Outcomes addressed in this activity:
Unit Outcomes:
- Distinguish foundational networking concepts.
- Compare TCP/IP and user datagram protocols.
- Break down cabling and data transmission types.
- Contrast network devices and services as they relate to the OSI model.
Course Outcome:
Apply secure design principles to network architecture.
Purpose
In this assignment, you will examine fundamental concepts in networking that are necessary to pass the CISSP exam. This includes examining the OSI model.
Assignment Instructions
Using Credible Sources, Justify Your Answers to Questions
Answer the following 12 questions by selecting the one best answer for each. Cite your course texts, or other credible source, and provide a 50- to 100-word explanation of why you chose your answer for each question.
- Which OSI function ensures that the identity of the remote host is verified, and that the data received is authentic?
- Routing
- Authentication
- Encryption
- Which layer of the TCP/IP model corresponds to the Transport layer of the OSI model?
- Network access
- Internet
- Host-to-host
- Which OSI process ensures that each OSI layer at the sender adds its own information to the packet and each OSI layer at the receiver strips off its corresponding information?
- Negotiation
- Encapsulation
- Compression
- Which function does the Session layer of the OSI model provide?
- Data synchronization
- Logical network addressing
- Physical network addressing
- What are the key functions of the OSI Network layer?
- Flow control
- Path selection
- Data segmentation
- Logical addressing
- Physical addressing
- Option a
- Option b
- Option c
- Option d
- Option e
- Options b and d
- All of the options
- Which functions can take place at the Data-link layer of the OSI model?
- Routing
- Flow control
- Error notification
- Physical addressing
- Setting voltage levels in transmission media
- Option a
- Option b
- Option c
- Option d
- Option e
- Options a and e
- Options a, b, and d
- All of the options
- You want to use the IANA-designated private IP address range that provides host IP addresses with a maximum of 16 bits. Which IP address is a valid host IP address in this range?
- 10.251.250.100
- 11.0.1.0
- 172.30.250.10
- 192.168.0.1
- What is the base network ID for the address 196.11.200.71 /18?
- 196.0.0.0
- 196.11.0.0
- 196.11.192.0
- 196.11.200.0
- 196.11.200.71
- Which of the following processes of risk management is the process of selecting strategies to deal with identified risk, according to business risk appetite?
- Risk treatment
- Risk assessment
- Acceptance of residual risk
- Which of the following security controls might force an operator into collusion with personnel assigned organizationally within a different function in order to gain access to unauthorized data?
- Enforcing regular password changes
- Job rotation of operations personnel
- Asset value x loss expectancy
- When you were leaving work for the day, you inadvertently left the secure facility with classified documents. What kind of incident is this?
- Breach of confidentiality
- Availability issue
- Classic case of corporate espionage
- Which one of the following represents an ALE calculation?
- Gross loss expectancy x loss frequency
- Single loss expectancy x annualized rate of occurrence
- Asset value x loss expectancy
Assignment Requirements
Answers contain enough information to adequately answer the questions and contain no spelling, grammar, or APA errors.