ITN 260 Final Exam Questions With 100% Verified Answers.
2 views 0 purchase
Course
ITN 260
Institution
ITN 260
ITN 260 Final Exam Questions With 100%
Verified Answers.
True or False:
TCP is responsible for addressing packets and sending them on the correct route to the
destination , while IP is responsible for reliable packet transmission. - answerFalse
True or False:
TCP/IP uses it own Five-layer arc...
ITN 260 Final Exam Questions With 100%
Verified Answers.
True or False:
TCP is responsible for addressing packets and sending them on the correct route to the
destination , while IP is responsible for reliable packet transmission. - answer✔False
True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control,
Transport, and Application - answer✔False
True or False:
IEEE 802.1x is commonly used on wireless networks - answer✔True
True or False:
IP telephony and Voice over IP (VoIP) are identical - answer✔False
True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security
concerns - answer✔True
What protocol suite below is the most commonly used protocol for local area network (LAN)
communication - answer✔TCP/IP
At what level of the OSI model does the IP protocol function - answer✔Network Layer
Which layer of the OSI model contains TCP protocol, which is used for establishing connections
and reliable data transport between devices - answer✔Transport Layer
The capability for devices to exchange low-level control messages is provided by what protocol
below? - answer✔ICMP
When using SNMPv1 or SNMPv2,what piece of information is needed to view information form
an agent? - answer✔community string
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address
using a database consisting of an organized hierarchy tree - answer✔DNS
DNS poisoning can be prevented using the latest edition of what software below? -
answer✔BIND
An administrator needs to examine FTP commands being passed to a server, what pro should the
administrator be monitoring?1 - answer✔21
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets
across computer networks - answer✔router
The deployment of this technology below can be used as a defense against DoS and DDoS SYN
flood attacks: - answer✔flood guard
Broadcast storms can be prevented by using loop prevention technology. which item be used to
help prevent loops - answer✔802.1d
How can a network pf physical devices be grouped into logical units, regardless of what network
switches they may be connected to? - answer✔VLAN
Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function
of what standard below? - answer✔IEEE 802.1x
Which of th three Cloud computing service models allows a customer to access software
provided by a vendor using a web browser, without any installation, configuration, upgrading, or
management from the user? - answer✔Cloud Software as a Service
When setting up a server virtualization environment, what component below manages the ritual
machine operation systems and supports one or more guest systems - answer✔hypervisor
In what type of cloud computing does the customer have the highest level of control? -
answer✔Cloud Infrastructure as a Service
What MAC limiting configuration setting allows for MAC addresses to be automatically learned
and stored along with any addresses that were learned prior to using the configuration setting -
answer✔Dynamic
Which of the following is not a benefit that can be provided by using IP telephony -
answer✔Decreased network utilization
What is the term used for a device that requests permission form an authenticator to join a
network - answer✔supplicant
What transport protocol is used by windows operating systems to allow applications of separate
computer to communicate over LAN - answer✔NetBIOS
Bluejacking - answer✔An attack that sends unsolicited messages to Bluetooth-enabled devices.
Bluesnarfing - answer✔An attack that accesses unauthorized information from a wireless device
through a Bluetooth connection.
Bluetooth - answer✔A wireless technology that uses short-range radio frequency (RF)
transmissions
and provides rapid ad hoc device pairings.
Captive portal AP - answer✔An infrastructure that is used on public access WLANs to provide a
higher degree of security.
Challenge-Handshake Authentication Protocol (CHAP) - answer✔A weak authentication
protocol that has been replaced by the Extensible Authentication Protocol (EAP).
Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) -
answer✔The encryption protocol used for WPA2 that specifies the use of a general-purpose
cipher mode algorithm providing data privacy with AES.
Evil twin - answer✔An AP set up by an attacker to mimic an authorized AP and capture
transmissions, so a user's device will unknowingly connect to this evil twin instead of the
authorized AP.
Extensible Authentication Protocol (EAP) - answer✔A framework for transporting
authentication
protocols that defines the format of the messages.
Initialization vector (IV) - answer✔A 24-bit value used in WEP that changes each time a packet
is encrypted.
Lightweight EAP (LEAP) - answer✔A proprietary EAP method developed by Cisco Systems
requiring mutual authentication used for WLAN encryption using Cisco client software.
Media Access Control (MAC) address filtering - answer✔A method for controlling access to a
WLAN based on the device's MAC address.
Near field communication (NFC) - answer✔A set of standards primarily for smartphones and
smart cards that can be used to establish communication between devices in close proximity.
Password Authentication Protocol (PAP) - answer✔A weak authentication protocol that has been
replaced by the Extensible Authentication Protocol (EAP).
Preshared key (PSK) - answer✔The authentication model used in WPA that requires a secret key
value to be entered into the AP and all wireless devices prior to communicating.
Protected EAP (PEAP) - answer✔An EAP method designed to simplify the deployment of
802.1x by using Microsoft Windows logins and passwords.
RF jamming - answer✔Intentionally flooding the radio frequency (RF) spectrum with extraneous
RF signal "noise" that creates interference and prevents communications from occurring.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Brainbarter. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.49. You're not tied to anything after your purchase.