managed Security Service Providers

45
Q

Storage virtualization is commonly used in
1) NAS
2) SAN

A

SAN: storage area networks

46
Q

Humanoid robot
1) Erica
2) Sophia
3) Ameca

A

all of them

47
Q

Three types of machine learning

A

1) supervised learning
2) reinforcement learning
3) unsupervised learning

48
Q

machine learns from known datasets (set of training examples), and then predict
the output.
1) supervised learning
2) reinforcement learning
3) unsupervised learning

A

supervised learning

49
Q

Classifications and Regression are algorithms for
1) supervised learning
2) reinforcement learning
3) unsupervised learning

A

supervised learning

50
Q

An AI agent is trained by giving some commands, and on each action, an agent gets a reward as a feedback. Using these feedbacks, agent improves its performance
1) supervised learning
2) reinforcement learning
3) unsupervised learning

A

reinforcement learning
can be positive or negative reinforcement

51
Q

The agent needs to learn from patterns without corresponding output values. The algorithms are trained with data which is neither labeled nor classified
1) supervised learning
2) reinforcement learning
3) unsupervised learning

A

unsupervised learning

52
Q

Clustering and Association are algorithms for
1) supervised learning
2) reinforcement learning
3) unsupervised learning

A

unsupervised learning

53
Q

Algorithms for supervised learning
1) Association
2) Classifications
3) Clustering
4) Regression

A

Classifications and Regression

54
Q

Algorithms for unsupervised learning
1) Association
2) Classifications
3) Clustering
4) Regression

A

Clustering and Association

55
Q

enables a computer system to understand and process human language such as English
1) NLP
2) DNS

A

NLP: Natural Language processing

56
Q

The Input and output of NLP applications can be
1) speech
2) text
3) image
4) all the above

A

1 and 2
speech or text

57
Q

_______ provides the ability to an AI agent to mimic the human brain.
1) NLP
2) Deep learning

A

Deep learning

58
Q

Deep learning can use
1) supervised learning
2) unsupervised learning
3) both

A

both

59
Q

PHP is used in
1) Server-side scripting
2) Command line scripting
3) Writing desktop applications
4) All of the above

A

All of the above

60
Q

You can make a PHP script to run it without any server or browser T/F

A

True
You only need the PHP parser to use it this way. This type of usage is ideal for scripts regularly executed using cron (on *nix or Linux) or Task Scheduler (on Windows). These scripts can also be used for simple text processing tasks

61
Q

_____ is ideal for scripts regularly executed using cron (on *nix or Linux) or Task Scheduler (on Windows)
1) PHP for Server-side scripting
2) PHP for Command line scripting
3) PHP for Writing desktop applications

A

PHP for Command line scripting

62
Q

PHP-GTK is used for
1) Server-side scripting
2) Command line scripting
3) Writing desktop applications
4) All of the above

A

Writing desktop applications

63
Q

PHP can output
1) HTML
2) images
3) PDF
4) flash movies

A

all of them

64
Q

________ is a dynamic language where you can safely modify a program while it is running.
1) PHP
2) Java

A

Java

65
Q

REPL in python implementation stands for

A

Read Eval Print Loop

66
Q

Melissa was a
1) Boot sector viruses
2) E-mail virus
3) worm

A

E-mail virus

67
Q

______ attach itself to a file
1) virus
2) worm

A

virus

68
Q

______ copies itself across the network without attachment
1) virus
2) worm

A

worm

69
Q

_______ can be used to conduct distributed denial of service attacks or to send spam email
1) zombies
2) proxy server

A

zombies
Refers to a computer that connects to the Internet and is controlled by unauthorized third party without permission and awareness of computer’s user

70
Q

______ refers to a computer that connects to the Internet and is controlled by unauthorized third party without permission and awareness of computer’s user
1) zombies
2) proxy server

A

zombies
can be used to conduct distributed denial of service attacks or to send spam email

71
Q

An E-mail virus
1) MyDoom
2) Melissa

A

Melissa

72
Q

Microsoft suffered an attack from a DDoS called ____
1) MyDoom
2) Melissa

A

MyDoom

73
Q

Sender ID Framework (SIDF) is used to counter
1) Virus
2) E-mail spoofing
3) Phishing

A

E-mail spoofing and Phishing

74
Q

All administrative domains registered with the
Internet form a hierarchical structure, called _____

A

DNS domain namespace
An administrative domain is a group of computers in a single administrative unit.

75
Q

All DNS servers fall into one of four categories:
1) Recursive resolvers
2) root name servers
3) TLD name servers
4) authoritative name servers

A

In DNS lookup process (when there is no caching), these four DNS servers work mutually to resolve the IP address for a specified domain name

76
Q

Root name server is managed by
1) ICAAN
2) IANA

A

ICAAN: Internet Corporation for Assigned Names and Numbers

77
Q

TLD name server is managed by
1) ICAAN
2) IANA

A

IANA: Internet Assigned Numbers Authority

78
Q

ISO/IEC 27002 is an information security standard

A

T

79
Q

Typically, an attacker sends an e-mail message that seems it has originated from a legitimate Internet address.
1) spoofing
2) phishing
3) spamming

A

phishing

80
Q

Virtualization is mainly used for
1) Network Virtualization
2) Server Virtualization
3) Storage Virtualization
4) all of them

A

all of them

81
Q

Two major roles in Service-Oriented Architecture
1) Service Provider
2) Service Transporter
3) Service consumer

A

1) Service Provider
3) Service consumer

82
Q

A virtual assistant
1) Erica
2) Sophia
3) Ameca
4) TeslaBot

A

TeslaBot

83
Q

speech recognition system can be
1) Speaker Dependent
2) Speaker Independent
3) either 1 or 2

A

either 1 or 2

84
Q

which one is correct
1) JVM is part of JRE
2) JRE is part of JVM

A

JVM is part of JRE

85
Q

Python can be treated in
1) a procedural way
2) an object-oriented way
3) a functional way
4) all the above

A

ll the above