PCCET Test Questions with Answers
SSL stripping attack - Answer-A specific type of man-in-the-middle attack against SSL. Compromised AP strips SSL and intercepts traffic
Zero Trust - Answer-Different from perimeter based network security, zero trust assumes no default trust for any service, app...
SSL stripping attack - Answer-A specific type of man-in-the-middle attack against SSL.
Compromised AP strips SSL and intercepts traffic
Zero Trust - Answer-Different from perimeter based network security, zero trust
assumes no default trust for any service, application, packet user or device
Zero Trust Platform Criteria - Answer-Secure Access, Inspect All Traffic, Least
Privileged Access, Cyberthreat Protection (AV,IPS etc), Cover all Security Domains
Link State Routing - Answer-Dynamic routing method in which routers tell neighboring
routers of their existence through packets called Link State Advertisements (LSAs). By
interpreting the information in these packets, routers can create maps of the entire
network. Maintain complete map. Periodic updates to adjacent
Distance Vector Routing - Answer-Each router passes a copy of its routing table to its
adjacent neighbors. The neighbor adds the route to its own table, incrementing the
metric to reflect the extra distance to the end network. The distance is given as a hop
count; the vector component specifies the address of the next hop. Hop count and
vector. Convergence slows network
Routing Information Protocol (RIP) - Answer-A dynamic protocol that uses distance-
vector routing algorithms to decipher which route to send data packets. 15 hop limit
Open Shortest Path First (OSPF) - Answer-An interior gateway routing protocol
developed for IP networks based on the shortest path first or link-state algorithm. 32 bit
identifier
Path-Vector Routing Protocol - Answer-A protocol that uses dynamically updated paths
or routing tables to transmit packets from one autonomous network to another. Not
scalability issue of distance vector (BGP)
TCP/IP Model Layers - Answer-application, transport, internet, network access
OSI Model Layers - Answer-Application, Presentation, Session, Transport, Network,
Data Link, Physical
Data Link Layer - Answer-The second layer in the OSI model. The Data Link layer
bridges the networking media with the Network layer. Its primary function is to divide the
data it receives from the Network layer into frames that can then be transmitted by the
Physical layer. Sub layers are LLC and MAC
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.99. You're not tied to anything after your purchase.