Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

29. In which layer of the OSI model, the payload is broken into smaller segments/datagram in order to be sent over the network? a. Transport

image text in transcribed

29. In which layer of the OSI model, the payload is broken into smaller segments/datagram in order to be sent over the network? a. Transport b.Datalinkc.Session d. Network e. Physical 30. Which is NOT a layer name in the OSI model? a. Application b. Network c. Transform: d. Data Link e. Physical 31. Which of the following IPv4 addresses is a public IP address? a. 10.0.2.14 c. 192.168.72.73 b. 172.16.156.254 d. 64.233.177.189 32. You realize that the Calfornia State University. Northridge (CSUN)'s DHCP server has given you the following IP address: 130.166.92.100. The assumption is that CSUN network administrators know their job and assign private IP addresses according to the existing standards. What IP class is CSUN assigned based on this information? a. Class A b. Class B C Class C d. Class D e. Insufficient information to determine the IP class. 33. What is the binary representation of 127 ? a. 1110111 b. 1101011 c. 1010101 d. 1111111 e. 10000000 34. What is the result of the AND operator on the following two binary numbers: 11111100 and 10011001? a. 10011001 b. 11110000 c. 01100110 d. 10011000 e. 11111101 35. Which portion of the destination address on the receiving segment is used at the Transport layer to identify the recipient application of that segment? a. IP address c. MAC address e. Network address b. Port d. Protocol 36. Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? a. Confidentiality c. Availability: e. Transparency b. Integrity d. Symmetry 37. Which is NOT true about information security? a. 100% secure systems are only a myth. b. Every system is only as strong as its strongest link. c. Firms should find a balancing point in cost of conformance and cost of non-conformance, instead of trying to achieve more and more security. d. Security measures can be implemented in multiple layers to keep the system(s) secure in case of fallure of some of the implemented measures. e. Securing systems is a never-ending process, not a project that has a finish date

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Big Data And Hadoop Fundamentals Tools And Techniques For Data Driven Success

Authors: Mayank Bhushan

2nd Edition

9355516665, 978-9355516664

More Books

Students also viewed these Databases questions

Question

What is meant by discrimination?

Answered: 1 week ago

Question

What is the role of the Joint Commission in health care?

Answered: 1 week ago