134. A peer-to-peer (P2P) networking is similar to which of the following?
a. Content delivery network
b. Value-added network
c. Ad-hoc network
d. Wide-area network
135. Which of the following is
a. Identify outdated software versions
b. Identify outdated patches
c. Identify outdated system upgrades
d. Identify open ports
136. Which of the following system security testing and information gathering tools can produce false positives?
a. Information scanning tool
b. Vulnerability scanning tool
c. Network scanning tool
d. Penetration testing tool
The automated information scanning tool does not produce false positives because it is used to collect system information efficiently to build individual profiles of the target IT system. The network scanning tool, which does not produce false positives, lists all active hosts and services operating in the address space scanned by the port-scanning tool. The penetration testing tool is a specific tool for information systems testing and does not produce false positives.
137. From a network data analysis perspective, what do many Web-based applications use?
a. Two-tiered client/server model
b. Three-tiered client/server model
c. Four-tiered client/server model
d. Five-tiered client/server model
A two-tiered client/server model is incorrect because the application stores its code, configuration settings, and supporting files on each user’s workstation, and its data on one or more central servers accessed by all users. Programs are stored on a workstation, and data is stored on a central server. Logs are most likely stored on the workstations only. This model includes client workstations and a central server.
A three-tiered client/server model is incorrect because the application separates the user interface from the rest of the application, and also separates the data from the other components. The classic three-tier model places the user interface code on the client workstation, the rest of the application code on an application server, and the data on a database server. This model includes client workstations, application server, and database server. A five-tiered client/server model is incorrect because it is complex to configure, operate, and manage.
138. Which of the following enhances an instant messaging (IM) authentication process?
a. Active directory service
b. Lightweight directory access protocol
c. Two-factor authentication
d. Role-based access permissions