134. A peer-to-peer (P2P) networking is similar to which of the following?
a.
Content delivery networkb.
Value-added networkc.
Ad-hoc networkd.
Wide-area network135. Which of the following is
a.
Identify outdated software versionsb.
Identify outdated patchesc.
Identify outdated system upgradesd.
Identify open ports136. Which of the following system security testing and information gathering tools can produce false positives?
a.
Information scanning toolb.
Vulnerability scanning toolc.
Network scanning toold.
Penetration testing toolThe automated information scanning tool does not produce false positives because it is used to collect system information efficiently to build individual profiles of the target IT system. The network scanning tool, which does not produce false positives, lists all active hosts and services operating in the address space scanned by the port-scanning tool. The penetration testing tool is a specific tool for information systems testing and does not produce false positives.
137. From a network data analysis perspective, what do many Web-based applications use?
a.
Two-tiered client/server modelb.
Three-tiered client/server modelc.
Four-tiered client/server modeld.
Five-tiered client/server modelA two-tiered client/server model is incorrect because the application stores its code, configuration settings, and supporting files on each user’s workstation, and its data on one or more central servers accessed by all users. Programs are stored on a workstation, and data is stored on a central server. Logs are most likely stored on the workstations only. This model includes client workstations and a central server.
A three-tiered client/server model is incorrect because the application separates the user interface from the rest of the application, and also separates the data from the other components. The classic three-tier model places the user interface code on the client workstation, the rest of the application code on an application server, and the data on a database server. This model includes client workstations, application server, and database server. A five-tiered client/server model is incorrect because it is complex to configure, operate, and manage.
138. Which of the following enhances an instant messaging (IM) authentication process?
a.
Active directory serviceb.
Lightweight directory access protocolc.
Two-factor authenticationd.
Role-based access permissions