100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 Final Exam Study Questions and Answers |100% Pass $9.99   Add to cart

Exam (elaborations)

ITN 260 Final Exam Study Questions and Answers |100% Pass

 3 views  0 purchase
  • Course
  • ITN
  • Institution
  • ITN

ITN 260 Final Exam Study Questions and Answers |100% Pass Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices? - Answer-Transport Layer Port-based authentication, in which users are authenticated on a per-swi...

[Show more]

Preview 2 out of 8  pages

  • October 6, 2024
  • 8
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN
  • ITN
avatar-seller
EmillyCharlotte
EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024




ITN 260 Final Exam Study Questions and
Answers |100% Pass

Which layer of the OSI model contains TCP protocol, which is used for establishing connections and

reliable data transport between devices? - Answer✔✔-Transport Layer


Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of

what standard below? - Answer✔✔-IEEE 802.1x


How can a network of physical devices be grouped into logical units, regardless of what network

switches they may be connected to? - Answer✔✔-VLAN


What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across

computer networks? - Answer✔✔-Router


TCP/IP uses its own five-layer architecture that includes Network Interface, Internet, Control, and

Application - Answer✔✔-False


In what type of cloud computing does the customer have the highest level of control? - Answer✔✔-

Cloud Infrastructure as a Service


An administrator needs to examine FTP commands being passed to a server. What port should the

administrator be monitoring? - Answer✔✔-21


What transport protocol is used by Windows operating systems to allow applications on separate

computers to communicate over a LAN? - Answer✔✔-NetBIOS


Page 1/8

, EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024


Broadcast storms can be prevented by using loop prevention technology. Which item below can be used

to help prevent loops? - Answer✔✔-802.1d


DNS poisoning can be prevented using the latest edition of what software below? - Answer✔✔-BIND


When using AES-CCMP, the AES-256 bit key requires how many rounds? - Answer✔✔-13


Which option below is responsible for the issuing of EAP request packets? - Answer✔✔-Authenticator


Because PEAP can be vulnerable to specific types of attacks, Cisco now recommends that users migrate

to a more secure EAP than PEAP. - Answer✔✔-False


Which of the following choices is not one of the four types of packets used by EAP? - Answer✔✔-Error


The Temporal Key Integrity Protocol (TKIP) encryption technology increases IVs to what length? -

Answer✔✔-48 bits


How can an administrator force wireless clients to use a standard web browser to provide information,

and require a user to agree to a use policy or present valid login credentials? - Answer✔✔-Captive portal

access point


Select the EAP protocol supported by WPA2 Enterprise that securely tunnels any credential form for

authentication using TLS: - Answer✔✔-EAP-FAST


Piconets in which connections exist between different piconets are known as a: - Answer✔✔-Scatternet


Which encryption protocol below is used in the WPA2 standard? - Answer✔✔-AES-CCMP


Slave devices that are connected to a piconet and are sending transmissions are known as what? -

Answer✔✔-Active slave

Page 2/8

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller EmillyCharlotte. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79373 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart