ITN 262 FINAL EXAM WITH COMPLETE SOLUTIONS 100% GUARANTEE PASS
3 views 0 purchase
Course
ITN 262
Institution
ITN 262
ITN 262 FINAL EXAM WITH COMPLETE SOLUTIONS 100% GUARANTEE PASS
How does DNS cache poisoning work? - Answer- b) The attacker transmits bogus DNS responses to the victim, or the victim's DNS server, containing the bogus information.
How have DDOS attacks affected DNS and hosts that rely on i...
ITN 262 FINAL EXAM WITH COMPLETE
SOLUTIONS 100% GUARANTEE PASS
How does DNS cache poisoning work? - Answer- b) The attacker transmits bogus DNS
responses to the victim, or the victim's DNS server, containing the bogus information.
How have DDOS attacks affected DNS and hosts that rely on it? Select all that apply. -
Answer- b) DDOS attacks on DNS servers for specific hosts have made it difficult for
some users to reach those hosts.
a) Partially successful attacks on root DNS servers have had little effect on Internet
traffic.
d) Botnets may have been used in some DNS DDOS attacks.
True or False? Randomized request are a part of the DNS Security Improvements. -
Answer- True
True or False? Though vulnerabilities exist, most DNS transactions take place without
trouble or interference. - Answer- True
DNS security improvements include which of the following? Select all that apply. -
Answer- d) Limited access to resolvers
c) Distributed DNS servers
b) Randomized requests
A firewall gateway for a household or small business LAN contains several of the
following features. Select all that appear in a typical gateway. - Answer- c) DHCP
protocol
b) Share a single IP address assigned by the ISP among multiple hosts inside the
network
A simple gateway as described in Section 12.4 can filter on a variety of packet contents.
Select all types of packets listed below that a simple gateway can filter. - Answer- e)
Broadcasts
c) ICMP
d) IP addresses
b) Web traffic
True or False? The purpose of a gateway firewall is to block potentially hostile traffic
from reaching the internal LAN. - Answer- True
,True or False? Hosts behind a network address translation (NAT) gateway are typically
assigned local IP addresses. - Answer- True
Packet filtering looks at any packet header and filters on all of the following values,
except: - Answer- a) email address.
We are implementing a product with local authentication on the device. What is included
in the security boundary? - Answer- a) Everything from the point where the credential is
entered to the checking mechanism and the authentication database
We need to implement services on several servers, and we wish to use the same login
credentials for all of them. Which authentication patterns are most effective for this?
Select all that apply. - Answer- c) Indirect authentication
d) Off-line authentication
Which authentication pattern may be implemented with no cryptography at all? -
Answer- a) Local authentication
We are implementing a server with direct authentication. What is included in the security
boundary? - Answer- b) The server itself, including its credential checking mechanism
and the authentication database
We are implementing a server with off-line authentication. What is included in the
security boundary? - Answer- d) The server itself, which does not include an
authentication database
A network's topology refers to the structure of its: - Answer- b) connections.
Modern internet technology evolved from research on: - Answer- d) the ARPANET.
Highway systems of driveways, local roads, and national roads are networks for
automobiles, much like the internet is a network for data traffic. Both types of network
share some similarities. Select the most appropriate similarities from those listed below.
- Answer- d) The networks may be used for private, public service, and commercial
traffic.
c) There is no single organization responsible for all network elements.
b) The networks connect their elements across many different types of links.
The ______ was carefully designed so that the network protocols worked seamlessly
across a broad range of computing equipment. - Answer- ARPANET
A router is traditionally called a(n) ________. - Answer- gateway
, True or False? The internet layer of every such protocol stack contains a routing table
that chooses a network and/or MAC address for the outgoing packet. - Answer- True
True or False? A router changes everything past the IP header. - Answer- False
Which of the following explanations of how packet addresses are used during routing is
most accurate? - Answer- b) The packet's destination IP address is used to select the
packet's next MAC address.
True or False? When internet technology connects two networks with separate link
layers together, each individual network is called a subnet. - Answer- True
True or False? The time to live (TTL) field in an IP header counts the number of hops a
packet takes through routers on its way to its destination. - Answer- True
True or False? Each site's router contains the complete path followed by every packet
arriving at that site. - Answer- False
Internet routing: - Answer- c) makes routing decisions one at a time as a packet crosses
individual networks.
Routing devices on the early ARPANET were called: - Answer- b) IMPs.
Handles a cluster of networks, usually for paying customers - Answer- Internet Service
Provider (ISP)
Establishes protocol standards used on the internet - Answer- Internet Engineering
Task Force (IETF)
Organizes the internet into clusters of networks for routing - Answer- Autonomous
system (AS)
Routes network traffic between ASes - Answer- Border routers
An autonomous system (AS): - Answer- b) uses border routers to connect one AS to
another.
a) handles two types of routing: interior and exterior.
Each _______ is essentially a(n) _______ that handles routing between its networking
customers. - Answer- AS; ISP
True or False? Exterior routing relies on interior routers. - Answer- False
Which interface provides a well-known way of addressing hosts and processes on a
computer and of writing client or server software? - Answer- Socket interface
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.39. You're not tied to anything after your purchase.