318. c. Wireless LANs augment and do not replace wired LANs. In some cases, wireless LANs serve as a direct replacement for the wired LANs when starting from scratch. In most cases, a wireless LAN complements a wired LAN and does not replace it. Due to poor performance and high-cost reasons, wireless LANs do not take over the wired LANs. Wireless LANs do not substantially eliminate cabling because bridges rely on cabling for interconnection. Wireless LANs provide unique advantages such as fast and easy installation, a high degree of user mobility, and equipment portability.

319. Which of the following ISO/OSI layers does not provide confidentiality services?

a. Presentation layer

b. Transport layer

c. Network layer

d. Session layer

319. d. The session layer does not provide confidentiality service. It establishes, manages, and terminates connections between applications and provides checkpoint recovery services. It helps users interact with the system and other users.

The presentation layer is incorrect because it provides authentication and confidentiality services. It defines and transforms the format of data to make it useful to the receiving application. It provides a common means of representing a data structure in transit from one end system to another.

The transport layer is incorrect because it provides confidentiality, authentication, data integrity, and access control services. It ensures an error-free, in-sequence exchange of data between end points. It is responsible for transmitting a message between one network user and another.

The network layer is incorrect because it provides confidentiality, authentication, data integrity, and access control services. It is responsible for transmitting a message from its source to the destination. It provides routing (path control) services to establish connections across communications networks.

320. User datagram protocol (UDP) is a part of which of the following TCP/IP layers?

a. Applications layer

b. Transport layer

c. Network layer

d. Data link layer

320. b. User datagram protocol (UDP) is a part of the transport layer, along with TCP. This layer provides connection-oriented or connectionless services for transporting application layer services between networks.

The application layer is incorrect because it sends and receives data for particular applications. The network layer is incorrect because it routes packets across networks. The data link layer is incorrect because it handles communications on the physical network components.

321. Internet control message protocol (ICMP) is a part of which of the following TCP/IP layers?

a. Applications layer

b. Transport layer

c. Network layer

d. Data link layer

321. c. Internet control message protocol (ICMP) is a part of the network layer, along with IP, RAS, and IGMP. The network layer routes packets across networks.

The application layer is incorrect because it sends and receives data for particular applications. The transport layer is incorrect because it provides connection-oriented or connectionless services for transporting application layer services between networks. The data link layer is incorrect because it handles communications on the physical network components.

322. Which of the following cannot log the details of encryption-protected hypertext transfer protocol (HTTP) requests?

a. Web proxy servers

b. Routers

c. Nonproxying firewalls

d. Web browsers

322. a. Hypertext transfer protocol (HTTP) is the mechanism for transferring data between the Web browsers and Web servers. Through Web browsers, people access Web servers that contain nearly any type of data imaginable. The richest source of information for Web usage is the hosts running the Web browsers. Another good source of Web usage information is Web servers, which keep logs of the requests that they receive. Besides Web browser and servers, several other types of devices and software might also log related information. For example, Web proxy servers and application proxying firewalls might perform detailed logging of HTTP activity, with a similar level of detail to Web server logs. However, Web proxy servers cannot log the details of SSL or TLS-protected HTTP requests because the requests and the corresponding responses pass through the proxy encrypted, which conceals their contents.

Routers, nonproxying firewalls, and other network devices might log the basic aspects of HTTP network connections, such as source and destination IP addresses and ports.

Перейти на страницу:

Поиск

Похожие книги