GOOGLE IT SUPPORT PROFFESIONAL CERTIFICATION EXAM TEST BANK 100 QUESTIONS WITH 100% CORRECT ANSWERS UPDATED
1 view 0 purchase
Course
GOOGLE IT SUPPORT PROFFESIONAL CERTIFICATION
Institution
GOOGLE IT SUPPORT PROFFESIONAL CERTIFICATION
GOOGLE IT SUPPORT PROFFESIONAL CERTIFICATION EXAM TEST BANK 100 QUESTIONS WITH 100% CORRECT ANSWERS UPDATED
A person at a coffee shop leaves a laptop logged in with a token and walks away for a short time. An attacker goes to the laptop and starts impersonating the laptop's user on the website t...
GOOGLE IT SUPPORT PROFFESIONAL
CERTIFICATION EXAM TEST BANK 100
QUESTIONS WITH 100% CORRECT
ANSWERS UPDATED 2023-2024
A person at a coffee shop leaves a laptop logged in with a token and walks away for a
short time. An attacker goes to the laptop and starts impersonating the laptop's user on
the website the user is logged into. What kind of attack is this? - Answer-session
hijacking attack
Which one of these shows why DNS cache poisoning attack is dangerous? - Answer-It
allows an attacker to redirect targets to malicious web servers.
Which of the following is true of a DDoS attack? - Answer-Attack traffic comes from lots
of different hosts; The "Distributed" in DDoS means that the attack traffic is distributed
across a large number of hosts, resulting in the attack coming from many different
machines.
Which one of the following results from a denial-of-service attack? - Answer-DoS attack
is meant to prevent legitimate traffic from reaching a service. This is usually done by
flooding the victim with attack traffic, which renders services unreachable.
injection attacks - Answer-A common security exploit that can occur in software
development and runs rampant on the web, where an attacker injects malicious code
cross-site scripting (XSS) attacks - Answer-a type of injection attack where the attacker
can insert malicious code and target the user of the service
SQL Injection attack - Answer-An attack that targets the entire website if the website is
using a SQL database
password attack - Answer-utilize software like password-crackers that try and guess
your password
brute force attack - Answer-systematically tries numerous character combinations to
crack passwords, which can be time consuming
dictionary attacks - Answer-use lists of common words and phrases, making strong,
complex passwords more effective
, CAPTCHA (Completely Automated Public Turing Test to Tell Computers and Humans
Apart) - Answer-help differentiate humans from bots, adding an extra layer of security
against automated attacks
social engineering - Answer-it involves manipulating people into divulging confidential
information or performing actions that compromise security.
phishing attack - Answer-occurs when a malicious email is
sent to a victim disguised as something legitimate.
Which layer of the networking model is responsible for defining a common way for
network devices to interpret signals? - Answer-Data Link Layer (or network
interface/network access layer)
Which protocol is used at the Network Layer to enable communication between different
networks? - Answer-IP or internet protocol
Which layer of the networking model is responsible for ensuring that data gets to the
right applications running on different nodes? - Answer-Transport layer
Which protocol provides mechanisms to ensure reliable data delivery? - Answer-TCP
Which layer of the networking model contains application-specific protocols like those
for browsing the web or sending emails? - Answer-Application Layer
The physical layer deals with the software components of a network. (True/False) -
Answer-False
The data link layer is responsible for getting data delivered across a collection of
networks. (True/False) - Answer-False
The network layer sorts out which client and server programs receive data. (True/False)
- Answer-False
The transport layer uses protocols like TCP and UDP to ensure reliable data delivery.
(True/False) - Answer-True
The application layer is the lowest layer in the networking model. (True/False) - Answer-
False/it is the top layer in the networking model
Why is it important to understand the different layers of the networking model? -
Answer-Understanding each layer of the network model can help troubleshoot issues in
a logical order.
Data Packet - Answer-An all-compassing term that represents any single set of binary
data being sent across a network link
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Perfectscorer. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $14.29. You're not tied to anything after your purchase.