Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Drew University IS MISC Quiz 2 Question 1)At the Presentation Layer of the OSI Reference Model, data is put into a format that programs operating at the Application Layer can understand

Drew University IS MISC Quiz 2 Question 1)At the Presentation Layer of the OSI Reference Model, data is put into a format that programs operating at the Application Layer can understand

Business

Drew University

IS MISC

Quiz 2

Question 1)At the Presentation Layer of the OSI Reference Model, data is put into a format that programs operating at the Application Layer can understand.

 

 

Question 2

Which two protocols are associated with the Host-to-Host Layer of the TCP/IP model?

 

Question 3

Which protocol runs on IPv6 networks and provides services similar to Address Resolution Protocol (ARP)?

 

Question 4

                    is designed to convert fully qualified domain names (FQDNs) into numeric Internet Protocol (IP) addresses or IP addresses into FQDNs.

 

Question 5

User Datagram Protocol (UDP) provides reliable communication through the use of handshaking, acknowledgments, error detection, and session teardown.

 

 

Question 6

Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity?

 

Question 7

The Transport Layer is responsible for communication between host computers.

 

 

Question 8

Blocking all ports by default and allowing only those ports that are needed is known as                                  .

 

Question 9

 

Which of the following is NOT true of routers?

 

Question 10

Carrie is examining a piece of malware and determines that it was gathering information about the user of a system. Which of the following terms can she use to describe this malware?

 

Question 11

A frame is the mechanism that performs data management.

 

Question 12

In order to realize the full potential of a sniffer, the network card must                              .

 

Question 13

Vic is investigating a suspicious system on his network and would like to determine the Internet

 

Protocol (IP) address associated with a known Media Access Control (MAC) address. What protocol can provide him with this information?

 

 

 

Question 14

A Trojan horse is an example of malicious software.

 

 

Question 15

Which of the following is true of IPv6?

 

Question 16

Through the use of protocols, dissimilar systems can communicate quickly, easily, and efficiently.

 

 

 

Question 17

 

Static routing is used mainly on large networks because it is easy to keep up to date.

 

 

Question 18

The primary piece of equipment located at the Network or Internet Layer of the OSI Reference Model is the router.

 

 

Question 19

Dhruv is conducting network traffic analysis and is examining a suspicious HTTP packet using the Wireshark protocol analyzer. He would like to examine the destination port of the packet. Where in the packet should he look for this information?

Question 20

Internet Protocol (IP) addresses are nonpersistent addresses.

 

 

Question 21

What is a mechanism used to encrypt communication between two parties?

 

Question 22

The OSI Reference Model functions in a predictable and structured fashion designed to ensure compatibility and reliability.

 

 

Question 23

The act of a third party covertly monitoring Internet and telephone conversations is called

                     .

 

Question 24

Which of the following offers the greatest level of security for wireless networks?

 

Question 25

What is the most common type of network, which is also referred to as IEEE 802.3?

 

 

Question 26

 

What is a connectionless protocol that offers speed and low overhead as its primary advantage?

 

Question 27

The Application Layer of the OSI Reference Model is responsible for the creation, termination, and management of a given connection.

 

 

 

Question 28

The Media Access Control (MAC) address is also sometimes known as the physical address of a system.

 

 

Question 29

Flow control is responsible for ensuring that what is being sent does not overwhelm or exceed the capabilities of a given physical connection.

 

 

Question 30

Pretty Good Privacy (PGP) offers strong protection for email.

 

 

Question 31

Sniffers are useful and problematic at the same time because network traffic that might include sensitive data can be viewed through the use of a sniffer.

 

 

Question 32

What is a type of denial of service (DoS) attack?

 

Question 33

As the information moves up from the Physical Layer to the Data Link Layer of the OSI Reference Model, the ability to handle physical addresses, framing, and error handling and

 

 

Question 34

The Physical Layer of the OSI Reference Model dictates how the information is to be sent.

 

Question 35

A link state routing protocol calculates the best path to a target network by one or more metrics, such as delay, speed, or bandwidth.

 

Question 36

Which protocol resolves an Internet Protocol v4 (IPv4) address to an unknown Media Access Control (MAC) address?

 

Question 37

Encapsulation is the process of "packaging" information prior to transmitting it from one location to another.

 

Question 38

Dhruv is conducting network traffic analysis and is examining a suspicious network packet using the Wireshark protocol analyzer. He would like to examine the source Internet Protocol (IP) address of the packet. Where in the packet should he look for this information?

 

Question 39

Repeaters, hubs, bridges, and switches are typically part of which layer of the TCP/IP model?

 

Question 40

Examining the Physical Layer of the OSI Reference Model will reveal understanding of the information being transmitted.

 

pur-new-sol

Purchase A New Answer

Custom new solution created by our subject matter experts

GET A QUOTE