Itn 100 exam 2 - Study guides, Class notes & Summaries
Looking for the best study guides, study notes and summaries about Itn 100 exam 2? On this page you'll find 37 study documents about Itn 100 exam 2.
Page 3 out of 37 results
Sort by
-
ITN 101 exam 1 nvcc Questions and Answers 100% Pass
- Exam (elaborations) • 11 pages • 2024
-
- $12.49
- + learn more
ITN 101 exam 1 nvcc Questions and 
Answers 100% Pass 
Which of the following is a basic function a computer performs? (Choose all that - 
Correct Answer️️ -Processing Input Output 
The executes instructions provided by computer programs. - Correct Answer️️ -CPU 
When a CPU has two or more processors, each one is referred to as a(n) - Correct 
Answer️️ -b. Core 
Which of the following is considered long-term storage? (Choose all that apply.) - 
Correct Answer️️ -USB or flash drive...
-
ITN 101 Exam 1 NVCC 100% Correct Answers Verified Latest 2024 Version
- Exam (elaborations) • 10 pages • 2024
-
- $7.99
- + learn more
ITN 101 Exam 1 NVCC | 100% Correct 
Answers | Verified | Latest 2024 Version 
Which of the following is a basic function a computer performs? (Choose all that - Processing Input 
Output 
The executes instructions provided by computer programs. - CPU 
When a CPU has two or more processors, each one is referred to as a(n) - b. Core 
Which of the following is considered long-term storage? (Choose all that apply.) - USB or flash drive 
Hard drive 
Which motherboard component controls data transfers ...
-
ITN 260 Final Exam Study Questions and Answers |100% Pass
- Exam (elaborations) • 8 pages • 2024
-
- $9.99
- + learn more
ITN 260 Final Exam Study Questions and 
Answers |100% Pass 
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and 
reliable data transport between devices? - Answer-Transport Layer 
Port-based authentication, in which users are authenticated on a per-switch port basis, is a function of 
what standard below? - Answer-IEEE 802.1x 
How can a network of physical devices be grouped into logical units, regardless of what network 
switches they may be connec...
-
ITN 267 Final Exam Practice Questions and Answers|100% Pass
- Exam (elaborations) • 14 pages • 2024
-
- $9.99
- + learn more
ITN 267 Final Exam Practice Questions 
and Answers|100% Pass 
The Privacy Rule - Answer-The HIPAA _________________ dictates how covered entities must 
protect the privacy of personal health information 
Trade Secrets - Answer-A ______________ protects the formulas, processes, methods, and 
information that give a business a competitive edge 
Admissible Evidence - Answer-A judge or jury can consider only _______________ evidence when 
deciding cases 
Property Interest - Answer-A legal owner of p...
-
ITN Final Exam Questions and Answers | 100% Pass
- Exam (elaborations) • 8 pages • 2024
-
- $9.99
- + learn more
ITN Final Exam Questions and Answers | 
100% Pass 
What protocol is responsible for controlling the size of segments and the rate at which segments are 
exchanged between a web client and a web server? - Answer-TCP 
A technician configures a switch with these commands: 
SwitchA(config)# interface vlan 1 
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 
SwitchA(config-if)# no shutdown 
What is the technician configuring? - Answer-SVI 
When IPv4 addressing is manually configured on a web ...
Too much month left at the end of the money?
-
ITN 100 FINAL EXAM 2023 (QUESTIONS WITH ANSWERS GRADED 100%)
- Exam (elaborations) • 58 pages • 2023
-
- $26.49
- + learn more
ITN 100 FINAL EXAM 2023 (QUESTIONS WITH ANSWERS GRADED 100%) 
Which layer of the OSI model is responsible for ensuring that all packets sent are received by the 
destination station by dealing with end-to-end issues? - answertransport Layer 
The American National Standards Institute (ANSI) - answeris the coordinating organization for 
the United States' national system of standards 
Which of the following is not true about de juro standards? - answerThey are always developed 
before de facto st...
-
ITN 262 Midterm Exam Questions and Answers |100% Pass
- Exam (elaborations) • 6 pages • 2024
-
- $9.99
- + learn more
ITN 262 Midterm Exam Questions and 
Answers |100% Pass 
A person skilled in attacking computer systems, who uses those skills as a security expert to help protect 
systems, is a - Answer-white-hat hacker 
AUP stands for? - Answer-Acceptable Use Policy 
CIA properties do not include: - Answer-authentication 
What is a worm? - Answer-Malware 
When you analyze a system using the six-phase security process, you are performing a - Answer-risk 
assessment 
This yields a more specific set of attacks ti...
-
ITN 266 Exam Questions and Answers |100% Pass
- Exam (elaborations) • 18 pages • 2024
-
- $10.49
- + learn more
ITN 266 Exam Questions and Answers 
|100% Pass 
Detective countermeasures identify when a threat is attacking and especially when it is 
succeeding. True / False? - Answer-True 
You have access to your home page on a server. By accident, you discover that if you hit a 
certain key, you can get into someone else's files. You spend just a few minutes looking around. 
This is hacking. True / False? - Answer-True 
Threat environment consists of the types of attackers and attacks that companies fa...
-
ITN 266 Exam practice questions and answers |100% pass
- Exam (elaborations) • 8 pages • 2024
-
- $9.99
- + learn more
ITN 266 Exam practice questions and 
answers |100% pass 
What is cryptography? - Answer-The use of mathematical operations to protect messages 
traveling between parties or stored on a computer. 
What is a cipher? - Answer-A specific mathematical process used in encryption and 
decryption 
What is a key? - Answer-a random string of 40 to 4000 bits (ones and zeros). 
What is a cryptanalyst? - Answer-Someone who cracks encryption 
What is a substitution cipher? - Answer-One character is substitute...
-
ITN 266 FINAL EXAM QUESTIONS AND ANSWERS |100% PASS
- Exam (elaborations) • 15 pages • 2024
-
- $10.49
- + learn more
ITN 266 FINAL EXAM QUESTIONS 
AND ANSWERS |100% PASS 
Sending packets with false IP source addresses is called - Answer-IP address spoofing 
Which of the following are ways that trade secret espionage occur? - Answer-All of these 
Answers: 
Theft through interception 
By bribing an employee 
None of these 
Correct All of these 
________ threaten to do at least temporary harm to the victim company's IT infrastructure 
unless the victim pays the attacker. - Answer-Extortionists 
A(n) ________ a...
$6.50 for your textbook summary multiplied by 100 fellow students... Do the math: that's a lot of money! Don't be a thief of your own wallet and start uploading yours now. Discover all about earning on Stuvia