Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 260 FINAL EXAM QUESTIONS AND ANSWERS ALL CORRECT

Beoordeling
-
Verkocht
-
Pagina's
20
Cijfer
A+
Geüpload op
05-03-2026
Geschreven in
2025/2026

ITN 260 FINAL EXAM QUESTIONS AND ANSWERS ALL CORRECT

Instelling
ITN 260
Vak
ITN 260

Voorbeeld van de inhoud

ITN 260 FINAL EXAM QUESTIONS AND
ANSWERS ALL CORRECT

The process of identifying exposure to threats, creating preventive and recovery
procedures, and then testing them to determine if they are sufficient, is known as: -
Answer- Business continuity planning and testing

What RAID type below utilizes parity data across all drives instead of using a separate
drive to hold parity error checking information? - Answer- RAID 5

What is required upon completion of an evidence examination? - Answer- a detailed
report is required that lists the steps that were taken and any evidence that was
uncovered in the forensic investigation.

____________________ is data about data. - Answer- metadata

What kind of data can be lost when a computer is turned off? - Answer- volatile

A service contract between a vendor and a client that specifies what services will be
provided, the responsibilities of each party, and any guarantees of service, is known as:
- Answer- service level agreement

Generally, ____________________ focuses on restoring computing and technology
resources to their former state. - Answer- DRP

What is the name for an image that consists of an evidence-grade backup because its
accuracy meets evidence standards? - Answer- mirror image
What access control model below is considered to be the most restrictive access control
model, and involves assigning access controls to users strictly according to the
custodian?
Mandatory Access Control
Role Based Access Control
Discretionary Access Control
Rule Based Access Control - Answer- Mandatory Access Control

Select below the access control model that uses access based on a user's job function
within an organization:
Role Based Access Control
Rule Based Access Control

,Discretionary Access Control
Mandatory Access Control - Answer- Role Based Access Control

To assist with controlling orphaned and dormant accounts, what can be used to indicate
when an account is no longer active? - Answer- Account expiration

Discuss the differences between DAP and LDAP. - Answer- -unlike X.500 DAP, LDAP
was designed to run over TCP/IP, making it ideal for Internet and intranet applications.
X.500 DAP requires special software to access the network.

-LDAP has simpler functions, making it easier and less expensive to implement.

-LDAP encodes its protocol elements in a less complex way than X.500 that enables it
to streamline requests.

A shield icon warns users if they attempt to access any feature that requires UAC
permission. - Answer- true

Entries within a Directory Information Base are arranged in a tree structure called the: -
Answer- DIT

Which access control model can dynamically assign roles to subjects based on a set of
defined rules? - Answer- Rule Based Access Control

What term is used to describe a documentation of control over evidence, which is used
to ensure that no unauthorized person was given the opportunity to corrupt the
evidence? - Answer- chain of custody
True or False:
TCP is responsible for addressing packets and sending them on the correct route to the
destination , while IP is responsible for reliable packet transmission. - Answer- False

True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet,
Control, Transport, and Application - Answer- False

True or False:
IEEE 802.1x is commonly used on wireless networks - Answer- True

True or False:
IP telephony and Voice over IP (VoIP) are identical - Answer- False

True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security
concerns - Answer- True

, What protocol suite below is the most commonly used protocol for local area network
(LAN) communication - Answer- TCP/IP

At what level of the OSI model does the IP protocol function - Answer- Network Layer

Which layer of the OSI model contains TCP protocol, which is used for establishing
connections and reliable data transport between devices - Answer- Transport Layer

The capability for devices to exchange low-level control messages is provided by what
protocol below? - Answer- ICMP

When using SNMPv1 or SNMPv2,what piece of information is needed to view
information form an agent? - Answer- community string

Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP
address using a database consisting of an organized hierarchy tree - Answer- DNS

DNS poisoning can be prevented using the latest edition of what software below? -
Answer- BIND

An administrator needs to examine FTP commands being passed to a server, what pro
should the administrator be monitoring?1 - Answer- 21

What device operates at the Network Layer (layer 3) of the OSI model and forwards
packets across computer networks - Answer- router

The deployment of this technology below can be used as a defense against DoS and
DDoS SYN flood attacks: - Answer- flood guard

Broadcast storms can be prevented by using loop prevention technology. which item be
used to help prevent loops - Answer- 802.1d

How can a network pf physical devices be grouped into logical units, regardless of what
network switches they may be connected to? - Answer- VLAN

Port-based authentication,in which users are authenticated on a per-switch pro basis, is
a function of what standard below? - Answer- IEEE 802.1x

Which of th three Cloud computing service models allows a customer to access
software provided by a vendor using a web browser, without any installation,
configuration, upgrading, or management from the user? - Answer- Cloud Software as a
Service

When setting up a server virtualization environment, what component below manages
the ritual machine operation systems and supports one or more guest systems -
Answer- hypervisor

Geschreven voor

Instelling
ITN 260
Vak
ITN 260

Documentinformatie

Geüpload op
5 maart 2026
Aantal pagina's
20
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.59
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Perfectscorer Chamberlain College Of Nursng
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
496
Lid sinds
3 jaar
Aantal volgers
355
Documenten
9413
Laatst verkocht
2 weken geleden

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Lees meer Lees minder
3.6

75 beoordelingen

5
27
4
15
3
18
2
5
1
10

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen