Package deal
ITN Exam Package Deal
ITN Exam Package Deal
[Show more]ITN Exam Package Deal
[Show more]1. Physical 
2. Data Link 
3. Network 
4. Transport 
5. Session 
6. Presentation 
7. Application - OSI Layers 
Physical Layer - OSI Layer 1 
Data Link Layer - OSI Layer 2 
Network Layer - OSI Layer 3 
Transport Layer - OSI Layer 4 
Session Layer - OSI Layer 5 
Presentation Layer - OSI Layer 6 
conte...
Preview 3 out of 23 pages
Add to cart1. Physical 
2. Data Link 
3. Network 
4. Transport 
5. Session 
6. Presentation 
7. Application - OSI Layers 
Physical Layer - OSI Layer 1 
Data Link Layer - OSI Layer 2 
Network Layer - OSI Layer 3 
Transport Layer - OSI Layer 4 
Session Layer - OSI Layer 5 
Presentation Layer - OSI Layer 6 
conte...
True or False: 
TCP is responsible for addressing packets and sending them on the correct route to the destination , 
while IP is responsible for reliable packet transmission. - False 
True or False: 
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Tran...
Preview 3 out of 26 pages
Add to cartTrue or False: 
TCP is responsible for addressing packets and sending them on the correct route to the destination , 
while IP is responsible for reliable packet transmission. - False 
True or False: 
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Tran...
a network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of 
a failure - What is a characteristic of a fault tolerant network? 
audio conference, financial transactions, web page - Three bank employees are using the 
corporate network. The first employee us...
Preview 2 out of 6 pages
Add to carta network that recovers quickly when a failure occurs and depends on redundancy to limit the impact of 
a failure - What is a characteristic of a fault tolerant network? 
audio conference, financial transactions, web page - Three bank employees are using the 
corporate network. The first employee us...
The primary goal of network security = protect what? - Assets, information, data 
3 Goals in providing security - • Confidentiality 
- Protection of data from unauthorized disclosure of customers and proprietary data 
• Integrity 
- Assurance that data have not been altered or destroyed 
• Ava...
Preview 2 out of 10 pages
Add to cartThe primary goal of network security = protect what? - Assets, information, data 
3 Goals in providing security - • Confidentiality 
- Protection of data from unauthorized disclosure of customers and proprietary data 
• Integrity 
- Assurance that data have not been altered or destroyed 
• Ava...
2x sold
A ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users 
outside the organization - Extranet 
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model - 
session, presentation and application 
Which of the...
Preview 4 out of 52 pages
Add to cartA ___________ is similar to an intranet in that it uses Internet technologies, but is developed for users 
outside the organization - Extranet 
In the Internet model, the application layer corresponds to the ________, layer(s) s of the OSI model - 
session, presentation and application 
Which of the...
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and 
reliable data transport between devices? - Transport Layer 
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of 
what standard below? -IEEE 802.1x ...
Preview 2 out of 8 pages
Add to cartWhich layer of the OSI model contains TCP protocol, which is used for establishing connections and 
reliable data transport between devices? - Transport Layer 
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of 
what standard below? -IEEE 802.1x ...
A device that has no directly attached user interfaces and comes with specialized software designed to 
perform a specific task is called a network appliance. - True 
You are testing out a new DHCP server and want to make sure that it does not interfere with your 
current network. What option would ...
Preview 2 out of 8 pages
Add to cartA device that has no directly attached user interfaces and comes with specialized software designed to 
perform a specific task is called a network appliance. - True 
You are testing out a new DHCP server and want to make sure that it does not interfere with your 
current network. What option would ...
URL - Uniform Resource Locator is an addressing format used to find an internet web site or page 
Virtual Directory - a URL-formatted address that provides an internet location for an actual 
physical folder on a web server that is used to publish web documents 
reader - same as read 
reader - can r...
Preview 1 out of 3 pages
Add to cartURL - Uniform Resource Locator is an addressing format used to find an internet web site or page 
Virtual Directory - a URL-formatted address that provides an internet location for an actual 
physical folder on a web server that is used to publish web documents 
reader - same as read 
reader - can r...
The three common core goals of security are - Confidentiality, Integrity, Availability 
When a threat succeeds in causing harm to a business, this is called a ________. - breach 
compromise incident 
Another name for safeguard is - countermeasure 
Employees are very dangerous because they - Both oft...
Preview 1 out of 4 pages
Add to cartThe three common core goals of security are - Confidentiality, Integrity, Availability 
When a threat succeeds in causing harm to a business, this is called a ________. - breach 
compromise incident 
Another name for safeguard is - countermeasure 
Employees are very dangerous because they - Both oft...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller PatrickKaylian. Stuvia facilitates payment to the seller.
No, you only buy these notes for $17.49. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
72042 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy study notes for 14 years now