MidTerm Quiz101
MidTerm Quiz101
A transparent proxy server can readily serve both HTTP and HTTPS.
False (cannot serve HTTPS)
The HTTP protocol typically has multiple, concurrent open TCP connections for
each web page.
True
Each HTTPS enabled web site (DNS name) requires a separate IP address.
True
Quiz 4
Quiz 4
Virtual machines should always use NTP because their time tends to drift.
False (use VMware Tools)
Ideally there should be least one stratum 4 or better time servers with an
organization.
False (two stratum 3)
The SNTP protocol consistently checks time and uses a drift file to ensure accurate
time keeping.
False (NTP, SNTP asks only once)
If you have no specific time server to reference you may use the public pools
available at #.pool.________________.
ntp.org
In a Windows domain, clients receive time information from the Primary Domain
Controller or PDC Emulator.
True
Time servers at stratum 2 or higher numbers peer with one another.
True
Quiz 5
Quiz 5
SSL Acceleration requires the ADC fully proxy the web site.
True
In full proxy load balancing there are two separate data flows.
True
The single point of failure created by an ADC makes their use limited as there is no
way to mitigate this risk.
False (multiple ways to mitigate)
When managing data flows through an application delivery controller the return
traffic from the application server to the client must have a source address of the
___________.
ADC
When load balancing HTTP(S) you must ensure that each ________________ is
persistently reaching the same server.
client
When analyzing graphic file headers, what is the primary type of tool you will be
using?
A hexadecimal editor
True or False: No one viewer can read every format. So it is important to have a
few different types of graphic viewers.
True
True or False: Most forensics tools include image viewers that display common
image formats.
False: There are many forensics tools that do not have a GUI and thus no image
viewer.
To make this true, add the word GUI between Most and forensics
It is important to do these three things to every unknown file on a drive. What are
they?
analyze, identify and inspect.
Ex. Appending text to an image file using the command line. The text will not
display but it will be available if you view the file as a text file.