ANSWERS 2026
1. The following output must be from the command
________________________.
=======================================================
====================
Interface List
20...2e bb 58 95 d0 fb ......Microsoft Virtual WiFi Miniport Adapter
19...4c bb 58 95 d0 fb ......Dell Wireless 1707 802.11b/g/n (2.4GHZ)
14...4c bb 58 95 d0 fc ......Bluetooth Device (Personal Area
Network)
10...34 e6 d7 77 91 1e ......Intel(R) Ethernet Connection (3) I218-LM
1...........................Software Loopback Interface 1
23...00 00 00 00 00 00 00 e0 Teredo Tunneling Pseudo-Interface
26...00 00 00 00 00 00 00 e0 Microsoft 6to4 Adapter
29...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #3
25...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #5
28...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #6
30...00 00 00 00 00 00 00 e0 Microsoft ISATAP Adapter #7
=======================================================
=================== -
correct answer ✅netstat -r
,GMU MIS 320 FINAL EXAM QUESTIONS AND
ANSWERS 2026
1. As long as a wireless device is on and has its wireless protocols
running, it periodically surveys its surroundings for evidence of an
access point, a task known as ____.
a. reassociation
b. switching
c. active scanning
d. probing -
correct answer ✅Active Scanning
What is the main difference between UDP and TCP protocols?
When does it make sense to use UDP instead of TCP -
correct answer ✅UDP is connectionless while TCP protocols are
connection orientated protocols. UDP is used when the data must
simply be sent without worrying about a few dropped pieces here
and there. Mostly used for VoIP, sharing music or movies. TCP is
used for text where loss of few pieces could drastically change the
message.
,GMU MIS 320 FINAL EXAM QUESTIONS AND
ANSWERS 2026
1. __________________ is an example of an authentication
technique "what a supplicant produces"
ID card
Passphrase
Signature
Password -
correct answer ✅Signature
1. The proxy server is often placed in the ____ zone.
a. hot
b. cold
c. fully trusted
d. demilitarized -
correct answer ✅demilitarized
, GMU MIS 320 FINAL EXAM QUESTIONS AND
ANSWERS 2026
1. __________________ is an example of an authentication
technique "what a supplicant has"
ID card
Biometrics
Signature
Passphrase -
correct answer ✅ID card
1. ____ is a unique character string that identifies an access point
and sometimes it is contained in ______ frame.
a. ESSID, probe
b. ESSID, beacon
c. SSID, beacon