Answers (Latest Update 2026)
Karim is promoted and told he is being given permission to access a
secure server. However, as soon he attempts to log in, the host-
based IPS on the server issues an alert and prevents him from
logging in. Why did the IPS deny access?
a.
The signature file on the IDS needs to be updated to indicate Karim
can now access the server.
b.
Because Karim logging into the secure server is not an activity
regularly seen on the network.
c.
The IPS was connected incorrectly; it should have been connected
to a port on the switch.
d.
When analyzing the traffic, the IPS compared it against the
signatures and found a match. -
correct answer ✅Because Karim logging into the secure server is
not an activity regularly seen on the network. - An intrusion
prevention system (IPS) attempts to automatically block the attack
as it occurs. It also looks for trends or new attacks for which there is
no existing signature. To identify attacks, an IPS may analyze user
behavior analytics, which uses the normal processes and actions as
the standard. This technique continuously analyzes the behavior of
,MIS 320 Final Exam Questions and
Answers (Latest Update 2026)
processes and programs on a system to determine if there is a
nefarious action.
An associate is hired by a close friend to learn information
technology (IT) administration skills on the job. The associate finds
a 24-port hub in a cabinet and is considering using it in a small
network setting for a lab environment that will be accessed using
Telnet. If the associate uses the hub, which mitigation principle
would be violated?
a.
Selection of effective controls
b.
Segmentation
c.
Isolation
d.
Device placement -
correct answer ✅Segmentation - Early local area networks (LANs)
used a hub, which is a standard network device for connecting
multiple network devices so that they function as a single network
segment. Using a hub would violate the segmentation mitigation
principle.
,MIS 320 Final Exam Questions and
Answers (Latest Update 2026)
Two switches, S1 and S2, are connected to each other. To realize
segmentation and greater security, each switch has three VLANs
configured (students, faculty, and IT). When a faculty endpoint
connected to S1 communicates with a faculty endpoint connected
to S2, how does S2 know the message belongs to the faculty VLAN?
a.
A logical VPN implemented between the two switches tags the
message when sending it.
b.
S1 uses the vendor-neutral IEEE 802.11 protocol to tag the message
when sending it to S2.
c.
S1 tags the message, indicating it belongs to the faculty VLAN when
sending it to S2.
d.
A router needs to be used between the switches to ensure
successful delivery of VLAN messages. -
correct answer ✅S1 tags the message, indicating it belongs to the
faculty VLAN when sending it to S2. -When virtual LAN (VLAN)
members on one switch need to communicate with members
connected to another switch, a special "tagging" protocol must be
used, either a proprietary protocol or the vendor-neutral IEEE
, MIS 320 Final Exam Questions and
Answers (Latest Update 2026)
802.1Q. These special protocols add a field to the packet that "tags"
it as belonging to the VLAN.
network administrator specifies a statement that reads "Deny
management traffic from untrusted networks to Network B." What
type of firewall is the network administrator most likely
configuring?
a.
A NGFW
b.
A WAF
c.
A rule-based firewall
d.
A content-filtering firewall
e.
A policy-based firewall
f.
A Layer 7 firewall -
correct answer ✅A policy-based firewall -A policy-based firewall is
more flexible than a rule-based firewall. This type of firewall allows