Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Network Security fundamentals( Computer Science major) multiple choice question.

ID: 3591829 • Letter: N

Question



   
Network Security fundamentals( Computer Science major)
multiple choice question. posting more soon.

CST 3610 Network Security Fundamentals Midterm Exam October 22 Computer Systems Technology Depa A. port B. IP C, physical D. session E. data link 7. Which port is commonly used for unencrypted HTTP traffic? A. 25 B. 80 C. 443 D. 23 E. 21 8. Select the best choice that describes the length(bits) size of a IPv4 address A. 128 bits B. 256 bits C. 32 bits D. 48 bits E. None of the above 9. Which option is not part of one of the layers in the OSI model? A. TCP Layer B. Presentation layer C. Session layer D. Data link layer E. Physical layer 10. Select the function that describes the procedure where data is bundled with essential p information as it passes through layers of the OSI reference model? A. Packaging 8. Encryption D. Encapsulation E. Intrusion 11. Choose the best definition of DoS attack A. Deny-of-service attack, a hacker uses different routers on the internet to attac B. Denial ofservice attack, is a type of attack on a network that is intended to n C Denial-out-service attack, a method used by hackers to attack a specific web on the network unusable by flooding it with useless traffic bots

Explanation / Answer

7. Which port is commonly used for unencrypted HTTP traffic?

Answer - B

Port 80 is commonly used for almost all unencrypted HTTP traffic.

8. Select the best choice that describes the length(bits) size of a Ipv4 Address?

Answer - C

An IP address in IPv4 is 32-bits in size.

9 . Which option is not part of one of the layers in the OSI model?

Answer - A

There are seven layers in OSI model which are mentioned below.

1) Physical layer

2) Data Link layer

3) Network layer

4) Transport layer

5) Session layer

6) Presentation layer

7) Application layer

10 Select the function that describes the procedure where data is bundled with essential part

of information as it passes through layers of the OSI reference model?

Answer - D

Encapsulation in network refers to sending data where the data is augmented with successive layers of control information before transmission across a network.

11 Choose the best definition of DOS attack

Answer - B

Denial-of-service (DoS) attacks typically flood servers, systems or networks with traffic in order to overwhelm the victim resources and make it difficult or impossible for legitimate users to use them.

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote