100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 Final Exam/ Practice Questions with Correct Verified Answers/ Rated A+ $10.49   Add to cart

Exam (elaborations)

ITN 260 Final Exam/ Practice Questions with Correct Verified Answers/ Rated A+

 4 views  0 purchase
  • Course
  • ITN 260
  • Institution
  • ITN 260

ITN 260 Final Exam/ Practice Questions with Correct Verified Answers/ Rated A+

Preview 3 out of 26  pages

  • September 25, 2024
  • 26
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN 260
  • ITN 260
avatar-seller
ASSIGNMENT7
ITN 260 Final Exam/ Practice Questions with Correct
Verified Answers/ Rated A+



True or False:

TCP is responsible for addressing packets and sending them on the correct route to the destination ,
while IP is responsible for reliable packet transmission. - ANSWER - False



True or False:

TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport,
and Application - ANSWER - False



True or False:

Despite its promise to dramatically impact IT, cloud computing raises significant security concerns -
ANSWER - True



What protocol suite below is the most commonly used protocol for local area network (LAN)
communication - ANSWER - TCP/IP



At what level of the OSI model does the IP protocol function - ANSWER - Network Layer



Which layer of the OSI model contains TCP protocol, which is used for establishing connections and
reliable data transport between devices - ANSWER - Transport Layer



The capability for devices to exchange low-level control messages is provided by what protocol below? -
ANSWER - ICMP




pg. 1

,When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an
agent? - ANSWER - community string



Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a
database consisting of an organized hierarchy tree - ANSWER – DNS



Which of th three Cloud computing service models allows a customer to access software provided by a
vendor using a web browser, without any installation, configuration, upgrading, or management from
the user? - ANSWER - Cloud Software as a Service



When setting up a server virtualization environment, what component below manages the ritual
machine operation systems and supports one or more guest systems - ANSWER - hypervisor



In what type of cloud computing does the customer have the highest level of control? - ANSWER - Cloud
Infrastructure as a Service



What MAC limiting configuration setting allows for MAC addresses to be automatically learned and
stored along with any addresses that were learned prior to using the configuration setting - ANSWER -
Dynamic



Which of the following is not a benefit that can be provided by using IP telephony - ANSWER - Decreased
network utilization



What is the term used for a device that requests permission form an authenticator to join a network -
ANSWER - supplicant



What transport protocol is used by windows operating systems to allow applications of separate
computer to communicate over LAN - ANSWER - NetBIOS



Bluejacking - ANSWER - An attack that sends unsolicited messages to Bluetooth-enabled devices.



Bluesnarfing - ANSWER - An attack that accesses unauthorized information from a wireless device

through a Bluetooth connection.


pg. 2

, Bluetooth - ANSWER - A wireless technology that uses short-range radio frequency (RF) transmissions

and provides rapid ad hoc device pairings.



Captive portal AP - ANSWER - An infrastructure that is used on public access WLANs to provide a higher
degree of security.



Challenge-Handshake Authentication Protocol (CHAP) - ANSWER - A weak authentication protocol that
has been replaced by the Extensible Authentication Protocol (EAP).



DNS poisoning can be prevented using the latest edition of what software below? - ANSWER - BIND



An administrator needs to examine FTP commands being passed to a server, what pro should the
administrator be monitoring?1 - ANSWER - 21



What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across
computer networks - ANSWER - router



The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood
attacks: - ANSWER - flood guard



Broadcast storms can be prevented by using loop prevention technology. which item be used to help
prevent loops - ANSWER - 802.1d



How can a network pf physical devices be grouped into logical units, regardless of what network
switches they may be connected to? - ANSWER - VLAN



Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of
what standard below? - ANSWER - IEEE 802.1x




pg. 3

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller ASSIGNMENT7. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart