MIS 460 EXAM 1 |Exam Elaborations
1. What are the 7 layers of the OSI Model, and what is the function of each?: - Layer 1: Physical - Deals with
hardware connections, signal transmission, and binary data (bits). Devices: Hubs, cables.
Layer 2: Data Link - Handles MAC addresses and switches. Responsible for physical addressing and error detection.
Devices: Switches.
Layer 3: Network - Manages logical addressing (IP) and routing of data between networks. Devices: Routers.
Layer 4: Transport - Ensures reliable data transfer (TCP) or faster, less reliable transfer (UDP). Responsible for error
correction, flow control, and segmentation. Layer 5: Session - Manages sessions between applications, keeping them open
and secure.
Layer 6: Presentation - Transforms data formats for proper application (encryption, compression). Converts data to reada
formats.
Layer 7: Application - Interfaces with end-user applications like browsers, email clients, etc.
2. What are the data types at each OSI Layer?: Physical - Bits Data Link - Frames
Network - Packets
Transport - Segments (TCP), Datagrams (UDP) Session - Data
Presentation - Data Application -
Data
3. What are key attributes of an IP address?: Subnet Mask - Defines the network and host portion of an IP address.
Default Gateway - Router that connects a device to other networks.
Private vs. Public IPs - Private IPs (e.g., 192.168.x.x) are used within internal networks; Public IPs are globally routable o
the internet.
4. What do the commands ipconfig, tracert, nslookup, and ping do?: ipconfig - Displays network interface IP
configurations.
tracert - Traces the path packets take to reach a destination. nslookup - Queries DNS servers
for domain name resolution. ping - Tests connectivity between devices using ICMP packets.
5. What are the key differences between TCP and UDP?: TCP (Transmission Control Protocol) - Connection-
oriented, reliable, ensures ordered delivery of data (e.g., HTTP, FTP).
UDP (User Datagram Protocol) - Connectionless, faster but less reliable, no guar- antees for delivery order (e.g., video
streaming, VoIP).
6. What are the advantages and disadvantages of IPv4 and IPv6?: IPv4:Advan- tage: Simpler, widely
used.Disadvantage: Limited address space (4.3 billion).
, MIS 460 EXAM 1 |Exam Elaborations
IPv6:Advantage: Much larger address space (3.4x10^38), improved routing.Disad- vantage: More complex, less widespre
adoption.
7. How do you identify the network and host ID from a subnet mask?: The subnet mask (e.g., 255.255.255.0)
determines the boundary between the network and host portion of an IP address. Convert both the IP and subnet mask
into binary. The bits covered by 1s in the subnet mask represent the network ID; the remaining bits represent the host ID.
8. What is the TCP handshake process?: SYN - Client sends a SYN (synchronize) request to initiate a connection.
SYN-ACK - Server responds with SYN-ACK (acknowledge). ACK - Client sends ACK back
to establish the connection.
9. What are some common port numbers and their services?:
10.What is the function of a DHCP server?: DHCP (Dynamic Host Configuration Protocol) assigns IP addresses
dynamically to devices within a network, along with other settings like subnet mask, gateway, and DNS.
11.What is the purpose of a MAC address?: MAC (Media Access Control) ad- dress is a unique identifier assigned
to a network interface card (NIC) for communi- cations on the physical network (Layer 2).
12.What is a firewall and how does it work?: A firewall monitors and controls incoming and outgoing network
traffic based on security rules. It can block unautho- rized access while allowing legitimate communication.
13.What are some common types of malware?: Virus - Attaches to files and spreads.
Worm - Self-replicates and spreads without user interaction.
Trojan - Disguises as legitimate software but contains malicious code. Ransomware - Encrypts data and
demands payment for decryption.
14.What does CIAAAN stand for in cybersecurity?: Confidentiality - Ensuring that sensitive information is not
disclosed to unauthorized individuals.
Integrity - Guaranteeing that data is accurate and unaltered.
Availability - Ensuring that systems and data are available when needed. Authenticity - Verifying the identity
of users and systems.
Accountability - Ensuring actions can be traced back to responsible entities. Non-repudiation - Preventing
denial of actions, such as sending messages.
15.What is NAT, and why is it useful?: NAT (Network Address Translation) allows multiple devices on a private
network to share a single public IP address for internet access. This helps conserve IP address space and adds a layer of
security by masking internal addresses.
1. What are the 7 layers of the OSI Model, and what is the function of each?: - Layer 1: Physical - Deals with
hardware connections, signal transmission, and binary data (bits). Devices: Hubs, cables.
Layer 2: Data Link - Handles MAC addresses and switches. Responsible for physical addressing and error detection.
Devices: Switches.
Layer 3: Network - Manages logical addressing (IP) and routing of data between networks. Devices: Routers.
Layer 4: Transport - Ensures reliable data transfer (TCP) or faster, less reliable transfer (UDP). Responsible for error
correction, flow control, and segmentation. Layer 5: Session - Manages sessions between applications, keeping them open
and secure.
Layer 6: Presentation - Transforms data formats for proper application (encryption, compression). Converts data to reada
formats.
Layer 7: Application - Interfaces with end-user applications like browsers, email clients, etc.
2. What are the data types at each OSI Layer?: Physical - Bits Data Link - Frames
Network - Packets
Transport - Segments (TCP), Datagrams (UDP) Session - Data
Presentation - Data Application -
Data
3. What are key attributes of an IP address?: Subnet Mask - Defines the network and host portion of an IP address.
Default Gateway - Router that connects a device to other networks.
Private vs. Public IPs - Private IPs (e.g., 192.168.x.x) are used within internal networks; Public IPs are globally routable o
the internet.
4. What do the commands ipconfig, tracert, nslookup, and ping do?: ipconfig - Displays network interface IP
configurations.
tracert - Traces the path packets take to reach a destination. nslookup - Queries DNS servers
for domain name resolution. ping - Tests connectivity between devices using ICMP packets.
5. What are the key differences between TCP and UDP?: TCP (Transmission Control Protocol) - Connection-
oriented, reliable, ensures ordered delivery of data (e.g., HTTP, FTP).
UDP (User Datagram Protocol) - Connectionless, faster but less reliable, no guar- antees for delivery order (e.g., video
streaming, VoIP).
6. What are the advantages and disadvantages of IPv4 and IPv6?: IPv4:Advan- tage: Simpler, widely
used.Disadvantage: Limited address space (4.3 billion).
, MIS 460 EXAM 1 |Exam Elaborations
IPv6:Advantage: Much larger address space (3.4x10^38), improved routing.Disad- vantage: More complex, less widespre
adoption.
7. How do you identify the network and host ID from a subnet mask?: The subnet mask (e.g., 255.255.255.0)
determines the boundary between the network and host portion of an IP address. Convert both the IP and subnet mask
into binary. The bits covered by 1s in the subnet mask represent the network ID; the remaining bits represent the host ID.
8. What is the TCP handshake process?: SYN - Client sends a SYN (synchronize) request to initiate a connection.
SYN-ACK - Server responds with SYN-ACK (acknowledge). ACK - Client sends ACK back
to establish the connection.
9. What are some common port numbers and their services?:
10.What is the function of a DHCP server?: DHCP (Dynamic Host Configuration Protocol) assigns IP addresses
dynamically to devices within a network, along with other settings like subnet mask, gateway, and DNS.
11.What is the purpose of a MAC address?: MAC (Media Access Control) ad- dress is a unique identifier assigned
to a network interface card (NIC) for communi- cations on the physical network (Layer 2).
12.What is a firewall and how does it work?: A firewall monitors and controls incoming and outgoing network
traffic based on security rules. It can block unautho- rized access while allowing legitimate communication.
13.What are some common types of malware?: Virus - Attaches to files and spreads.
Worm - Self-replicates and spreads without user interaction.
Trojan - Disguises as legitimate software but contains malicious code. Ransomware - Encrypts data and
demands payment for decryption.
14.What does CIAAAN stand for in cybersecurity?: Confidentiality - Ensuring that sensitive information is not
disclosed to unauthorized individuals.
Integrity - Guaranteeing that data is accurate and unaltered.
Availability - Ensuring that systems and data are available when needed. Authenticity - Verifying the identity
of users and systems.
Accountability - Ensuring actions can be traced back to responsible entities. Non-repudiation - Preventing
denial of actions, such as sending messages.
15.What is NAT, and why is it useful?: NAT (Network Address Translation) allows multiple devices on a private
network to share a single public IP address for internet access. This helps conserve IP address space and adds a layer of
security by masking internal addresses.