Lote
ITN Exam Package Deal
ITN Exam Package Deal
[Mostrar más]ITN Exam Package Deal
[Mostrar más]1. Physical 
2. Data Link 
3. Network 
4. Transport 
5. Session 
6. Presentation 
7. Application - OSI Layers 
Physical Layer - OSI Layer 1 
Data Link Layer - OSI Layer 2 
Network Layer - OSI Layer 3 
Transport Layer - OSI Layer 4 
Session Layer - OSI Layer 5 
Presentation Layer - OSI Layer 6 
conte...
Vista previa 3 fuera de 23 páginas
Añadir al carrito1. Physical 
2. Data Link 
3. Network 
4. Transport 
5. Session 
6. Presentation 
7. Application - OSI Layers 
Physical Layer - OSI Layer 1 
Data Link Layer - OSI Layer 2 
Network Layer - OSI Layer 3 
Transport Layer - OSI Layer 4 
Session Layer - OSI Layer 5 
Presentation Layer - OSI Layer 6 
conte...
True or False: 
TCP is responsible for addressing packets and sending them on the correct route to the destination , 
while IP is responsible for reliable packet transmission. - False 
True or False: 
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Tran...
Vista previa 3 fuera de 26 páginas
Añadir al carritoTrue or False: 
TCP is responsible for addressing packets and sending them on the correct route to the destination , 
while IP is responsible for reliable packet transmission. - False 
True or False: 
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Tran...
a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of 
a failure - What is a characteristic of a fault tolerant network? 
audio conference, financial transactions, web page - Three bank employees are using the 
corporate network. The first employee us...
Vista previa 2 fuera de 6 páginas
Añadir al carritoa network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of 
a failure - What is a characteristic of a fault tolerant network? 
audio conference, financial transactions, web page - Three bank employees are using the 
corporate network. The first employee us...
The primary goal of network security = protect what? - Assets, information, data 
3 Goals in providing security - • Confidentiality 
- Protection of data from unauthorized disclosure of customers and proprietary data 
• Integrity 
- Assurance that data have not been altered or destroyed 
• Ava...
Vista previa 2 fuera de 10 páginas
Añadir al carritoThe primary goal of network security = protect what? - Assets, information, data 
3 Goals in providing security - • Confidentiality 
- Protection of data from unauthorized disclosure of customers and proprietary data 
• Integrity 
- Assurance that data have not been altered or destroyed 
• Ava...
2x vendido
A ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users 
outside the organization - Extranet 
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model - 
session, presentation and application 
Which of the...
Vista previa 4 fuera de 52 páginas
Añadir al carritoA ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users 
outside the organization - Extranet 
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model - 
session, presentation and application 
Which of the...
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and 
reliable data transport between devices? - Transport Layer 
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of 
what standard below? -IEEE 802.1x ...
Vista previa 2 fuera de 8 páginas
Añadir al carritoWhich layer of the OSI model contains TCP protocol, which is used for establishing connections and 
reliable data transport between devices? - Transport Layer 
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of 
what standard below? -IEEE 802.1x ...
A device that has no directly attached user interfaces and comes with specialized software designed to 
perform a specific task is called a network appliance. - True 
You are testing out a new DHCP server and want to make sure that it does not interfere with your 
current network. What option would ...
Vista previa 2 fuera de 8 páginas
Añadir al carritoA device that has no directly attached user interfaces and comes with specialized software designed to 
perform a specific task is called a network appliance. - True 
You are testing out a new DHCP server and want to make sure that it does not interfere with your 
current network. What option would ...
URL - Uniform Resource Locator is an addressing format used to find an internet web site or page 
Virtual Directory - a URL-formatted address that provides an internet location for an actual 
physical folder on a web server that is used to publish web documents 
reader - same as read 
reader - can r...
Vista previa 1 fuera de 3 páginas
Añadir al carritoURL - Uniform Resource Locator is an addressing format used to find an internet web site or page 
Virtual Directory - a URL-formatted address that provides an internet location for an actual 
physical folder on a web server that is used to publish web documents 
reader - same as read 
reader - can r...
The three common core goals of security are - Confidentiality, Integrity, Availability 
When a threat succeeds in causing harm to a business, this is called a ________. - breach 
compromise incident 
Another name for safeguard is - countermeasure 
Employees are very dangerous because they - Both oft...
Vista previa 1 fuera de 4 páginas
Añadir al carritoThe three common core goals of security are - Confidentiality, Integrity, Availability 
When a threat succeeds in causing harm to a business, this is called a ________. - breach 
compromise incident 
Another name for safeguard is - countermeasure 
Employees are very dangerous because they - Both oft...
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable. Así llegas a la conclusión rapidamente!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy this summary for $17.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
45,681 summaries were sold in the last 30 days
Founded in 2010, the go-to place to buy summaries for 14 years now