Free IC3-3 Exam Braindumps (page: 4)

Page 3 of 36

Which of the following is referred to as a network in which network nodes request and receive services and data from another networked node?

  1. Client-server
  2. PAN
  3. LAN
  4. CAN

Answer(s): A

Explanation:

Client-server networking is also known as client-server computing. It is a distributed application architecture that partitions tasks or work loads between service providers (servers) and service requesters, called clients. Often clients and servers operate over a computer network on separate hardware.
A server machine is a high-performance host that is running one or more server programs which share its resources with clients.
A client does not share any of its resources, but requests a server's content or service function. Clients therefore initiate communication sessions with servers which await (listen to) incoming requests.
Answer option C is incorrect. Local Area Network (LAN)

represents a network that covers a very close geographic area, such as a floor of a building, a building itself, or a campus environment. LAN is a high-speed network that connects computers, printers, and other network devices together. The media types used in LANs include Ethernet, Fast Ethernet (FE), Gigabit Ethernet (GE), Token Ring, and FDDI.
A LAN may include servers, workstations, hubs, bridges, switches, routers, gateways, firewalls, etc.
Answer option D is incorrect.
A campus area network (CAN) is a computer network that interconnects local area networks throughout a limited geographical area, such as a university campus, a corporate campus, or a military base. It could be considered a metropolitan area network that is specific to a campus setting.
A campus area network is, therefore, larger than a local area network but smaller than a wide area network. The term is sometimes used to refer to university campuses, while the term corporate area network is used to refer to corporate campuses instead.Although not considered a wide area network, a CAN extends the reach of each local area network within the campus area of an organization. In a CAN, the buildings of a university or corporate campus are interconnected using the same types of hardware and networking technologies that one would use in a LAN. In addition, all of the components, including switches, routers, and cabling, as well as wireless connection points, are owned and maintained by the organization.
Answer option B is incorrect.
A personal area network (PAN) is a computer network used for communication among computer devices (including telephones and personal digital assistants) close to one's person. The reach of a PAN is typically a few meters.
A PAN can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet.



Mark the ST connector in the image given below.

  1. See Explanation section for answer.

Answer(s): A

Explanation:



The image displays the following connectors:
ST: A straight tip (ST) connector is a fiber-optic connector used with multimode fiber. An ST connector has a 2.5mm shaft and bayonet locking ring, and allows quick connect and disconnect of 125 micron multi-mode fiber.



USB: A Universal Serial Bus (USB) connector is used with the USB cable for connecting various electronic devices to a computer. USB supports a data speed of up to 12 megabits per second. Two types of connectors are used with USB, namely USB-A Type and USB-B Type.




In which of the following DoS attacks does an attacker send an ICMP packet larger than 65,536 bytes to the target system?

  1. Ping of death
  2. Fraggle
  3. Jolt
  4. Teardrop

Answer(s): A

Explanation:

In the ping of death attack, the attacker sends an ICMP packet larger than 65,536 bytes. Since the operating system does not know how to handle a packet larger than 65,536 bytes, it either freezes or crashes at the time of reassembling the packet. Now-a-days, operating systems discard such packets, so the ping of death attack is not applicable at the present time.
Answer option C is incorrect. In the jolt DoS attack, an attacker fragments the ICMP packet in such a manner that the target computer cannot reassemble it. In this situation, the CPU utilization of the target system becomes 100 percent and the target system gets crashed.
Answer option D is incorrect. In a teardrop attack, a series of data packets are sent to the target system with overlapping offset field values. As a result, the target system is unable to reassemble these packets and is forced to crash, hang, or reboot.
Answer option B is incorrect. In a fraggle DoS attack, an attacker sends a large amount of UDP echo request traffic to the IP broadcast addresses. These UDP requests have a spoofed source address of the intended victim. If the routing device delivering traffic to those broadcast addresses delivers the IP broadcast to all the hosts, most of the IP addresses send an ECHO reply message. However, on a multi-access broadcast network, hundreds of computers might reply to each packet when the target network is overwhelmed by all the messages sent simultaneously. Due to this, the network becomes unable to provide services to all the messages and crashes.



Which of the following provides security for network traffic (transmitted packets) at the Network or Internet layer?

  1. IP
  2. UDP
  3. TCP
  4. IPSec

Answer(s): D

Explanation:

Internet Protocol Security (IPSec) is a method of securing data. It secures traffic by using encryption and digital signing. It enhances the security of data as if an IPSec packet is captured. Its contents cannot be read. IPSec also provides sender verification that ensures the certainty of the datagram's origin to the receiver.
Answer option A is incorrect. The Internet Protocol (IP) is a protocol used for communicating data across a packet-switched inter-network using the Internet Protocol Suite, also referred to as TCP/IP.IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering distinguished protocol datagrams (packets) from the source host to the destination host solely based on their addresses. For this purpose, the Internet Protocol defines addressing methods and structures for datagram encapsulation. The first major version of addressing structure, now referred to as Internet Protocol Version 4 (IPv4), is still the dominant protocol of the Internet, although the successor, Internet Protocol Version 6 (IPv6), is being deployed actively worldwide.
Answer option B is incorrect. User Datagram Protocol (UDP) is one of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer applications can send messages, in this case referred to as datagrams, to other hosts on an Internet Protocol (IP) network without requiring prior communications to set up special transmission channels or data paths. UDP is sometimes called the Universal Datagram Protocol.
Answer option C is incorrect. Transmission Control Protocol (TCP) is a reliable, connection-oriented protocol operating at the transport layer of the OSI model. It provides a reliable packet delivery service encapsulated within the Internet Protocol (IP). TCP guarantees the delivery of packets, ensures proper sequencing of data, and provides a checksum feature that validates both the packet header and its data for accuracy. If the network corrupts or loses a TCP packet during transmission, TCP is responsible for retransmitting the faulty packet. It can transmit large amounts of data. Application layer protocols, such as HTTP and FTP, utilize the services of TCP to transfer files between clients and servers.






Post your Comments and Discuss Certiport IC3-3 exam with other Community members:

IC3-3 Discussions & Posts