Sie sind auf Seite 1von 2

 Which organization developed the OSI Model?

ISO
 Which layer does not provide sophisticated functions, and only provides a physical path for
signals to travel? 1
 What is the top layer of the OSI model? Application
 Which layer supports non-repudiation, digital signatures, and certificates? Layer 7
 Which layer supports connection-oriented communication? Layer 4
 Which layer of the OSI model does not support any protocols? Presentation
 Which layer supports web proxies? Application
 What is the process called when headers are added to data at each layer of the OSI?
Encapsulation
 How many layers does the OSI Reference Model contain? 7
 Which layer of the OSI model is compromised by ARP poisoning? Data link
 model is a peer-to-peer model. What does this mean? Headers added at a layer on the
receiving computer are needed by the same layer on the sending computer
 When people talk about the upper layers of the OSI model, which layers are they likely to be
referring to? Transport through Application
 Packet filter firewalls operate at layer 3 of the OSI model. Which information is used to
determine if traffic is allowed? IP address
 Many times people mistakenly refer to twisted pair cabling as “Ethernet Cable”. However,
Ethernet technology and cables function at different layers of the OSI. At which layer does
cable function? 1
 Which layer 4 protocol manages the flow of data across a network? TCP
 Which type of addressing is used by layer 2 switches? MAC
 Which two sublayers are part of the data link layer? MAC and LLC
 A ping flood exploits the ICMP protocol. Which OSI layer is affected by this attack? Network
 What does OSI stand for? Open Systems Interconnection
 Which OSI layer supports the operation of HTTPS? 7
 Point to Point Protocol (PPP) provides framing of packets. Which OSI layer supports the
operation of PPP? 2
 Which OSI layers support the operation of SSL? 4 through 7
 Which OSI layers support the operation of routers? 1 through 3
 What does the OSI model describe? Standards
 Which of the following is typically true of upper layer devices? They are slower
 A SYN flood exploits the TCP handshake. Which OSI layer is targeted in this attack? Transport
 Which OSI layer supports the setup, maintenance, and teardown of a connection from a
client to a server? Session
 Which OSI layer supports the operation of IP, ICMP, IGRP, IGMP, IPsec, IKE, and ISAKMP?
Network
 Which layer is responsible for multimedia formats? Presentation
 Which layer of the OSI model supports port numbers? Transport
 Which layer supports the operation of a router? 3
 At layer 7, data is being prepared to be transmitted. Header information is added at each
layer traveling downward towards layer 1. On the receiving end, headers are stripped away
as the data flows upward towards the user. What is the process called when headers are
stripped away? Decapsulation
 Which OSI layer supports the universal formatting of data? Presentation
 Which layer 3 protocol is responsible for addressing packets? TCP
 Which functionality does a layer 3 switch have compared to a layer 2 switch? Uses IP
addresses
 Which OSI layer supports the detection of Ethernet collisions? Data link
 Which is larger, a layer 3 packet or a layer 2 frame? Frame
 Data is referred to by different terms depending on the header information that has been
added. At layer 3, information such as IP source and destination addresses are included in
the header. What is the name for data and its headers at this layer? Packet
 Firewalls provide a wide range of functionality. Which is not a benefit of layer 3 firewalls vs.
layer 7 firewalls? Deeper packet inspection
 Which layer provides a physical interface to the network? 1
 Which OSI layer provides the protocols that support user operations? Application
 In relation to firewalls and content inspection services, which layer of the OSI model allows
for the greatest granularity in filtering? Application
 Which layer contains the Media Access Control sublayer? 2
 Which OSI layer is examined during a port scan? Transport
 Which layer should be inspected to determine if a system initiated a session? 5
 OSI layer would support a web content-filtering device? Layer 7
 Which OSI layer r MAC addresses? 2
 What header information is added at layer 3? IP address

Das könnte Ihnen auch gefallen