Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 260 Final Exam Questions and Verified Answers

Beoordeling
-
Verkocht
-
Pagina's
31
Cijfer
A+
Geüpload op
27-07-2025
Geschreven in
2024/2025

ITN 260 Final Exam Questions and Verified Answers

Instelling
ITN 260
Vak
ITN 260

Voorbeeld van de inhoud

Page | 1




ITN 260 Final Exam Questions and Verified
Answers

Question: True or False:
TCP is responsible for addressing packets and sending them on the correct route to the
destination , while IP is responsible for reliable packet transmission.

Ans: False


Question: True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet,
Control, Transport, and Application

Ans: False


Question: True or False:
IEEE 802.1x is commonly used on wireless networks

Ans: True


Question: True or False:
IP telephony and Voice over IP (VoIP) are identical

Ans: False


Question: True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security
concerns

Ans: True


Question: What protocol suite below is the most commonly used protocol for local area
network (LAN) communication

Ans: TCP/IP


Question: At what level of the OSI model does the IP protocol function

Ans: Network Layer

, Page | 2


Question: Which layer of the OSI model contains TCP protocol, which is used for
establishing connections and reliable data transport between devices

Ans: Transport Layer


Question: The capability for devices to exchange low-level control messages is provided by
what protocol below?

Ans: ICMP


Question: When using SNMPv1 or SNMPv2,what piece of information is needed to view
information form an agent?

Ans: community string


Question: Select below the TCP/IP protocol that resolves a symbolic name to its
corresponding IP address using a database consisting of an organized hierarchy tree

Ans: DNS


Question: DNS poisoning can be prevented using the latest edition of what software below?

Ans: BIND


Question: An administrator needs to examine FTP commands being passed to a server,
what pro should the administrator be monitoring?1

Ans: 21


Question: What device operates at the Network Layer (layer 3) of the OSI model and
forwards packets across computer networks

Ans: router


Question: The deployment of this technology below can be used as a defense against DoS
and DDoS SYN flood attacks:

Ans: flood guard


Question: Broadcast storms can be prevented by using loop prevention technology. which
item be used to help prevent loops

Ans: 802.1d

, Page | 3


Question: How can a network pf physical devices be grouped into logical units, regardless
of what network switches they may be connected to?

Ans: VLAN


Question: Port-based authentication,in which users are authenticated on a per-switch pro
basis, is a function of what standard below?

Ans: IEEE 802.1x


Question: Which of th three Cloud computing service models allows a customer to access
software provided by a vendor using a web browser, without any installation,
configuration, upgrading, or management from the user?

Ans: Cloud Software as a Service


Question: When setting up a server virtualization environment, what component below
manages the ritual machine operation systems and supports one or more guest systems

Ans: hypervisor


Question: In what type of cloud computing does the customer have the highest level of
control?

Ans: Cloud Infrastructure as a Service


Question: What MAC limiting configuration setting allows for MAC addresses to be
automatically learned and stored along with any addresses that were learned prior to using
the configuration setting

Ans: Dynamic


Question: Which of the following is not a benefit that can be provided by using IP
telephony

Ans: Decreased network utilization


Question: What is the term used for a device that requests permission form an
authenticator to join a network

Ans: supplicant


Question: What transport protocol is used by windows operating systems to allow
applications of separate computer to communicate over LAN

, Page | 4


Ans: NetBIOS


Question: Bluejacking

Ans: An attack that sends unsolicited messages to Bluetooth-enabled devices.


Question: Bluesnarfing

Ans: An attack that accesses unauthorized information from a wireless device

through a Bluetooth connection.


Question: Bluetooth

Ans: A wireless technology that uses short-range radio frequency (RF) transmissions

and provides rapid ad hoc device pairings.


Question: Captive portal AP

Ans: An infrastructure that is used on public access WLANs to provide a higher degree of
security.


Question: Challenge-Handshake Authentication Protocol (CHAP)

Ans: A weak authentication protocol that has been replaced by the Extensible
Authentication Protocol (EAP).


Question: Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol (CCMP)

Ans: The encryption protocol used for WPA2 that specifies the use of a general-purpose
cipher mode algorithm providing data privacy with AES.


Question: Evil twin

Ans: An AP set up by an attacker to mimic an authorized AP and capture transmissions, so
a user's device will unknowingly connect to this evil twin instead of the

authorized AP.


Question: Extensible Authentication Protocol (EAP)

Geschreven voor

Instelling
ITN 260
Vak
ITN 260

Documentinformatie

Geüpload op
27 juli 2025
Aantal pagina's
31
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$13.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
StudyRM

Maak kennis met de verkoper

Seller avatar
StudyRM University Of California - Los Angeles (UCLA)
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5
Lid sinds
10 maanden
Aantal volgers
0
Documenten
4113
Laatst verkocht
3 maanden geleden

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen