Answered step by step
Verified Expert Solution
Question
1 Approved Answer
29. In which layer of the OSI model, the payload is broken into smaller segments/datagram in order to be sent over the network? a. Transport
29. In which layer of the OSI model, the payload is broken into smaller segments/datagram in order to be sent over the network? a. Transport b.Datalinkc.Session d. Network e. Physical 30. Which is NOT a layer name in the OSI model? a. Application b. Network c. Transform: d. Data Link e. Physical 31. Which of the following IPv4 addresses is a public IP address? a. 10.0.2.14 c. 192.168.72.73 b. 172.16.156.254 d. 64.233.177.189 32. You realize that the Calfornia State University. Northridge (CSUN)'s DHCP server has given you the following IP address: 130.166.92.100. The assumption is that CSUN network administrators know their job and assign private IP addresses according to the existing standards. What IP class is CSUN assigned based on this information? a. Class A b. Class B C Class C d. Class D e. Insufficient information to determine the IP class. 33. What is the binary representation of 127 ? a. 1110111 b. 1101011 c. 1010101 d. 1111111 e. 10000000 34. What is the result of the AND operator on the following two binary numbers: 11111100 and 10011001? a. 10011001 b. 11110000 c. 01100110 d. 10011000 e. 11111101 35. Which portion of the destination address on the receiving segment is used at the Transport layer to identify the recipient application of that segment? a. IP address c. MAC address e. Network address b. Port d. Protocol 36. Which encryption benchmark ensures data is not modified after it's transmitted and before it's received? a. Confidentiality c. Availability: e. Transparency b. Integrity d. Symmetry 37. Which is NOT true about information security? a. 100% secure systems are only a myth. b. Every system is only as strong as its strongest link. c. Firms should find a balancing point in cost of conformance and cost of non-conformance, instead of trying to achieve more and more security. d. Security measures can be implemented in multiple layers to keep the system(s) secure in case of fallure of some of the implemented measures. e. Securing systems is a never-ending process, not a project that has a finish date
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started