What Does I.T. Stand For
Name the Layer
UTS
Correct Order
MISC
100

UTS

Ubiquitous Technical Surveillance 

100

Physical Layer

Layer 1

100
The OSI Layers in order from 1-7

Physical, Data Link, Network, Transport, Session, Presentation, Application

100

Where the user interacts with the computer

Application Layer

200

OSI

Open Systems Interconnect

200

Presentation Layer

Layer 6

200

What are the 5 pillars of UTS

Finance, Travel, Physical/Visual, Electronic and Internet

200

Three-Way Handshake

SYN, SYN/ACK, ACK

200

This protocol is considered reliable transmission

Transmission Control Protocol (TCP)

300

The OSI Model is broken into 7 _______

Layers

300

This layer uses MAC addresses

Data Link Layer (Layer 2)

300

Responsible for setting up, managing, and then tearing down sessions

Session Layer

400

CIS

Center for Internet Security

400

Network Layer

Layer 3

400

This layer uses IP addressing

Determines the best routing path for data travel

Network Layer

400

OSI Layers from top to bottom Layers 7 to 1

Application, Presentation, Session, Transport, Network, Data Link, Physical

400

In this form of flow control, data is sent in groups of segments that require only one acknowledgment.

Windowing

500

BIOS

Basic Input Output System

500

Maintains flow control through buffering or windowing

Transport Layer

Layer 4

500

Correct order for encapsulation

Data, Segment, Packet, Frame, Bits

500

Type of DoS attack which aims to make a server unavailable to legitimate traffic by consuming all available server resources

SYN Flood