Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

ITN 263 MIDTERM PT 1. (CH. 1-3) WITH COMPLETE SOLUTIONS

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
13-03-2026
Written in
2025/2026

ITN 263 MIDTERM PT 1. (CH. 1-3) WITH COMPLETE SOLUTIONSITN 263 MIDTERM PT 1. (CH. 1-3) WITH COMPLETE SOLUTIONSITN 263 MIDTERM PT 1. (CH. 1-3) WITH COMPLETE SOLUTIONS Which term describes when a system is usable for its intended purpose? Availability Encryption Authorization Auditing - ANSWER-Availability Which of the following describes authentication? A stated purpose or target for network security activity Confidence in the expectation that others will act in your best interest or that a resource is authentic The process of confirming the identity of a user

Show more Read less
Institution
ITN 263
Course
ITN 263

Content preview

ITN 263 MIDTERM PT 1. (CH. 1-3)
WITH COMPLETE SOLUTIONS
Which term describes when a system is usable for its intended purpose?

Availability
Encryption
Authorization
Auditing - ANSWER-Availability

Which of the following describes authentication?

A stated purpose or target for network security activity

Confidence in the expectation that others will act in your best interest or that a
resource is authentic

The process of confirming the identity of a user

A small network, workgroup, or client/server, deployed by a small business, a home-
based business, or just a family network in a home - ANSWER-The process of
confirming the identity of a user

A blacklist is a type of filtering where the network denies all activities except for those
on the list.

True or False? - ANSWER-False

The term thin client computing refers to a legacy terminal concept used to control
mainframes.
True or False? - ANSWER-True

Which term is used to describe the process of encasing one protocol or packet inside
another protocol or packet?

Intrusion Detection System (IDS)
Encryption
Chokepoint
Encapsulation - ANSWER-Encapsulation

Authorization protects the confidentiality, integrity, and availability of personally
identifiable or sensitive data.

True or False? - ANSWER-False

Intrusion Detection System (IDS) is a security mechanism that detects unauthorized
user activities, attacks, and network compromises.

,True or False? - ANSWER-True

Encryption is the process or mechanism that grants or denies use of a resource.

True or False? - ANSWER-False

Which term is used to describe a network security device or host software that filters
communications, usually network traffic, based on a set of predefined rules?

Auditor
Sniffer
Hacker
Firewall - ANSWER-Firewall

Which term describes a network device that forwards traffic between networks based
on the MAC address of the Ethernet frame?

Bottleneck
Bridge
Domain
Node - ANSWER-Bridge

Tunneling is the act of transmitting a protocol across an intermediary network by
encapsulating it in another protocol.

True or False? - ANSWER-True

Which of the following describes caching?

Retention of Internet content by a proxy server

A network service that acts as a “middle man” between a client and
server

Filtering traffic as it attempts to enter a network

A mechanism to establish a secure remote access connection across an
intermediary network - ANSWER-Retention of Internet content by a proxy server

When conducting an audit, the auditor should be which of the following?

An external person who is independent of the organization under audit

An internal employee capable of enclosing or encasing one protocol or packet inside
another protocol or packet

An internal employee who can be trusted

, An external person capable of hacking - ANSWER-An external person who is
independent of the organization under audit

Which of the following refers to a form of attack that attempts to compromise
availability?

Zero day exploits
Man-in-the-middle (mitm)
Denial of service (DoS)
Sniffer - ANSWER-Denial of service (DoS)

Caching is the retention of Internet content by a proxy server.

True or False? - ANSWER-True

A WAN domain refers to the authorized and authenticated remote access
procedures for users to remotely access the organization's IT infrastructure,
systems, and data.

True or False? - ANSWER-False

Which of the following is the name given to unauthorized access to a system?

Backdoor
Tunneling
Highjacking
Exploit - ANSWER-Backdoor

Which of the following characteristics relates to a demilitarized zone (DMZ)?

Confidence in the expectation that others will act in your best interest or that a
resource is authentic

A type of perimeter network used to host resources designated as accessible by the
public from the Internet

A form of networking where each computer is a peer

A host on a network - ANSWER-A type of perimeter network used to host resources
designated as accessible by the public from the Internet

Integrity prevents unauthorized changes to data.
True or False? - ANSWER-True

Which of the following terms refers to the process of securing or locking down a host
against threats and attacks?

Authorization
Redundancy
Hardening

Written for

Institution
ITN 263
Course
ITN 263

Document information

Uploaded on
March 13, 2026
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
NursingTutor1 West Virginia University
Follow You need to be logged in order to follow users or courses
Sold
1681
Member since
3 year
Number of followers
1074
Documents
18343
Last sold
2 days ago
Nursing Tutor

Paper Due? Worry not. Hello. Welcome to NursingTutor. Here you\'ll find verified study materials for your assignments, exams and general school work. All papers here are graded A to help you get the best grade. Also, I am a friendly person so, do not hesitate to send a message in case you have a query. I wish you Luck.

3.9

457 reviews

5
216
4
79
3
91
2
21
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions