Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ITN 263 MIDTERM CH 1-7 || 100% COMPLETE

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
13-03-2026
Written in
2025/2026

ITN 263 MIDTERM CH 1-7 || 100% COMPLETEITN 263 MIDTERM CH 1-7 || 100% COMPLETEITN 263 MIDTERM CH 1-7 || 100% COMPLETEITN 263 MIDTERM CH 1-7 || 100% COMPLETETunneling is the act of transmitting a protocol across an intermediary network by encapsulating it in another protocol. - ANSWER-True Remote Access Server (RAS) is a network server that accepts outbound connections from remote clients. - ANSWER-False Which term describes an object, computer, program, piece of data, or other logical or physical component you use in a business process to accomplish a business task? - ANSWER-Asset A domain is a form of networking in which each computer is a peer. - ANSWER-False A public IP address is any address that is valid for use on the Internet. - ANSWER-True

Show more Read less
Institution
ITN 263
Course
ITN 263

Content preview

ITN 263 MIDTERM CH 1-7 || 100%
COMPLETE
Tunneling is the act of transmitting a protocol across an intermediary network by
encapsulating it in another protocol. - ANSWER-True

Remote Access Server (RAS) is a network server that accepts outbound
connections from remote clients. - ANSWER-False

Which term describes an object, computer, program, piece of data, or other logical or
physical component you use in a business process to accomplish a business task? -
ANSWER-Asset

A domain is a form of networking in which each computer is a peer. - ANSWER-
False

A public IP address is any address that is valid for use on the Internet. - ANSWER-
True

When conducting an audit, the auditor should be which of the following? - ANSWER-
An external person who is independent of the organization under audit

Authentication confirms the identity of a user. - ANSWER-True

The IT department is the group that has the highest controlling and responsible
authority within an organization. Ultimately the success or failure of network security
rests with this department. - ANSWER-False

Which of the following characteristics relates to a demilitarized zone (DMZ)? -
ANSWER-A type of perimeter network used to host resources designated as
accessible by the public from the Internet

Which term is used to describe a network security device or host software that filters
communications, usually network traffic, based on a set of predefined rules? -
ANSWER-Firewall

Encryption is the process or mechanism that grants or denies use of a resource. -
ANSWER-False

Which of the following refers to a host on a network that supports user interaction
with the network? - ANSWER-Client

A chokepoint is a form of bottleneck and is a single, controlled pathway between two
different levels of network trust where a firewall or other filtering devices block or
allow traffic based on a set of rules. - ANSWER-True

,Which of the following describes authentication? - ANSWER-The process of
confirming the identity of a user

A security policy is important for all of the following reasons except which one? -
ANSWER-With it, you cannot trust the network's security.

Which term describes when a system is usable for its intended purpose? -
ANSWER-Availability

Which term is used to describe the process of encasing one protocol or packet inside
another protocol or packet? - ANSWER-Encapsulation

The term thin client computing refers to a legacy terminal concept used to control
mainframes. - ANSWER-True

Which term is used to describe a network service that maintains a searchable index
or database of network hosts and shared resources? - ANSWER-Directory Service

Which of the following terms refers to the process of securing or locking down a host
against threats and attacks? - ANSWER-Hardening

Caching is the retention of Internet content by a proxy server. - ANSWER-True

Which term is used to describe an attack that occurs when a hacker uses a network
sniffer to watch a communications session to learn its parameters? - ANSWER-
Hijacking

Intrusion Detection System (IDS) is a security mechanism that detects unauthorized
user activities, attacks, and network compromises. - ANSWER-True

Which of the following refers to filtering traffic as it attempts to leave a network,
which can include monitoring for spoofed addresses, malformed packets,
unauthorized ports and protocols, and blocked destinations? - ANSWER-Egress
filtering

Which of the following characteristics relates to access control? - ANSWER-The
process or mechanism of granting or denying use of resources; typically applied to
users or generic network traffic

Which name is given to the security service of preventing access to resources by
unauthorized users while supporting access to authorized users? - ANSWER-
Confidentiality

Which of the following is a malicious software program distributed by a hacker to
take control of a victim's computers? - ANSWER-Agent

Dynamic packet filtering uses a static or fixed set of rules to filter network traffic. -
ANSWER-False

, Which name is given to a probability prediction based on statistics and historical
occurrences on the likelihood of how many times in the next year a threat is going to
cause harm? - ANSWER-Annualized rate of occurrence (ARO)

Which name is given to a form of filtering that focuses on traffic content? - ANSWER-
Content filtering

Dynamic packet filtering is the process of automatically creating temporary filters. In
most cases, the filters allow outbound responses to previous inbound requests. -
ANSWER-False

A node is a network device responsible for directing traffic towards its stated
destination along the best-known current available path. - ANSWER-False

A replay attack occurs when a hacker uses a network sniffer to capture network
traffic and then retransmits that traffic back on to the network at a later time. -
ANSWER-True

Which of the following describes a blacklist? - ANSWER-A type of filtering in which
all activities or entities are permitted except those identified

IPv6 uses a 128-bit address, which is significantly smaller than IPv4. - ANSWER-
False

Which of the following describes caching? - ANSWER-Retention of Internet content
by a proxy server

Authorization protects the confidentiality, integrity, and availability of personally
identifiable or sensitive data. - ANSWER-False

Which of the following is the name given to unauthorized access to a system? -
ANSWER-Backdoor

A blacklist is a type of filtering where the network denies all activities except for those
on the list. - ANSWER-False

Integrity prevents unauthorized changes to data. - ANSWER-True

A WAN domain refers to the authorized and authenticated remote access
procedures for users to remotely access the organization's IT infrastructure,
systems, and data. - ANSWER-False

The term monitoring refers to the act of creating or recording events into a log. -
ANSWER-False

The term zero day exploit describes a new and previously unknown attack for which
there is not a current specific defense. - ANSWER-True

Which of the following refers to a form of attack that attempts to compromise
availability? - ANSWER-Denial of service (DoS)

Written for

Institution
ITN 263
Course
ITN 263

Document information

Uploaded on
March 13, 2026
Number of pages
20
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTutor1 West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
1681
Member since
3 year
Number of followers
1074
Documents
18343
Last sold
2 days ago
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

457 reviews

5
216
4
79
3
91
2
21
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions