100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 Final Exam Solution $14.99   Add to cart

Exam (elaborations)

ITN 260 Final Exam Solution

 3 views  0 purchase

ITN 260 Final Exam Solution

Preview 3 out of 30  pages

  • September 14, 2024
  • 30
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
All documents for this subject (1)
avatar-seller
Schoolflix
ITN 260 Final Exam Solution

True or False:

TCP is responsible for addressing packets and sending them on the correct route to the destination ,
while IP is responsible for reliable packet transmission. Answer: False



True or False:

TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport,
and Application Answer: False



True or False:

IEEE 802.1x is commonly used on wireless networks Answer: True



True or False:

IP telephony and Voice over IP (VoIP) are identical Answer: False



True or False:

Despite its promise to dramatically impact IT, cloud computing raises significant security concerns
Answer: True



What protocol suite below is the most commonly used protocol for local area network (LAN)
communication Answer: TCP/IP



At what level of the OSI model does the IP protocol function Answer: Network Layer

,Which layer of the OSI model contains TCP protocol, which is used for establishing connections and
reliable data transport between devices Answer: Transport Layer



The capability for devices to exchange low-level control messages is provided by what protocol below?
Answer: ICMP



When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an
agent? Answer: community string



Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a
database consisting of an organized hierarchy tree Answer: DNS



DNS poisoning can be prevented using the latest edition of what software below? Answer: BIND



An administrator needs to examine FTP commands being passed to a server, what pro should the
administrator be monitoring?1 Answer: 21



What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across
computer networks Answer: router



The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood
attacks: Answer: flood guard



Broadcast storms can be prevented by using loop prevention technology. which item be used to help
prevent loops Answer: 802.1d



How can a network pf physical devices be grouped into logical units, regardless of what network
switches they may be connected to? Answer: VLAN

, Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of
what standard below? Answer: IEEE 802.1x



Which of th three Cloud computing service models allows a customer to access software provided by a
vendor using a web browser, without any installation, configuration, upgrading, or management from
the user? Answer: Cloud Software as a Service



When setting up a server virtualization environment, what component below manages the ritual
machine operation systems and supports one or more guest systems Answer: hypervisor



In what type of cloud computing does the customer have the highest level of control? Answer:
Cloud Infrastructure as a Service



What MAC limiting configuration setting allows for MAC addresses to be automatically learned and
stored along with any addresses that were learned prior to using the configuration setting Answer:
Dynamic



Which of the following is not a benefit that can be provided by using IP telephony Answer:
Decreased network utilization



What is the term used for a device that requests permission form an authenticator to join a network
Answer: supplicant



What transport protocol is used by windows operating systems to allow applications of separate
computer to communicate over LAN Answer: NetBIOS



Bluejacking Answer: An attack that sends unsolicited messages to Bluetooth-enabled devices.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Schoolflix. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.99
  • (0)
  Add to cart