• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.702 ■ Fall 2020 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

Reading questions with key points

August 31, 2020 by Brian Schneider 1 Comment

Basics of computer networking

            Network topology can have a network arranged in many different layouts that include: star, mesh, point to point, daisy chain, tree, hybrid, ring.

What is the difference between well known ports, registered ports, and ephemeral ports?

Intro to basic networking terminology

            The most widely used network reference model, which were developed to allow products from different manufacturers to interoperate on a network, is the TCP/IP model (which was developed by the Department of Defense)

Why would the DOD need to create a network reference model when there was already one widely used?

Layers of OSI

The open system interconnection (OSI) model is a 7 layer architecture that works to transmit data from one device to another device across the globe.

Was the OSI model to complicated to use? Is that why they created the TCP?IP model?

TCP/IP

            The transmission control protocol/internet protocol is a 4 layer architecture model and was created by the DOD and is a concise version of the OSI model.

How does the OSI model compare to the TCP/IP model (architecture wise)?

Filed Under: Uncategorized Tagged With:

Reader Interactions

Comments

  1. Vraj Patel says

    September 17, 2020 at 12:15 pm

    Well-known ports are being used for many services that we regularly use such as HTTPS, HTTP, SFTP, or FTP. It has a range from 0-1023. Registered ports range is from 1024 to 49151. Registered ports are being used by the applications that connects to the internet using TCP or UPD. OSI model is only connection-oriented whereas the TCP/IP is both connection-oriented and connectionless. Connection-oriented connection check for the message is delivered or not and if there are any error then it will report it back. Connectionless protocol does not guarantees a message delivery.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (46)
  • Week 01: Overview (3)
  • Week 02: TCP/IP and Network Architecture (6)
  • Week 03: Reconnaisance (5)
  • Week 04: Network Mapping and Vulnerability Scanning (11)
  • Week 05: Metasploit (10)
  • Week 06: More Metasploit (4)
  • Week 07: Social Engineering (7)
  • Week 08: Malware (6)
  • Week 09: Web Application Hacking (7)
  • Week 10: SecuritySheperd (6)
  • Week 11: Intro to Dark Web and Intro to Cloud (4)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (7)
  • Week 13: WPA2 Enterprise and Beyond WiFi (3)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (4)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in