Fill This Form To Receive Instant Help
Homework answers / question archive / Drew University IS MISC Quiz 2 Question 1)At the Presentation Layer of the OSI Reference Model, data is put into a format that programs operating at the Application Layer can understand
Drew University
IS MISC
Quiz 2
Question 1)At the Presentation Layer of the OSI Reference Model, data is put into a format that programs operating at the Application Layer can understand.
Which two protocols are associated with the Host-to-Host Layer of the TCP/IP model?
Which protocol runs on IPv6 networks and provides services similar to Address Resolution Protocol (ARP)?
is designed to convert fully qualified domain names (FQDNs) into numeric Internet Protocol (IP) addresses or IP addresses into FQDNs.
User Datagram Protocol (UDP) provides reliable communication through the use of handshaking, acknowledgments, error detection, and session teardown.
Beth would like to eavesdrop on network traffic resulting from users browsing the Web. Which port would provide her with the most information about user web activity?
The Transport Layer is responsible for communication between host computers.
Blocking all ports by default and allowing only those ports that are needed is known as .
Which of the following is NOT true of routers?
Carrie is examining a piece of malware and determines that it was gathering information about the user of a system. Which of the following terms can she use to describe this malware?
A frame is the mechanism that performs data management.
In order to realize the full potential of a sniffer, the network card must .
Vic is investigating a suspicious system on his network and would like to determine the Internet
Protocol (IP) address associated with a known Media Access Control (MAC) address. What protocol can provide him with this information?
A Trojan horse is an example of malicious software.
Which of the following is true of IPv6?
Through the use of protocols, dissimilar systems can communicate quickly, easily, and efficiently.
Static routing is used mainly on large networks because it is easy to keep up to date.
The primary piece of equipment located at the Network or Internet Layer of the OSI Reference Model is the router.
Dhruv is conducting network traffic analysis and is examining a suspicious HTTP packet using the Wireshark protocol analyzer. He would like to examine the destination port of the packet. Where in the packet should he look for this information?
Internet Protocol (IP) addresses are nonpersistent addresses.
What is a mechanism used to encrypt communication between two parties?
The OSI Reference Model functions in a predictable and structured fashion designed to ensure compatibility and reliability.
The act of a third party covertly monitoring Internet and telephone conversations is called
.
Which of the following offers the greatest level of security for wireless networks?
What is the most common type of network, which is also referred to as IEEE 802.3?
What is a connectionless protocol that offers speed and low overhead as its primary advantage?
The Application Layer of the OSI Reference Model is responsible for the creation, termination, and management of a given connection.
The Media Access Control (MAC) address is also sometimes known as the physical address of a system.
Flow control is responsible for ensuring that what is being sent does not overwhelm or exceed the capabilities of a given physical connection.
Pretty Good Privacy (PGP) offers strong protection for email.
Sniffers are useful and problematic at the same time because network traffic that might include sensitive data can be viewed through the use of a sniffer.
What is a type of denial of service (DoS) attack?
As the information moves up from the Physical Layer to the Data Link Layer of the OSI Reference Model, the ability to handle physical addresses, framing, and error handling and
The Physical Layer of the OSI Reference Model dictates how the information is to be sent.
A link state routing protocol calculates the best path to a target network by one or more metrics, such as delay, speed, or bandwidth.
Which protocol resolves an Internet Protocol v4 (IPv4) address to an unknown Media Access Control (MAC) address?
Encapsulation is the process of "packaging" information prior to transmitting it from one location to another.
Dhruv is conducting network traffic analysis and is examining a suspicious network packet using the Wireshark protocol analyzer. He would like to examine the source Internet Protocol (IP) address of the packet. Where in the packet should he look for this information?
Repeaters, hubs, bridges, and switches are typically part of which layer of the TCP/IP model?
Examining the Physical Layer of the OSI Reference Model will reveal understanding of the information being transmitted.