100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 Final Exam Questions And Accurate Answers $9.99   Add to cart

Exam (elaborations)

ITN 260 Final Exam Questions And Accurate Answers

 0 view  0 purchase
  • Course
  • ITN 260
  • Institution
  • ITN 260

ITN 260 Final Exam Questions And Accurate Answers...

Preview 3 out of 28  pages

  • September 25, 2024
  • 28
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 260
  • ITN 260
avatar-seller
Easton
ITN 260 Final Exam Questions And Accurate Answers


True or False:

TCP handles the addressing of the packet and sends it in the appropriate direction to
reach its destination while IP provides the service of reliable packet transmission. -
Answer False



True or False:

TCP/IP has its own Five-layer architecture includes Network Interface, Internet, Control,
Transport, and Application - Answer False



True or False:

IEEE 802.1x is widely implemented in wireless networks - Answer True



True or False:

IP telephony and Voice over IP are one and the same thing Answer: False



True or False

While cloud computing promises to have a far-reaching impact on IT, cloud computing
does raise several significant security questions - Answer: True



What protocol suite below is the most frequently used protocol for local area network
(LAN) communication - Answer: TCP/IP



At what OSI model layer does the IP protocol operate - Answer: Network Layer



Which layer of the OSI model does the TCP protocol reside, which is
connection-oriented and used for a reliable data transportation between devices

,-Answer Transport Layer



Which of the following protocols allows devices to send low-level control messages to
each other? -Answer ICMP



When using the SNMPv1 or SNMPv2,which of the following must be known to when
wanting to view information from an agent? -Answer community string



From the options below select the TCP/IP protocol that translates a symbolic name into
its corresponding IP address by using a database with an ordered hierarchy tree -
Answer DNS



DNS poisoning can be prevented by using the newest version of what software below? -
Answer BIND



An administrator wants to view the FTP commands being sent to a server. What pro
should the admin be listening to?1 - Answer 21



What type of device operates at the Network Layer, layer 3, of the OSI model and
forwards packets across computer networks - Answer router



The use of the following technology below can be deployed as a defense against DoS
and DDoS SYN flood attacks - Answer flood guard



Broadcast storms can be prevented by deploying loop prevention technology. what can
be deployed to help prevent loops - Answer 802.1d



How can a network pf physical devices be grouped into logical units, regardless of what
network switches they may be connected to? - Answer VLAN



Port-based authentication,in which users are authenticated on a per-switch pro basis, is

, a function of what standard below? - Answer IEEE 802.1x



Which of th three Cloud computing service models does the customer access the
vendor's software via a web browser with no install, configuration, upgrading and/or
management required from the user? - Answer Cloud Software as a Service



You have been tasked to setup your Server Virtualization environment, which of the
following component listed below controls the ritual machine operation systems and
supports one or more guest systems - Answer hypervisor



What form of cloud computing does the customer have most control? -Answer Cloud
Infrastructure as a Service



What setting for MAC limiting configuration allows the MAC addresses to be
automatically learned and stored along with any addresses that were previously learned
prior to using the configuration setting -Answer Dynamic



Which one of the following is not a benefit that can be provided by the use of IP
telephony - Answer Decreased network utilization



What does the term "a device that requests permission form an authenticator to join a
network" mean- Answer supplicant



What transport protocol is used by windows operating systems to allow applications of
separate computer to communicate over LAN - Answer NetBIOS



Bluejacking - Ans An attack which sends unsolicited messages to Bluetooth-enabled
devices.



Bluesnarfing - Ans An attack that accesses unauthorized information from a wireless
device

through a Bluetooth connection.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76667 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart