Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

GSEC Exam Study Question and answer latest update

Beoordeling
-
Verkocht
-
Pagina's
103
Cijfer
A+
Geüpload op
22-05-2024
Geschreven in
2023/2024

GSEC Exam Study Question and answer latest update What are the layers of the OSI Model from top to bottom? Application, Presentation, Session, Transport, Network, Data Link and Physical What are the layers of the TCP/IP Model from top to bottom? Application, Transport, Internet and Link Layer What is the address space used for loopback addressing? 127.0.0.0 - 127.255.255.255 What is the address space used when a DHCP server is not available? 169.254.0.1 - 169.254.255.255 What are the private IP ranges? 10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255 What protocols are used in the Data Link Layer? Ethernet, Point to Point Protocol (PPP) and ADCCP (Advanced Data Communication Control Protocol) What protocols is utilized in the Network Layer? Internet Protocol (IP) What protocols are utilized in the Transport Layer? UDP and TCP What protocols are utilized on the Session Layer? NetBIOS What types of formats are used at the presentation layer? XML and JPEG What layer of the OSI model does encrypting and decrypting take place? Presentation Layer What protocols are utilized at the Application Layer? SMTP, IMAP, POP, NTP and HTTP What protocols are utilized inside the Link Layer? Ethernet What layers does the Link layer correspond to in the OSI Model? Physical and Data Link

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

GSEC Exam Study Question and answer latest
update
What are the layers of the OSI Model from top to bottom?
Application, Presentation, Session, Transport, Network, Data Link and Physical


What are the layers of the TCP/IP Model from top to bottom?
Application, Transport, Internet and Link Layer


What is the address space used for loopback addressing?
127.0.0.0 - 127.255.255.255


What is the address space used when a DHCP server is not available?
169.254.0.1 - 169.254.255.255


What are the private IP ranges?
10.0.0.0 - 10.255.255.255, 172.16.0.0 - 172.31.255.255, 192.168.0.0 - 192.168.255.255


What protocols are used in the Data Link Layer?
Ethernet, Point to Point Protocol (PPP) and ADCCP (Advanced Data Communication Control Protocol)


What protocols is utilized in the Network Layer?
Internet Protocol (IP)


What protocols are utilized in the Transport Layer?
UDP and TCP


What protocols are utilized on the Session Layer?
NetBIOS


What types of formats are used at the presentation layer?
XML and JPEG


What layer of the OSI model does encrypting and decrypting take place?
Presentation Layer


What protocols are utilized at the Application Layer?
SMTP, IMAP, POP, NTP and HTTP


What protocols are utilized inside the Link Layer?
Ethernet


What layers does the Link layer correspond to in the OSI Model?
Physical and Data Link

,What protocols are utilized inside the Internet layer?
Internet Protocol (IP)


What protocols are utilized inside the Transport layer of the TCP/IP Model??
TCP and UDP


What protocols are utilized within the Application Layer of the TCP/IP model?
Telnet, Simple Network Management Protocol (SNMP), HTML, LDAP, FTP, SSH


What layers of the OSI Model comprise the TCP/IP layers Application Layer?
Session, Presentation and Application


What protocol is a support protocol within the TCP/IP Suite?
Internet Control Message Protocol (ICMP)


What range is the Class A IP Range?
0.0.0.0-127.255.255.255


What range is the Class B IP Range?
128.0.0.0-191.255.255.255


What range is the Class C IP Range?
192.0.0.0-223.255.255.255


What range is the Class D IP Range?
224.0.0.0-239.255.255.255


What range is the Class E IP Range?
240.0.0.0 - 254.255.255.255


Name some physical network topologies.
Bus, Star, Rings, Star-Bus Hybrid, Mesh


What network model uses a lot of cable because you need to use home runs back to the switch or
hub?
Star


In general peer-to-peer networks are often?
Mesh Networks


TOR is a peer-to-peer network that provides anonymity for its users by doing what?
Masking the original source IP address from the destination

,What makes a Full Mesh topology different than a Mesh topology?
A full mesh topology does not have have nodes that are minimally connected to the rest of the
network. In a full mesh topology every node is connected to every other node


A Token Ring network topology makes use of what device to make the network behave like a ring in
spite of being labeled like a star?
Multistation Access Unit (MAU)


What device allows messages to move around on layer 2 of the OSI model?
Switch


What messages are limited to the local area network only and would never be used to look up
information outside of the local network?
ARP


What "transfer mode" is utilized primarily in large-scale networks to facilitate getting messages to
destination quickly?
Asynchronous Transfer Mode (ATM)


What are the two types of virtual circuits?
Permanent Virtual Circuit (PVC) and Switched Virtual Circuit (SVC)


What makes PVC's different than SVC's?
Permanent Virtual Circuits (PVC's) are permanent and need to be configure manually, while Switched
Virtual Circuits (SVC's) are dynamic in nature and a device in the network would have to request one
to be configured


How do switches make packet sniffing harder?
You cannot plug into a switch port and see all of the traffic passing through it like you can on a hub


What does the CIA triad stand for?
Confidentiality, Integrity and Availability


This router is often used to do a broad level of filtering of traffic that just shouldn't be hitting your
network, like that sourced from private addresses.
Border Router


What does a router base its routing decisions off of?
Destination IP Address aka the Destination Address in the network or the layer 3 header


A first match firewall will perform the action specified based on what?
The rule that is matched first

, A best match firewall will perform the action specified based on what?
It will find the best or most specific match in the rules to perform its action


What two modes does the File Transfer Protocol utilize?
Active and Passive


A firewall that does deep packet inspection is consider to be?
Protocol Aware


What are examples of Application Layer Gateways?
Proxy Server or Web Proxy


Firewalls often perform what function?
Network Address Translation (NAT)


What are some protocols Network Address Translation (NAT) can cause problems for?
VoIP protocols like SIP and FTP


What is a true positive?
An alert that happens that is real and accurate


What is a True negative?
A case where an alert didn't get triggered because nothing happened


What is a False Positive?
A case where an alert happens that isn't real or accurate


What is a False Negative?
A case where an alert didn't happen but an intrusion did happen


IDS's cannot detect any malicious behavior on encrypted traffic without sitting in the middle of what?
Encryption Session


What can cause problems for intrusion detection systems (IDS)?
Compression and Encryption


You are implementing a star topology on your local network. What cabling are you most likely to use?
Fiber Optic


When you are deploying an intrusion prevention system on your network, what is the most important
criterion?
Low Latency

Geschreven voor

Vak

Documentinformatie

Geüpload op
22 mei 2024
Aantal pagina's
103
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.59
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
LectDeniz Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
2 jaar
Aantal volgers
13
Documenten
4902
Laatst verkocht
6 maanden geleden
Lect Deniz Academic Resources Hub

Lect Aziim is a highly experienced academic tutor and dedicated content creator with a strong track record of developing comprehensive, high-quality study materials for a wide range of university courses across the globe. With years of experience in higher education support, he excels at transforming complex academic concepts into clear, structured, and easy-to-follow resources that enhance student understanding and confidence. He provides an extensive collection of well-researched and carefully organized documents across key disciplines, including nursing, medicine, and various science fields. His materials cover essential topics such as anatomy, physiology, pharmacology, clinical practice, and core scientific principles, making them highly valuable for both coursework and intensive exam preparation. Each document is thoughtfully designed to align with university standards and curricula, ensuring accuracy, relevance, and practical application. Lect Aziim’s work stands out for its clarity, depth, and attention to detail, offering students concise summaries, detailed explanations, and exam-focused content that supports effective revision. His commitment to academic excellence and student success is reflected in the consistency and reliability of his materials, making him a trusted resource for learners seeking to improve performance and achieve their academic goals.

Lees meer Lees minder
5.0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen