100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
GSEC PRACTICE EXAM QUESTIONS & ANSWERS. $14.49   Add to cart

Exam (elaborations)

GSEC PRACTICE EXAM QUESTIONS & ANSWERS.

 0 view  0 purchase
  • Course
  • GSEC
  • Institution
  • GSEC

GSEC PRACTICE EXAM QUESTIONS & ANSWERS. What are the layers of the OSI Model from top to bottom? - CORRECT ANSWER Application, Presentation, Session, Transport, Network, Data Link and Physical What are the layers of the TCP/IP Model from top to bottom? - CORRECT ANSWER Application, Transport,...

[Show more]

Preview 4 out of 157  pages

  • November 18, 2024
  • 157
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • gsec
  • GSEC
  • GSEC
avatar-seller
Nursewendo
GSEC PRACTICE EXAM QUESTIONS &
ANSWERS.
What are the layers of the OSI Model from top to bottom? - CORRECT ANSWER Application,
Presentation, Session, Transport, Network, Data Link and Physical



What are the layers of the TCP/IP Model from top to bottom? - CORRECT ANSWER Application,
Transport, Internet and Link Layer



What is the address space used for loopback addressing? - CORRECT ANSWER 127.0.0.0 -
127.255.255.255



What is the address space used when a DHCP server is not available? - CORRECT ANSWER 169.254.0.1 -
169.254.255.255



What are the private IP ranges? - CORRECT ANSWER 10.0.0.0 - 10.255.255.255, 172.16.0.0 -
172.31.255.255, 192.168.0.0 - 192.168.255.255



What protocols are used in the Data Link Layer? - CORRECT ANSWER Ethernet, Point to Point Protocol
(PPP) and ADCCP (Advanced Data Communication Control Protocol)



What protocols is utilized in the Network Layer? - CORRECT ANSWER Internet Protocol (IP)



What protocols are utilized in the Transport Layer? - CORRECT ANSWER UDP and TCP



What protocols are utilized on the Session Layer? - CORRECT ANSWER NetBIOS



What types of formats are used at the presentation layer? - CORRECT ANSWER XML and JPEG



What layer of the OSI model does encrypting and decrypting take place? - CORRECT ANSWER
Presentation Layer

,What protocols are utilized at the Application Layer? - CORRECT ANSWER SMTP, IMAP, POP, NTP and
HTTP



What protocols are utilized inside the Link Layer? - CORRECT ANSWER Ethernet



What layers does the Link layer correspond to in the OSI Model? - CORRECT ANSWER Physical and Data
Link



What protocols are utilized inside the Internet layer? - CORRECT ANSWER Internet Protocol (IP)



What protocols are utilized inside the Transport layer of the TCP/IP Model?? - CORRECT ANSWER TCP
and UDP



What protocols are utilized within the Application Layer of the TCP/IP model? - CORRECT ANSWER
Telnet, Simple Network Management Protocol (SNMP), HTML, LDAP, FTP, SSH



What layers of the OSI Model comprise the TCP/IP layers Application Layer? - CORRECT ANSWER
Session, Presentation and Application



What protocol is a support protocol within the TCP/IP Suite? - CORRECT ANSWER Internet Control
Message Protocol (ICMP)



What range is the Class A IP Range? - CORRECT ANSWER 0.0.0.0-127.255.255.255



What range is the Class B IP Range? - CORRECT ANSWER 128.0.0.0-191.255.255.255



What range is the Class C IP Range? - CORRECT ANSWER 192.0.0.0-223.255.255.255



What range is the Class D IP Range? - CORRECT ANSWER 224.0.0.0-239.255.255.255

,What range is the Class E IP Range? - CORRECT ANSWER 240.0.0.0 - 254.255.255.255



Name some physical network topologies. - CORRECT ANSWER Bus, Star, Rings, Star-Bus Hybrid, Mesh



What network model uses a lot of cable because you need to use home runs back to the switch or hub?
- CORRECT ANSWER Star



In general peer-to-peer networks are often? - CORRECT ANSWER Mesh Networks



TOR is a peer-to-peer network that provides anonymity for its users by doing what? - CORRECT ANSWER
Masking the original source IP address from the destination



What makes a Full Mesh topology different than a Mesh topology? - CORRECT ANSWER A full mesh
topology does not have have nodes that are minimally connected to the rest of the network. In a full
mesh topology every node is connected to every other node



A Token Ring network topology makes use of what device to make the network behave like a ring in
spite of being labeled like a star? - CORRECT ANSWER Multistation Access Unit (MAU)



What device allows messages to move around on layer 2 of the OSI model? - CORRECT ANSWER Switch



What messages are limited to the local area network only and would never be used to look up
information outside of the local network? - CORRECT ANSWER ARP



What "transfer mode" is utilized primarily in large-scale networks to facilitate getting messages to
destination quickly? - CORRECT ANSWER Asynchronous Transfer Mode (ATM)



What are the two types of virtual circuits? - CORRECT ANSWER Permanent Virtual Circuit (PVC) and
Switched Virtual Circuit (SVC)

, What makes PVC's different than SVC's? - CORRECT ANSWER Permanent Virtual Circuits (PVC's) are
permanent and need to be configure manually, while Switched Virtual Circuits (SVC's) are dynamic in
nature and a device in the network would have to request one to be configured



How do switches make packet sniffing harder? - CORRECT ANSWER You cannot plug into a switch port
and see all of the traffic passing through it like you can on a hub



What does the CIA triad stand for? - CORRECT ANSWER Confidentiality, Integrity and Availability



This router is often used to do a broad level of filtering of traffic that just shouldn't be hitting your
network, like that sourced from private addresses. - CORRECT ANSWER Border Router



What does a router base its routing decisions off of? - CORRECT ANSWER Destination IP Address aka the
Destination Address in the network or the layer 3 header



A first match firewall will perform the action specified based on what? - CORRECT ANSWER The rule that
is matched first



A best match firewall will perform the action specified based on what? - CORRECT ANSWER It will find
the best or most specific match in the rules to perform its action



What two modes does the File Transfer Protocol utilize? - CORRECT ANSWER Active and Passive



A firewall that does deep packet inspection is consider to be? - CORRECT ANSWER Protocol Aware



What are examples of Application Layer Gateways? - CORRECT ANSWER Proxy Server or Web Proxy



Firewalls often perform what function? - CORRECT ANSWER Network Address Translation (NAT)



What are some protocols Network Address Translation (NAT) can cause problems for? - CORRECT
ANSWER VoIP protocols like SIP and FTP

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Nursewendo. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart