Package deal
ITN Exam Package Deal
ITN Exam Package Deal
[Show more]ITN Exam Package Deal
[Show more]1. Physical 
2. Data Link 
3. Network 
4. Transport 
5. Session 
6. Presentation 
7. Application - OSI Layers 
Physical Layer - OSI Layer 1 
Data Link Layer - OSI Layer 2 
Network Layer - OSI Layer 3 
Transport Layer - OSI Layer 4 
Session Layer - OSI Layer 5 
Presentation Layer - OSI Layer 6 
conte...
Preview 3 out of 23 pages
Add to cart1. Physical 
2. Data Link 
3. Network 
4. Transport 
5. Session 
6. Presentation 
7. Application - OSI Layers 
Physical Layer - OSI Layer 1 
Data Link Layer - OSI Layer 2 
Network Layer - OSI Layer 3 
Transport Layer - OSI Layer 4 
Session Layer - OSI Layer 5 
Presentation Layer - OSI Layer 6 
conte...
True or False: 
TCP is responsible for addressing packets and sending them on the correct route to the destination , 
while IP is responsible for reliable packet transmission. - False 
True or False: 
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Tran...
Preview 3 out of 26 pages
Add to cartTrue or False: 
TCP is responsible for addressing packets and sending them on the correct route to the destination , 
while IP is responsible for reliable packet transmission. - False 
True or False: 
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Tran...
a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of 
a failure - What is a characteristic of a fault tolerant network? 
audio conference, financial transactions, web page - Three bank employees are using the 
corporate network. The first employee us...
Preview 2 out of 6 pages
Add to carta network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of 
a failure - What is a characteristic of a fault tolerant network? 
audio conference, financial transactions, web page - Three bank employees are using the 
corporate network. The first employee us...
The primary goal of network security = protect what? - Assets, information, data 
3 Goals in providing security - • Confidentiality 
- Protection of data from unauthorized disclosure of customers and proprietary data 
• Integrity 
- Assurance that data have not been altered or destroyed 
• Ava...
Preview 2 out of 10 pages
Add to cartThe primary goal of network security = protect what? - Assets, information, data 
3 Goals in providing security - • Confidentiality 
- Protection of data from unauthorized disclosure of customers and proprietary data 
• Integrity 
- Assurance that data have not been altered or destroyed 
• Ava...
2x sold
A ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users 
outside the organization - Extranet 
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model - 
session, presentation and application 
Which of the...
Preview 4 out of 52 pages
Add to cartA ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users 
outside the organization - Extranet 
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model - 
session, presentation and application 
Which of the...
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and 
reliable data transport between devices? - Transport Layer 
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of 
what standard below? -IEEE 802.1x ...
Preview 2 out of 8 pages
Add to cartWhich layer of the OSI model contains TCP protocol, which is used for establishing connections and 
reliable data transport between devices? - Transport Layer 
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of 
what standard below? -IEEE 802.1x ...
A device that has no directly attached user interfaces and comes with specialized software designed to 
perform a specific task is called a network appliance. - True 
You are testing out a new DHCP server and want to make sure that it does not interfere with your 
current network. What option would ...
Preview 2 out of 8 pages
Add to cartA device that has no directly attached user interfaces and comes with specialized software designed to 
perform a specific task is called a network appliance. - True 
You are testing out a new DHCP server and want to make sure that it does not interfere with your 
current network. What option would ...
URL - Uniform Resource Locator is an addressing format used to find an internet web site or page 
Virtual Directory - a URL-formatted address that provides an internet location for an actual 
physical folder on a web server that is used to publish web documents 
reader - same as read 
reader - can r...
Preview 1 out of 3 pages
Add to cartURL - Uniform Resource Locator is an addressing format used to find an internet web site or page 
Virtual Directory - a URL-formatted address that provides an internet location for an actual 
physical folder on a web server that is used to publish web documents 
reader - same as read 
reader - can r...
The three common core goals of security are - Confidentiality, Integrity, Availability 
When a threat succeeds in causing harm to a business, this is called a ________. - breach 
compromise incident 
Another name for safeguard is - countermeasure 
Employees are very dangerous because they - Both oft...
Preview 1 out of 4 pages
Add to cartThe three common core goals of security are - Confidentiality, Integrity, Availability 
When a threat succeeds in causing harm to a business, this is called a ________. - breach 
compromise incident 
Another name for safeguard is - countermeasure 
Employees are very dangerous because they - Both oft...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy these notes for £14.17. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
87035 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy revision notes and other study material for 14 years now