Page | 1
ITN 261 Questions and Verified Answers
Question: The terms algorithm and cipher describe the formula or process used to perform
encryption.
Ans: True
Question: The Address Resolution Protocol (ARP) includes the ability to authenticate the
systems that use it.
Ans: False
Question: A code is a mechanism that relies on the usage of complete words or phrases,
whereas ciphers utilize single letters to perform encryption
Ans: True
Question: An attack in which a service is overwhelmed by traffic preventing or denying its
legitimate use is called a
Ans: denial of service attack
Question: Which password attack method uses long lists of words that have been
predefined and can be quickly downloaded for use to break a password that is a word or a
name
Ans: Dictionary password attack
Question: Public key infrastructure (PKI) addresses storing, managing, distributing, and
maintaining keys and digital certificates securely
Ans: True
Question: What type of encryption uses the same key to encrypt and to decrypt
information
Ans: Symmetric encryption
Question: Which of the following refers to a software program used to determine the path
a data packet traverses to get to a specific IP address
, Page | 2
Ans: Traceroute
Question: Which step(s) in the information-gathering process does footprinting cover?
Ans: Gathering information and determining the network range
Question: A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as the reverse (reverse lookups) is
called:
Ans: Domain Name Service (DNS).
Question: Repeaters, hubs, bridges, and switches are part of:
Ans: Physical or Network Access Layer equipment
Question: A key characteristic of footprinting is that it gathers information about a victim
without directly interacting and potentially providing advance notice of the attack.
Ans: True
Question: A countermeasure for protecting domain information is to employ commonly
available proxy services to block the access of sensitive domain data
Ans: True
Question: Which of the following regulates the flow of traffic between different networks?
Ans: A firewall
Question: For both symmetric and asymmetric cryptography, data is encrypted by applying
the key to an encryption algorithm.
Ans: True
Question: A drawback to public key infrastructure (PKI) is that the two parties must have
prior knowledge of one another in order to establish a relationship
Ans: False
Question: Which of the following lock types are smart and programmable?
ITN 261 Questions and Verified Answers
Question: The terms algorithm and cipher describe the formula or process used to perform
encryption.
Ans: True
Question: The Address Resolution Protocol (ARP) includes the ability to authenticate the
systems that use it.
Ans: False
Question: A code is a mechanism that relies on the usage of complete words or phrases,
whereas ciphers utilize single letters to perform encryption
Ans: True
Question: An attack in which a service is overwhelmed by traffic preventing or denying its
legitimate use is called a
Ans: denial of service attack
Question: Which password attack method uses long lists of words that have been
predefined and can be quickly downloaded for use to break a password that is a word or a
name
Ans: Dictionary password attack
Question: Public key infrastructure (PKI) addresses storing, managing, distributing, and
maintaining keys and digital certificates securely
Ans: True
Question: What type of encryption uses the same key to encrypt and to decrypt
information
Ans: Symmetric encryption
Question: Which of the following refers to a software program used to determine the path
a data packet traverses to get to a specific IP address
, Page | 2
Ans: Traceroute
Question: Which step(s) in the information-gathering process does footprinting cover?
Ans: Gathering information and determining the network range
Question: A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as the reverse (reverse lookups) is
called:
Ans: Domain Name Service (DNS).
Question: Repeaters, hubs, bridges, and switches are part of:
Ans: Physical or Network Access Layer equipment
Question: A key characteristic of footprinting is that it gathers information about a victim
without directly interacting and potentially providing advance notice of the attack.
Ans: True
Question: A countermeasure for protecting domain information is to employ commonly
available proxy services to block the access of sensitive domain data
Ans: True
Question: Which of the following regulates the flow of traffic between different networks?
Ans: A firewall
Question: For both symmetric and asymmetric cryptography, data is encrypted by applying
the key to an encryption algorithm.
Ans: True
Question: A drawback to public key infrastructure (PKI) is that the two parties must have
prior knowledge of one another in order to establish a relationship
Ans: False
Question: Which of the following lock types are smart and programmable?