Proxy, DNS, Security, Cloud, AI, ML, Webtech Flashcards

1
Q

A proxy server
1) hides your IP
2) can encrypt data
3) can block access to certain web pages, based on IP address or contents
4) can function as firewall
5) can cache sites

A

All of them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

a strong option for popular websites that need to balance the load of many incoming requests
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy

A

reverse proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

helps prevent identity theft and keep your browsing habits private
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy

A

anonymous proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

They can prevent a website from serving you targeted marketing content based on your location
1) transparent proxy
2) forward proxy
3) reverse proxy
4) anonymous proxy

A

anonymous proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This passes a false IP address for clients while identifies itself as a proxy
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

distorting proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

This periodically change the IP address they present to the web server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

High anonymity proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

TOR Network is an example of
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

High anonymity proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This provides encryption between the client and the server
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

SSL proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Cache cannot be used with
1) reverse proxy
2) anonymous proxy
3) distorting proxy
4) High anonymity proxy
5) SSL proxy

A

SSL proxy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Top level domain
http://bsnl.co.in
1) co.in
2) .in
3) bsnl.co.in
4) bsnl

A

.in
(root domain is the hidden dot at the end like .in. .com.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

in DNS, FQDN stands for

A

Fully Qualified Domain Name

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How many DNS root servers are available?

A

13
operated by 12 different organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Root server replies to resolver with
1) IP address of site
2) IP address of TLD server
3) IP address of authoritative server

A

IP address of TLD server
TLD: Top Level Domain

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TLD server stores address information for
1) top level domains
2) root server
3) both

A

top level domains
(.net, .com, .org etc.)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TLD server replies to resolver with
1) IP address of site
2) IP address of root server
3) IP address of authoritative name server

A

IP address of authoritative server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The final authority about IP address of a site
1) root server
2) TLD server
3) authoritative name server

A

authoritative name server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DNS response for IPv4 address
1) A record
2) AA record
3) AAA record
4) AAAA record

A

A

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

DNS response for IPv6 address
1) A record
2) AA record
3) AAA record
4) AAAA record

A

AAAA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The _______ record resolves domain names to domain names
1) A record
2) CNAME record
3) MX record
4) SOA record

A

CNAME records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

DNS record pointing to mail servers
1) A record
2) CNAME record
3) MX record
4) SOA record

A

MX record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

The _______ record stores administrative information about a DNS zone.
1) A record
2) CNAME record
3) MX record
4) SOA record

A

SOA (start of authority)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The _____ provides
the name of the authoritative name
server within a domain.
1) MX record
2) CNAME record
3) NS record
4) SOA record

A

NS (Name Server)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The _______ points to a server and a service by including a port number.
1) MX record
2) SRV record
3) NS record
4) SOA record

A

SRV (service record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The _______ record resolves domain names to IP addresses
1) A record
2) AAAA record
3) PTR record
4) SOA record

A

1) A record (IPv4)
2) AAAA record (IPv6)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The _______ record resolves IP addresses to domain names 1) A record 2) AAAA record 3) PTR record 4) SOA record
PTR record
26
All DNS records also have a ________ and indicates how often a DNS server will refresh that record. 1) TTL 2) TLT
TTL, which stands for time-to-live,
27
Information Security Components or Qualities are 1) Confidentiality 2) Integrity 3) Availability 4) Authenticity
1,2,3 Confidentiality - Preventing disclosure of information to unauthorized individuals or systems Integrity - Data shall not be modified without authorization. Availability - must be available when it is needed
28
Sender Policy Framework (SPF) is against 1) spoofing 2) spamming
spoofing emails (SPF is an email authentication method)
29
in WiFi security, WPA stands for
Wi-Fi Protected Access
30
in WiFi security, WEP stands for
Wired Equivalent Privacy
31
Types of DNS queries 1) Recursive 2) Iterative 3) non-recursive
all of them
32
Different kinds of firewalls 1) packet filters 2) application gateways 3) proxy servers
all of them
33
_______firewall examines each packet based on Source IP address, Destination IP address, TCP/UDP source port and TCP/UDP destination port 1) static packet filters 2) circuit-level gateways
static packet filters - Logging capabilities are limited here - Does not support user authentication
34
Is a router with an access list a firewall? (a router with packet filtering capabilities) 1. Yes 2. No
Yes
35
___________ firewalls are susceptible to IP spoofing 1) static packet filters 2) circuit-level gateways
static packet filters
36
Larger enterprises can also use _________ as part of a layered defense to screen potentially harmful traffic between internal departments. 1) static packet filters 2) circuit-level gateways
static packet filters
37
_________ monitor TCP handshakes and other network protocol session initiation messages across the network 1) static packet filters 2) circuit-level gateways
circuit-level gateways (They don't inspect the packets themselves)
38
packet filtering firewall is 1) Stateful Inspection Firewall 2) Stateless Firewall 3) Application-Level Gateway Firewall 4) Next-Generation Firewall
Stateless Firewall
39
_______ is referred to as a proxy firewall 1) static packet filters 2) circuit-level gateways 3) Application-Level Gateway Firewall 4) Next-Generation Firewall
Application-Level Gateway Firewall
40
_________ monitors TCP handshakes and other network protocol session initiation messages 1) static packet filters 2) circuit-level gateways 3) Application-Level Gateway Firewall 4) Next-Generation Firewall
circuit-level gateways - works in seesion layer
41
_________ works in session layer 1) static packet filters 2) circuit-level gateways 3) Application-Level Gateway Firewall 4) Next-Generation Firewall
circuit-level gateways - monitors TCP handshakes and other network protocol session initiation messages
42
_________checks contents of the packets in addition to headers 1) static packet filters 2) circuit-level gateways 3) Application-Level Gateway Firewall 4) Next-Generation Firewall
3 and 4
43
This type of firewall is situated at Layer 3 and Layer 4 of the Open Systems Interconnection (OSI) model. 1) Stateful Inspection Firewall 2) Stateless Firewall 3) Application-Level Gateway Firewall 4) Next-Generation Firewall
Stateful Inspection Firewall
44
MSSPs offer cloud-based firewalls. MSSP stands for
Managed Security Service Providers
45
Storage virtualization is commonly used in 1) NAS 2) SAN
SAN: storage area networks
46
Humanoid robot 1) Erica 2) Sophia 3) Ameca
all of them
47
Three types of machine learning
1) supervised learning 2) reinforcement learning 3) unsupervised learning
48
machine learns from known datasets (set of training examples), and then predict the output. 1) supervised learning 2) reinforcement learning 3) unsupervised learning
supervised learning
49
Classifications and Regression are algorithms for 1) supervised learning 2) reinforcement learning 3) unsupervised learning
supervised learning
50
An AI agent is trained by giving some commands, and on each action, an agent gets a reward as a feedback. Using these feedbacks, agent improves its performance 1) supervised learning 2) reinforcement learning 3) unsupervised learning
reinforcement learning can be positive or negative reinforcement
51
The agent needs to learn from patterns without corresponding output values. The algorithms are trained with data which is neither labeled nor classified 1) supervised learning 2) reinforcement learning 3) unsupervised learning
unsupervised learning
52
Clustering and Association are algorithms for 1) supervised learning 2) reinforcement learning 3) unsupervised learning
unsupervised learning
53
Algorithms for supervised learning 1) Association 2) Classifications 3) Clustering 4) Regression
Classifications and Regression
54
Algorithms for unsupervised learning 1) Association 2) Classifications 3) Clustering 4) Regression
Clustering and Association
55
enables a computer system to understand and process human language such as English 1) NLP 2) DNS
NLP: Natural Language processing
56
The Input and output of NLP applications can be 1) speech 2) text 3) image 4) all the above
1 and 2 speech or text
57
_______ provides the ability to an AI agent to mimic the human brain. 1) NLP 2) Deep learning
Deep learning
58
Deep learning can use 1) supervised learning 2) unsupervised learning 3) both
both
59
PHP is used in 1) Server-side scripting 2) Command line scripting 3) Writing desktop applications 4) All of the above
All of the above
60
You can make a PHP script to run it without any server or browser T/F
True You only need the PHP parser to use it this way. This type of usage is ideal for scripts regularly executed using cron (on *nix or Linux) or Task Scheduler (on Windows). These scripts can also be used for simple text processing tasks
61
_____ is ideal for scripts regularly executed using cron (on *nix or Linux) or Task Scheduler (on Windows) 1) PHP for Server-side scripting 2) PHP for Command line scripting 3) PHP for Writing desktop applications
PHP for Command line scripting
62
PHP-GTK is used for 1) Server-side scripting 2) Command line scripting 3) Writing desktop applications 4) All of the above
Writing desktop applications
63
PHP can output 1) HTML 2) images 3) PDF 4) flash movies
all of them
64
________ is a dynamic language where you can safely modify a program while it is running. 1) PHP 2) Java
Java
65
REPL in python implementation stands for
Read Eval Print Loop
66
Melissa was a 1) Boot sector viruses 2) E-mail virus 3) worm
E-mail virus
67
______ attach itself to a file 1) virus 2) worm
virus
68
______ copies itself across the network without attachment 1) virus 2) worm
worm
69
_______ can be used to conduct distributed denial of service attacks or to send spam email 1) zombies 2) proxy server
zombies Refers to a computer that connects to the Internet and is controlled by unauthorized third party without permission and awareness of computer's user
70
______ refers to a computer that connects to the Internet and is controlled by unauthorized third party without permission and awareness of computer's user 1) zombies 2) proxy server
zombies can be used to conduct distributed denial of service attacks or to send spam email
71
An E-mail virus 1) MyDoom 2) Melissa
Melissa
72
Microsoft suffered an attack from a DDoS called ____ 1) MyDoom 2) Melissa
MyDoom
73
Sender ID Framework (SIDF) is used to counter 1) Virus 2) E-mail spoofing 3) Phishing
E-mail spoofing and Phishing
74
All administrative domains registered with the Internet form a hierarchical structure, called _____
DNS domain namespace An administrative domain is a group of computers in a single administrative unit.
75
All DNS servers fall into one of four categories: 1) Recursive resolvers 2) root name servers 3) TLD name servers 4) authoritative name servers
In DNS lookup process (when there is no caching), these four DNS servers work mutually to resolve the IP address for a specified domain name
76
Root name server is managed by 1) ICAAN 2) IANA
ICAAN: Internet Corporation for Assigned Names and Numbers
77
TLD name server is managed by 1) ICAAN 2) IANA
IANA: Internet Assigned Numbers Authority
78
ISO/IEC 27002 is an information security standard
T
79
Typically, an attacker sends an e-mail message that seems it has originated from a legitimate Internet address. 1) spoofing 2) phishing 3) spamming
phishing
80
Virtualization is mainly used for 1) Network Virtualization 2) Server Virtualization 3) Storage Virtualization 4) all of them
all of them
81
Two major roles in Service-Oriented Architecture 1) Service Provider 2) Service Transporter 3) Service consumer
1) Service Provider 3) Service consumer
82
A virtual assistant 1) Erica 2) Sophia 3) Ameca 4) TeslaBot
TeslaBot
83
speech recognition system can be 1) Speaker Dependent 2) Speaker Independent 3) either 1 or 2
either 1 or 2
84
which one is correct 1) JVM is part of JRE 2) JRE is part of JVM
JVM is part of JRE
85
Python can be treated in 1) a procedural way 2) an object-oriented way 3) a functional way 4) all the above
ll the above