CNIT 34220 Quiz Questions Latest Update Graded A
CNIT 34220 Quiz Questions Latest Update Graded A Quiz 1 Quiz 1 PTR Records are used exclusively in forward name resolution tables. False (reverse) To be considered authoritative, a DNS server must store records persistently. True DNS zones and domains are synonymous. False From a practical perspective the DNS name space is larger than anyone should need. True The DNS system would take a disproportionate amount of the Internet bandwidth if it were not for caching. True You must provide three DNS servers that are available 24/7 to register a second level domain name. False 192.168.1.IN-ADDR.ARPA is the typical name of the reverse address zone for the 192.168.1.0/24 network. False Root servers should only be consulted when a DNS server doesn't know the address of a DNS server that is authoritative for the domain in question. True Best practice is to use your internet DNS domain for active directory. False ICANN is responsible for creating top level domains. True Quiz 2 Quiz 2 A good spam control system should prevent users from being able to override spam decisions. False Blacklisting services (MAPS, Spamhaus SBL, etc.) typically block specific e-mail from: addresses. False E-mail is a real-time communication technique. False (store and forward communication technique) IMAP is a means of retrieving mail on a server from a client. False (accessing not retrieving) POP3 is a means of accessing mail on a server from a loosely attached (not on the network 24/7) client False (retrieving not accessing) A valid e-mail address contains a username and a DNS entry. True SMTP is used to deliver mail between hosts. True When using a relay host you should limit the hosts that it will service. True When setting up e-mail architectures you should incorporate a relay host (forwarder) in the DMZ for outgoing mail. True SMTP natively supports eight bit data encoding. False (seven bit ASCII encoding) The main reason for spam is lack of authentication in SMTP. True SMTP session verification uses DNS to verify which servers should send mail for a domain. True SMTP only sends one copy of a message to a destination host regardless of how many users on the destination host are to receive the message. True When using a forwarder, bounces can come from the origin host, relay host, or destination host. True A spam control filtering technique that learns is termed Bayesian Filter. True Quiz 3 Quiz 3 Caching, user authentication, encryption, and filtering are all benefits of outbound proxy servers. False (outbound proxy doesn't add encryption) The preferred method for assigning multiple web sites (DNS names) to a single server is using multiple IP addresses. False (use CNAME DNS records to assign multiple names to single IP) SSL and TLS are the same technology. True Converting to a transparent outbound proxy server requires hijacking traffic and spoofing return source IP addresses. True DNS flagging effectively balances load across multiple web servers. False A transparent proxy server can readily serve both HTTP and HTTPS. False (cannot serve HTTPS) The HTTP protocol typically has multiple, concurrent open TCP connections for each web page. True Each HTTPS enabled web site (DNS name) requires a separate IP address. True Quiz 4 Quiz 4 Virtual machines should always use NTP because their time tends to drift. False (use VMware Tools) Current versions of NTP use a 32 bit representation that is accurate to 0.233 nanoseconds. False (64 bit) Ideally there should be least one stratum 4 or better time servers with an organization. False (two stratum 3) The most commonly used stratum 0 time source is __________. GPS receiver The SNTP protocol consistently checks time and uses a drift file to ensure accurate time keeping. False (NTP, SNTP asks only once) The purpose of Marzullo's algorithm is to take into account the transmission duration of the time information in NTP. True If you have no specific time server to reference you may use the public pools available at #.pool.________________. In a Windows domain, clients receive time information from the Primary Domain Controller or PDC Emulator. True Time servers at stratum 2 or higher numbers peer with one another. True Quiz 5 Quiz 5 SSL Acceleration requires the ADC fully proxy the web site. True In full proxy load balancing there are two separate data flows. True The single point of failure created by an ADC makes their use limited as there is no way to mitigate this risk. False (multiple ways to mitigate) Acceleration refers to offloading some of the server's functionality to the application delivery controller. True Order the components of a web application delivery controller based system in order beginning with the user. browser, client, firewall, adc, webserver Which of the following are capabilities of application delivery controllers? load balancing, fail-over, ssl acceleration, monitoring When managing data flows through an application delivery controller the return traffic from the application server to the client must have a source address of the ___________. ADC When load balancing HTTP(S) you must ensure that each ________________ is persistently reaching the same server. client Cloud computing relies heavily on virtualization technologies. True
Written for
- Institution
- CNIT 34220
- Course
- CNIT 34220
Document information
- Uploaded on
- January 30, 2024
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
cnit 34220 quiz questions latest update graded a
Also available in package deal