100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 101 Exam 3 questions with complete answers graded +

Beoordeling
-
Verkocht
-
Pagina's
9
Cijfer
A+
Geüpload op
19-08-2022
Geschreven in
2022/2023

convergence The time it takes for all the routing tables on every router in a network to be fully updated, either when a change occurs or according to a schedule, is called the speed of what? a. convergence b. concurrence c. congestion d. delivery MAC address Each interface on a router must have an IP address and what else to be able to communicate on the network? a. serial number b. network ID c. default gateway d. MAC address 00:53 01:07 wardriver What type of hacker uses a scanning device to find unsecured wireless networks and break into those networks? a. white hat b. wardriver c. script kiddy d. phisher preboot execution environment Which advanced feature of a NIC allows a computer to download an OS from the network instead of from a local drive? a. shared system memory b. onboard coprocessor c. advanced configuration power management interface d. preboot execution environment Honeypot What type of device should you install as a decoy to lure potential attackers? a. VPN b. Trojan c. IPS d. honeypot encryption Which facet of securing access to network data makes data unusable to anyone except authorized users? a. security devices b. malware protection c. encryption d. authentication preshared key Which form of authentication involves the exchange of a password-like key that must be entered on both devices? a. GNU privacy guard b. preshared key c. digital certificate d. Kerberos authentication port scanner Which of the following is a tool used to determine what possible points of entry exist that are open and vulnerable on your system? a. protocol finder b. ping scanner c. trace route d. port scanner shared bandwidth You are a network architect for an IT consulting company. One of your clients needs a WAN connection and has asked you about the disadvantage of a packet-switched WAN method. Which of the following is a disadvantage that applies? a. low bandwidth b. suspect reliability c. expensive compared to leased lines d. shared bandwidth T1 uses point to point, while frame relay makes use of virtual circuits. Although a frame relay connection is established in much the same way that a T1 connection is, which of the following is an important distinction between the two technologies? a. T1 uses point to point, while frame relay makes use of virtual circuits. b. T1 data traffic must all be transmitted in clear text, while frame relay encrypts data automatically and is more secure. c. T1 connections are established using CSU/DSUs. Frame relay connections require a VPN service on the remote node. d. Frame relay is point to point, whereas T1 uses virtual circuits. Time Division Multiplexing (TDM) What is the signaling method used to allocate time slots for each channel in a T-carrier line called? a. Time Fractionalized Division (TFD) b. Time Divided Multimixing (TDM) c. Time Division Multiplexing (TDM) d. Time Slotted Modulation (TSM) carrying voice, data, and time-sensitive information What would an Asynchronous Transfer Mode (ATM) network be best suited for? a. carrying voice, data, and time-sensitive information b. downloading an RFC text file from the IETF web page c. text messaging d. sending e-mail the connection between the demarcation point and the CO What is the local loop, or last mile? a. the connection between the demarcation point and the CO b. the connection used between central offices c. a line used by ISPs for testing T-carrier signals. d. cable between the customer premise equipment and a PC router on a stick When a router's interface is configured with multiple IP addresses with each address belonging to different networks, what is it called? a. router on a stick b. multi-homed router c. dynamic router d. link-state router route print What command issued from a command prompt will display the routing table in Windows? a. route print b. route config c. route table d. route delete fragment-free QUESTION 3 Which switching method reads a minimum of 64 bytes of an Ethernet frame before forwarding the frame? a. fragment-free b. store-and-forward c. auto-negotiate d. cut-through STP Which of the following is the switching protocol that is used to eliminate the possibility of switching loops? a. RIP b. NTP c. SNMP d. STP The user can use a blank password. If the minimum password length on a Windows system is set to zero, what does that mean? a. The user never has to change the password. b. The user account is disabled. c. The user can use a blank password. d. The user has to change the password every day. tunnel What is created when a packet is encapsulated with additional headers to allow an encrypted packet to be correctly routed by Internet devices? a. access point b. tunnel c. EFS d. frame Routing and Remote Access Service (RRAS) You have been asked to install a VPN remote access solution using Windows Server. What do you need to install? a. Microsoft Mobile User Service (MMUS) b. Windows Server Remote Access (WSRA) c. Dialup and Remote Access Services (DRAS) d. Routing and Remote Access Service (RRAS) Platform as a service Which of the following terms describes the category of cloud computing in which a customer develops applications using development tools and infrastructure provided by the service provider? a. Software as a service b. Infrastructure as a service c. Platform as a service d. Network as a service SMTP Which of the following protocols is NOT used for Windows 7 VPN connections? a. PPTP b. L2TP c. SMTP d. SSTP WPA2 Which is the strongest form of wireless security? a. WEP b. RADIUS c. WPA2 d. IGP MAC address/switch port number Which of the following combinations will you find in a switching table? a. MAC address/switch port number b. IP address/exit interface c. application/destination port number d. destination network/next Hop demilitarized zone Where should a NIDS be placed to protect the entire network? a. demilitarized zone b. intermediate distribution frame c. datacenter d. internal LAN RADIUS Which of the following is a protocol that centralizes authentication, authorization, and accounting? a. Kerberos b. RADIUS c. mutual authentication d. EAP stateful packet inspection What can firewalls do to help ensure that a packet is denied if it's not part of an ongoing legitimate conversation? a. MAC filtering b. intrusion detection c. stateful packet inspection d. content filter spyware Which of the following is a type of malware that isn't self-replicating and is usually installed by the user without his knowledge. It's primary goal is to invade your privacy by monitoring your system and reporting your activities to advertisers and spammers. a. Trojan b. hoax virus c. spyware d. rootkit OC-9001 Which one of the following is NOT a typical SONET data rate? a. OC-9001 b. OC-48 c. OC-768 d. OC-3 1.54 Mbps is the guaranteed minimum transmission rate. Your local ISP has provided you with a dedicated line that has a Committed Information Rate of 1.54 Mbps. What does this mean? a. 1.54 Mbps is allocated and available for burst network traffic only. b. 1.54 Mbps is the guaranteed minimum transmission rate. c. The dedicated line is using frame relay. d. 1.54 Mbps is the guaranteed maximum transmission rate. 144 Mbps maximum throughput Which of the following is something X.25 does NOT offer? a. SVCs b. error-free communication c. PVCs d. 144 Mbps maximum throughput hosted infrastructure Which cloud computing category allows a company to quickly provision additional disk space? a. hosted applications b. hosted networking c. hosted infrastructure d. hosted platforms It determines the path used based on the destination IP address. Which of the following is not a true statement regarding the function of a switch? a. It determines the path used based on the destination IP address. b. It sends broadcast frames out all connected ports. c. Each port on a switch represents a separate collision domain. d. Switches have the ability to operate in full-duplex mode. SSTP Which VPN implementation needs no additional configuration to be allowed access through a firewall? a. PPTP b. SSTP c. IPSec d. L2TP authentication What type of policy defines the methods involved when a user logs on to the network? a. audit b. authentication c. security d. acceptable use when a nondedicated link is needed for backups When would you most likely NOT choose to use a leased line connection? a. when a nondedicated link is needed for backups b. when high-quality, 24/7 access is needed c. for mission critical applications d. when fast upstream as well as downstream communications is required Software as a service Which cloud computing category refers to the use of software hosted on a service provider's network, and is usually subscription based? a. Networking as a service b. Software as a service c. Platform as a service d. Infrastructure as a service circuit switched The plain old telephone service is a good example of what kind of WAN technology? a. leased line b. circuit switched c. VPN over Internet d. packet switched administrative distance What is the name of the value assigned to a routing protocol to indicate its reliability compared with other routing protocols that might be in use on the same router? a. ACL b. hop count c. metric d. administrative distance distance-vector protocol What type of routing protocol are RIP and RIPv2? a. hybrid protocol b. distance-state protocol c. distance-vector protocol d. link-state protocol NAT What process, available on most routers, will help improve security by masking the internal IP address of the transmitting device? a. VPN b. EFS c. IPSec d. NAT Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels. Select the true statement regarding analog and digital signals. a. Analog signals vary over time continually and can be represented by a sine wave, while digital signals are binary 1s and 0s using voltage levels. b. A modem is not required to use a line that uses analog signals. c. Digital signals vary over time continually and can be represented by a sine wave, while analog signals are binary 1s and 0s using voltage levels d. On fiber optic media, a 1 bit can be represented as a pulsing analog signal. uses legal terminology to protect the organization Which of the following is NOT a guideline of a security policy? a. easy for users to understand b. clearly state the policy objectives c. uses legal terminology to protect the organization d. should be enforceable IPsec Which protocol is used to encrypt data as it travels a network? a. EFS b. SMB c. IPsec d. Kerberos reduced physical plant costs You're the network administrator for a large bean-bag chair company. You are presenting to your supervisor several reasons to make use of cloud computing for handling data processing. Which answer would be a valid benefit of using cloud computing? a. always on, always available access independent of network status b. reduced physical plant costs c. increased use of localized resources d. decrease in user application training time smurf attack Which of the following is a type of denial-of-service attack that involves flooding the network with broadcast messages that contain a spoofed source address of an intended victim? a. smurf attack b. half-open SYN attack c. packet storm d. broadcast flood rootkit What is a type of malware that is so difficult to detect and remove that most experts agree that it is better to backup your critical data and reinstall the OS? a. hoax virus b. Trojan c. rootkit d. spyware Basic Rate Interface (BRI) The company you work for currently has ISDN service in place. Your supervisor wishes to know what sort of ISDN service is being used so that better alternatives can be considered. He tells you that the service has two B-Channels and a D-Channel. What ISDN format do you have? a. Primary Rate Interface (PRI) b. Basic Rate Interface (BRI) c. Asynchronous Transfer Mode (ATM) d. Basic Rate Extended (BRE) BGP What is an example of an EGP? a. IS-IS b. RIPv2 c. OSPF d. BGP OSPF Which of the following is a common link-state protocol? a. OSPF b. EIGRP c. RIPv2 d. BGP the ability to transfer it's switching table with neighboring switches Which of the following is not a function that would be found in a managed switch? a. the ability to transfer it's switching table with neighboring switches b. to limit access to the network by enabling security on individual ports c. the ability to stop switching loops using STP d. the creation of VLANS to logically separate resources cut-through Which of the following is the fastest switching mode? a. store-and-forward b. cut-through c. fragment-free d. auto-negotiate

Meer zien Lees minder
Instelling
Vak









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Vak

Documentinformatie

Geüpload op
19 augustus 2022
Aantal pagina's
9
Geschreven in
2022/2023
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

ITN 101 Exam 3
convergence - Answer The time it takes for all the routing tables on every router in a
network to be fully updated, either when a change occurs or according to a schedule, is
called the speed of what?
a. convergence
b. concurrence
c. congestion
d. delivery

MAC address - Answer Each interface on a router must have an IP address and what
else to be able to communicate on the network?
a. serial number
b. network ID
c. default gateway
d. MAC address

wardriver - Answer What type of hacker uses a scanning device to find unsecured
wireless networks and break into those networks?
a. white hat
b. wardriver
c. script kiddy
d. phisher

preboot execution environment - Answer Which advanced feature of a NIC allows a
computer to download an OS from the network instead of from a local drive?
a. shared system memory
b. onboard coprocessor
c. advanced configuration power management
interface
d. preboot execution environment

Honeypot - Answer What type of device should you install as a decoy to lure potential
attackers?
a. VPN
b. Trojan
c. IPS
d. honeypot

encryption - Answer Which facet of securing access to network data makes data
unusable to anyone except authorized users?
a. security devices
b. malware protection
c. encryption
d. authentication

, preshared key - Answer Which form of authentication involves the exchange of a
password-like key that must be entered on both devices?
a. GNU privacy guard
b. preshared key
c. digital certificate
d. Kerberos authentication

port scanner - Answer Which of the following is a tool used to determine what possible
points of entry exist that are open and vulnerable on your system?
a. protocol finder
b. ping scanner
c. trace route
d. port scanner

shared bandwidth - Answer You are a network architect for an IT consulting company.
One of your clients needs a WAN connection and has asked you about the
disadvantage of a packet-switched WAN method. Which of the following is a
disadvantage that applies?
a. low bandwidth
b. suspect reliability
c. expensive compared to leased lines
d. shared bandwidth

T1 uses point to point, while frame relay makes use of virtual circuits. - Answer Although
a frame relay connection is established in much the same way that a T1 connection is,
which of the following is an important distinction between the two technologies?
a. T1 uses point to point, while frame relay makes
use of virtual circuits.
b. T1 data traffic must all be transmitted in clear
text, while frame relay encrypts data
automatically and is more secure.
c. T1 connections are established using
CSU/DSUs. Frame relay connections require
a VPN service on the remote node.
d. Frame relay is point to point, whereas T1 uses
virtual circuits.

Time Division Multiplexing (TDM) - Answer What is the signaling method used to
allocate time slots for each channel in a T-carrier line called?
a. Time Fractionalized Division (TFD)
b. Time Divided Multimixing (TDM)
c. Time Division Multiplexing (TDM)
d. Time Slotted Modulation (TSM)

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
EvaTee Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
4996
Lid sinds
4 jaar
Aantal volgers
3555
Documenten
51682
Laatst verkocht
3 dagen geleden
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.9

909 beoordelingen

5
435
4
160
3
165
2
45
1
104

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen