Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

MIS 460 EXAM 1 |Exam Elaborations

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
16-12-2024
Written in
2024/2025

MIS 460 EXAM 1 |Exam Elaborations

Institution
Course

Content preview

MIS 460 EXAM 1 |Exam Elaborations



1. What are the 7 layers of the OSI Model, and what is the function of each?: - Layer 1: Physical - Deals with
hardware connections, signal transmission, and binary data (bits). Devices: Hubs, cables.
Layer 2: Data Link - Handles MAC addresses and switches. Responsible for physical addressing and error detection.
Devices: Switches.
Layer 3: Network - Manages logical addressing (IP) and routing of data between networks. Devices: Routers.
Layer 4: Transport - Ensures reliable data transfer (TCP) or faster, less reliable transfer (UDP). Responsible for error
correction, flow control, and segmentation. Layer 5: Session - Manages sessions between applications, keeping them open
and secure.
Layer 6: Presentation - Transforms data formats for proper application (encryption, compression). Converts data to reada
formats.
Layer 7: Application - Interfaces with end-user applications like browsers, email clients, etc.

2. What are the data types at each OSI Layer?: Physical - Bits Data Link - Frames
Network - Packets
Transport - Segments (TCP), Datagrams (UDP) Session - Data
Presentation - Data Application -
Data

3. What are key attributes of an IP address?: Subnet Mask - Defines the network and host portion of an IP address.
Default Gateway - Router that connects a device to other networks.
Private vs. Public IPs - Private IPs (e.g., 192.168.x.x) are used within internal networks; Public IPs are globally routable o
the internet.

4. What do the commands ipconfig, tracert, nslookup, and ping do?: ipconfig - Displays network interface IP
configurations.
tracert - Traces the path packets take to reach a destination. nslookup - Queries DNS servers
for domain name resolution. ping - Tests connectivity between devices using ICMP packets.

5. What are the key differences between TCP and UDP?: TCP (Transmission Control Protocol) - Connection-
oriented, reliable, ensures ordered delivery of data (e.g., HTTP, FTP).
UDP (User Datagram Protocol) - Connectionless, faster but less reliable, no guar- antees for delivery order (e.g., video
streaming, VoIP).

6. What are the advantages and disadvantages of IPv4 and IPv6?: IPv4:Advan- tage: Simpler, widely
used.Disadvantage: Limited address space (4.3 billion).


, MIS 460 EXAM 1 |Exam Elaborations


IPv6:Advantage: Much larger address space (3.4x10^38), improved routing.Disad- vantage: More complex, less widespre
adoption.

7. How do you identify the network and host ID from a subnet mask?: The subnet mask (e.g., 255.255.255.0)
determines the boundary between the network and host portion of an IP address. Convert both the IP and subnet mask
into binary. The bits covered by 1s in the subnet mask represent the network ID; the remaining bits represent the host ID.

8. What is the TCP handshake process?: SYN - Client sends a SYN (synchronize) request to initiate a connection.
SYN-ACK - Server responds with SYN-ACK (acknowledge). ACK - Client sends ACK back
to establish the connection.

9. What are some common port numbers and their services?:
10.What is the function of a DHCP server?: DHCP (Dynamic Host Configuration Protocol) assigns IP addresses
dynamically to devices within a network, along with other settings like subnet mask, gateway, and DNS.

11.What is the purpose of a MAC address?: MAC (Media Access Control) ad- dress is a unique identifier assigned
to a network interface card (NIC) for communi- cations on the physical network (Layer 2).

12.What is a firewall and how does it work?: A firewall monitors and controls incoming and outgoing network
traffic based on security rules. It can block unautho- rized access while allowing legitimate communication.

13.What are some common types of malware?: Virus - Attaches to files and spreads.
Worm - Self-replicates and spreads without user interaction.
Trojan - Disguises as legitimate software but contains malicious code. Ransomware - Encrypts data and
demands payment for decryption.

14.What does CIAAAN stand for in cybersecurity?: Confidentiality - Ensuring that sensitive information is not
disclosed to unauthorized individuals.
Integrity - Guaranteeing that data is accurate and unaltered.
Availability - Ensuring that systems and data are available when needed. Authenticity - Verifying the identity
of users and systems.
Accountability - Ensuring actions can be traced back to responsible entities. Non-repudiation - Preventing
denial of actions, such as sending messages.

15.What is NAT, and why is it useful?: NAT (Network Address Translation) allows multiple devices on a private
network to share a single public IP address for internet access. This helps conserve IP address space and adds a layer of
security by masking internal addresses.

Written for

Course

Document information

Uploaded on
December 16, 2024
Number of pages
14
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
smartchoices Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
36
Member since
5 year
Number of followers
5
Documents
4499
Last sold
3 weeks ago

4.8

9 reviews

5
7
4
2
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions