ITN 260 Final Exam/ Practice Questions with Correct
Verified Answers/ Rated A+
True or False:
TCP is responsible for addressing packets and sending them on the correct route to the destination ,
while IP is responsible for reliable packet transmission. - ANSWER - False
True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport,
and Application - ANSWER - False
True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns -
ANSWER - True
What protocol suite below is the most commonly used protocol for local area network (LAN)
communication - ANSWER - TCP/IP
At what level of the OSI model does the IP protocol function - ANSWER - Network Layer
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and
reliable data transport between devices - ANSWER - Transport Layer
The capability for devices to exchange low-level control messages is provided by what protocol below? -
ANSWER - ICMP
pg. 1
,When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an
agent? - ANSWER - community string
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a
database consisting of an organized hierarchy tree - ANSWER – DNS
Which of th three Cloud computing service models allows a customer to access software provided by a
vendor using a web browser, without any installation, configuration, upgrading, or management from
the user? - ANSWER - Cloud Software as a Service
When setting up a server virtualization environment, what component below manages the ritual
machine operation systems and supports one or more guest systems - ANSWER - hypervisor
In what type of cloud computing does the customer have the highest level of control? - ANSWER - Cloud
Infrastructure as a Service
What MAC limiting configuration setting allows for MAC addresses to be automatically learned and
stored along with any addresses that were learned prior to using the configuration setting - ANSWER -
Dynamic
Which of the following is not a benefit that can be provided by using IP telephony - ANSWER - Decreased
network utilization
What is the term used for a device that requests permission form an authenticator to join a network -
ANSWER - supplicant
What transport protocol is used by windows operating systems to allow applications of separate
computer to communicate over LAN - ANSWER - NetBIOS
Bluejacking - ANSWER - An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing - ANSWER - An attack that accesses unauthorized information from a wireless device
through a Bluetooth connection.
pg. 2
, Bluetooth - ANSWER - A wireless technology that uses short-range radio frequency (RF) transmissions
and provides rapid ad hoc device pairings.
Captive portal AP - ANSWER - An infrastructure that is used on public access WLANs to provide a higher
degree of security.
Challenge-Handshake Authentication Protocol (CHAP) - ANSWER - A weak authentication protocol that
has been replaced by the Extensible Authentication Protocol (EAP).
DNS poisoning can be prevented using the latest edition of what software below? - ANSWER - BIND
An administrator needs to examine FTP commands being passed to a server, what pro should the
administrator be monitoring?1 - ANSWER - 21
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across
computer networks - ANSWER - router
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood
attacks: - ANSWER - flood guard
Broadcast storms can be prevented by using loop prevention technology. which item be used to help
prevent loops - ANSWER - 802.1d
How can a network pf physical devices be grouped into logical units, regardless of what network
switches they may be connected to? - ANSWER - VLAN
Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of
what standard below? - ANSWER - IEEE 802.1x
pg. 3
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ASSIGNMENT7. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.