Page | 1
ITN 260 Final Exam Questions and Verified
Answers
Question: True or False:
TCP is responsible for addressing packets and sending them on the correct route to the
destination , while IP is responsible for reliable packet transmission.
Ans: False
Question: True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet,
Control, Transport, and Application
Ans: False
Question: True or False:
IEEE 802.1x is commonly used on wireless networks
Ans: True
Question: True or False:
IP telephony and Voice over IP (VoIP) are identical
Ans: False
Question: True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security
concerns
Ans: True
Question: What protocol suite below is the most commonly used protocol for local area
network (LAN) communication
Ans: TCP/IP
Question: At what level of the OSI model does the IP protocol function
Ans: Network Layer
, Page | 2
Question: Which layer of the OSI model contains TCP protocol, which is used for
establishing connections and reliable data transport between devices
Ans: Transport Layer
Question: The capability for devices to exchange low-level control messages is provided by
what protocol below?
Ans: ICMP
Question: When using SNMPv1 or SNMPv2,what piece of information is needed to view
information form an agent?
Ans: community string
Question: Select below the TCP/IP protocol that resolves a symbolic name to its
corresponding IP address using a database consisting of an organized hierarchy tree
Ans: DNS
Question: DNS poisoning can be prevented using the latest edition of what software below?
Ans: BIND
Question: An administrator needs to examine FTP commands being passed to a server,
what pro should the administrator be monitoring?1
Ans: 21
Question: What device operates at the Network Layer (layer 3) of the OSI model and
forwards packets across computer networks
Ans: router
Question: The deployment of this technology below can be used as a defense against DoS
and DDoS SYN flood attacks:
Ans: flood guard
Question: Broadcast storms can be prevented by using loop prevention technology. which
item be used to help prevent loops
Ans: 802.1d
, Page | 3
Question: How can a network pf physical devices be grouped into logical units, regardless
of what network switches they may be connected to?
Ans: VLAN
Question: Port-based authentication,in which users are authenticated on a per-switch pro
basis, is a function of what standard below?
Ans: IEEE 802.1x
Question: Which of th three Cloud computing service models allows a customer to access
software provided by a vendor using a web browser, without any installation,
configuration, upgrading, or management from the user?
Ans: Cloud Software as a Service
Question: When setting up a server virtualization environment, what component below
manages the ritual machine operation systems and supports one or more guest systems
Ans: hypervisor
Question: In what type of cloud computing does the customer have the highest level of
control?
Ans: Cloud Infrastructure as a Service
Question: What MAC limiting configuration setting allows for MAC addresses to be
automatically learned and stored along with any addresses that were learned prior to using
the configuration setting
Ans: Dynamic
Question: Which of the following is not a benefit that can be provided by using IP
telephony
Ans: Decreased network utilization
Question: What is the term used for a device that requests permission form an
authenticator to join a network
Ans: supplicant
Question: What transport protocol is used by windows operating systems to allow
applications of separate computer to communicate over LAN
, Page | 4
Ans: NetBIOS
Question: Bluejacking
Ans: An attack that sends unsolicited messages to Bluetooth-enabled devices.
Question: Bluesnarfing
Ans: An attack that accesses unauthorized information from a wireless device
through a Bluetooth connection.
Question: Bluetooth
Ans: A wireless technology that uses short-range radio frequency (RF) transmissions
and provides rapid ad hoc device pairings.
Question: Captive portal AP
Ans: An infrastructure that is used on public access WLANs to provide a higher degree of
security.
Question: Challenge-Handshake Authentication Protocol (CHAP)
Ans: A weak authentication protocol that has been replaced by the Extensible
Authentication Protocol (EAP).
Question: Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol (CCMP)
Ans: The encryption protocol used for WPA2 that specifies the use of a general-purpose
cipher mode algorithm providing data privacy with AES.
Question: Evil twin
Ans: An AP set up by an attacker to mimic an authorized AP and capture transmissions, so
a user's device will unknowingly connect to this evil twin instead of the
authorized AP.
Question: Extensible Authentication Protocol (EAP)
ITN 260 Final Exam Questions and Verified
Answers
Question: True or False:
TCP is responsible for addressing packets and sending them on the correct route to the
destination , while IP is responsible for reliable packet transmission.
Ans: False
Question: True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet,
Control, Transport, and Application
Ans: False
Question: True or False:
IEEE 802.1x is commonly used on wireless networks
Ans: True
Question: True or False:
IP telephony and Voice over IP (VoIP) are identical
Ans: False
Question: True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security
concerns
Ans: True
Question: What protocol suite below is the most commonly used protocol for local area
network (LAN) communication
Ans: TCP/IP
Question: At what level of the OSI model does the IP protocol function
Ans: Network Layer
, Page | 2
Question: Which layer of the OSI model contains TCP protocol, which is used for
establishing connections and reliable data transport between devices
Ans: Transport Layer
Question: The capability for devices to exchange low-level control messages is provided by
what protocol below?
Ans: ICMP
Question: When using SNMPv1 or SNMPv2,what piece of information is needed to view
information form an agent?
Ans: community string
Question: Select below the TCP/IP protocol that resolves a symbolic name to its
corresponding IP address using a database consisting of an organized hierarchy tree
Ans: DNS
Question: DNS poisoning can be prevented using the latest edition of what software below?
Ans: BIND
Question: An administrator needs to examine FTP commands being passed to a server,
what pro should the administrator be monitoring?1
Ans: 21
Question: What device operates at the Network Layer (layer 3) of the OSI model and
forwards packets across computer networks
Ans: router
Question: The deployment of this technology below can be used as a defense against DoS
and DDoS SYN flood attacks:
Ans: flood guard
Question: Broadcast storms can be prevented by using loop prevention technology. which
item be used to help prevent loops
Ans: 802.1d
, Page | 3
Question: How can a network pf physical devices be grouped into logical units, regardless
of what network switches they may be connected to?
Ans: VLAN
Question: Port-based authentication,in which users are authenticated on a per-switch pro
basis, is a function of what standard below?
Ans: IEEE 802.1x
Question: Which of th three Cloud computing service models allows a customer to access
software provided by a vendor using a web browser, without any installation,
configuration, upgrading, or management from the user?
Ans: Cloud Software as a Service
Question: When setting up a server virtualization environment, what component below
manages the ritual machine operation systems and supports one or more guest systems
Ans: hypervisor
Question: In what type of cloud computing does the customer have the highest level of
control?
Ans: Cloud Infrastructure as a Service
Question: What MAC limiting configuration setting allows for MAC addresses to be
automatically learned and stored along with any addresses that were learned prior to using
the configuration setting
Ans: Dynamic
Question: Which of the following is not a benefit that can be provided by using IP
telephony
Ans: Decreased network utilization
Question: What is the term used for a device that requests permission form an
authenticator to join a network
Ans: supplicant
Question: What transport protocol is used by windows operating systems to allow
applications of separate computer to communicate over LAN
, Page | 4
Ans: NetBIOS
Question: Bluejacking
Ans: An attack that sends unsolicited messages to Bluetooth-enabled devices.
Question: Bluesnarfing
Ans: An attack that accesses unauthorized information from a wireless device
through a Bluetooth connection.
Question: Bluetooth
Ans: A wireless technology that uses short-range radio frequency (RF) transmissions
and provides rapid ad hoc device pairings.
Question: Captive portal AP
Ans: An infrastructure that is used on public access WLANs to provide a higher degree of
security.
Question: Challenge-Handshake Authentication Protocol (CHAP)
Ans: A weak authentication protocol that has been replaced by the Extensible
Authentication Protocol (EAP).
Question: Counter Mode with Cipher Block Chaining Message Authentication Code
Protocol (CCMP)
Ans: The encryption protocol used for WPA2 that specifies the use of a general-purpose
cipher mode algorithm providing data privacy with AES.
Question: Evil twin
Ans: An AP set up by an attacker to mimic an authorized AP and capture transmissions, so
a user's device will unknowingly connect to this evil twin instead of the
authorized AP.
Question: Extensible Authentication Protocol (EAP)