100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 STUDY GUIDE QUESTIONS WITH ALL CORRECT ANSWERS $12.99   Add to cart

Exam (elaborations)

ITN 260 STUDY GUIDE QUESTIONS WITH ALL CORRECT ANSWERS

 6 views  0 purchase
  • Course
  • ITN 260
  • Institution
  • ITN 260

ITN 260 STUDY GUIDE QUESTIONS WITH ALL CORRECT ANSWERS Which network address below is not a private IP address network? a. 10.4.5.0 b. 172.63.255.0 c. 192.168.255.0 d. 172.17.16.0 - Answer- 172.63.255.0 Traditional network security devices can block traditional network attacks, but they ...

[Show more]

Preview 2 out of 13  pages

  • October 10, 2024
  • 13
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • itn 260
  • ITN 260
  • ITN 260
avatar-seller
Scholarsstudyguide
ITN 260 STUDY GUIDE QUESTIONS
WITH ALL CORRECT ANSWERS

Which network address below is not a private IP address network?
a. 10.4.5.0
b. 172.63.255.0
c. 192.168.255.0
d. 172.17.16.0 - Answer- 172.63.255.0

Traditional network security devices can block traditional network attacks, but they
cannot always block web application attacks.
a. True
b. False - Answer- True

One use of data loss prevention (DLP) is blocking the copying of files to a USB flash
drive.
a. True
b. False - Answer- True

What type of network is a private network that can also be accessed by authorized
external customers, vendors, and partners?
a. extranet
b. intranet
c. enterprise network
d. guest network - Answer- extranet

The exchange of information among DNS servers regarding configured zones is known
as:
a. resource request
b. zone sharing
c. zone transfer
d. zone removal - Answer- zone transfer

JavaScript cannot create separate stand-alone applications.
a. True
b. False - Answer- True

Securing web applications is easier than protecting other systems.
a. True
b. False - Answer- False

, Which of the following is a system of security tools that are used to recognize and
identify data that is critical to the organization and ensure that it is protected?
a. USB blocking
b. content inspection
c. storage sensors
d. data loss prevention - Answer- data loss prevention

What technology will examine the current state of a network device before allowing it
can to connect to the network and force any device that does not meet a specified set of
criteria to connect only to a quarantine network?
a. network access control
b. virtual LANs
c. network address translation
d. host health checks - Answer- network access control

In an integer overflow attack, an attacker changes the value of a variable to something
outside the range that the programmer had intended by using an integer overflow.
a. True
b. False - Answer- True

Which type of attack broadcasts a network request to multiple computers but changes
the address from which the request came to the victim's computer?
a. IP spoofing
b. denial of service
c. DNS Poisoning
d. smurf attack - Answer- smurf attack

An intranet is a separate open network that anyone can access without prior
authorization.
a. True
b. False - Answer- False

Which type of attack below is similar to a passive man-in-the-middle attack?
a. replay
b. hijacking
c. denial
d. buffer overflow - Answer- replay

The OSI model breaks networking steps down into a series of six layers.
a. True
b. False - Answer- False

What protocol can be used by a host on a network to find the MAC address of another
device based on an IP address?
a. DNS
b. ARP

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $12.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67866 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$12.99
  • (0)
  Add to cart