D315 Questions with 100% Correct
Answers
802.11a/Wireless-A Correct Answer: wireless 5GHz - 54Mbps - 75ft
802.11b/Wireless-B Correct Answer: wireless 2.4GHz - 11Mbps - 100-150ft
802.11g/Wireless-G Correct Answer: 2.4GHz - 54Mbps - 150ft
802.11ac/Wireless-AC Correct Answer: 5GHz - 1.3Gbps
802.11n/Wireless-N Correct Answer: 2.4GHz - 200+Mbps
2.4GHz Correct Answer: Frequency ranges of 802.11G/802.11B
5GHz Correct Answer: Frequency ranges of 802.11AC/802.11A
Application Layer Correct Answer: Layer 7 in the OSI model. Support for
applications. Examples: HTTP, FTP, SMTP
Presentation Layer Correct Answer: Layer 6 in the OSI model. Protocol
conversion, data translation. Examples: ASCII, JPEG
Session Layer Correct Answer: Layer 5 in the OSI model. Establishes, manages,
and terminates sessions. Examples: NFS, SQL
Transport Layer Correct Answer: Layer 4 in the OSI model. Ensures error-free
packets. Examples: TCP, UDP
Network Layer Correct Answer: Layer 3 in the OSI model. Provides routing
decisions. Examples: IP, IPX
, Data Link Layer Correct Answer: Layer 2 in the OSI model. Provides for the flow
of data. Examples: MAC addresses.
Physical Layer Correct Answer: Layer 1 in the OSI model. Signals and media.
Examples: NICs, twisted-pair cable, fiber.
OSI model Correct Answer: Application, Presentation, Session, Transport,
Network, Data Link, Physical. (Please Do not Through Sasuage Pizza Away)
Application Layer (TCP/IP) Correct Answer: Defines the applications used to
process requests and which ports and sockets are used
Transport Layer (TCP/IP) Correct Answer: Defines the type of connection
established between hosts and how acknowledgements are sent
Internet Layer (TCP/IP) Correct Answer: Defines the protocols used for
addressing and routing the data packets
Network interface Layer (TCP/IP) Correct Answer: Defines how the host
connects to the network
The well-known ports Correct Answer: TCP/IP Ports 1-1023
Registered ports Correct Answer: TCP/IP Ports 1024-49,151
Private ports Correct Answer: TCP/IP Ports 49,152-65,535
Social Engineering Correct Answer: A process by which an intruder obtains
enough information from people to gain access to the network
Password Cracking Correct Answer: An attack in which the attacker tries to
guess the user's password