FIRST PUBLISH SEPTEMBER 2024
ITN 260 Final Exam Study Guide with
Complete Solutions
True or False:
TCP is responsible for addressing packets and sending them on the correct route to the destination ,
while IP is responsible for reliable packet transmission. - Answer✔✔-False
True or False:
TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport,
and Application - Answer✔✔-False
True or False:
IEEE 802.1x is commonly used on wireless networks - Answer✔✔-True
True or False:
IP telephony and Voice over IP (VoIP) are identical - Answer✔✔-False
True or False:
Despite its promise to dramatically impact IT, cloud computing raises significant security concerns -
Answer✔✔-True
What protocol suite below is the most commonly used protocol for local area network (LAN)
communication - Answer✔✔-TCP/IP
Page 1/30
,EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024
At what level of the OSI model does the IP protocol function - Answer✔✔-Network Layer
Which layer of the OSI model contains TCP protocol, which is used for establishing connections and
reliable data transport between devices - Answer✔✔-Transport Layer
The capability for devices to exchange low-level control messages is provided by what protocol below? -
Answer✔✔-ICMP
When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an
agent? - Answer✔✔-community string
Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a
database consisting of an organized hierarchy tree - Answer✔✔-DNS
DNS poisoning can be prevented using the latest edition of what software below? - Answer✔✔-BIND
An administrator needs to examine FTP commands being passed to a server, what pro should the
administrator be monitoring?1 - Answer✔✔-21
What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across
computer networks - Answer✔✔-router
The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood
attacks: - Answer✔✔-flood guard
Broadcast storms can be prevented by using loop prevention technology. which item be used to help
prevent loops - Answer✔✔-802.1d
Page 2/30
, EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024
How can a network pf physical devices be grouped into logical units, regardless of what network
switches they may be connected to? - Answer✔✔-VLAN
Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of
what standard below? - Answer✔✔-IEEE 802.1x
Which of th three Cloud computing service models allows a customer to access software provided by a
vendor using a web browser, without any installation, configuration, upgrading, or management from
the user? - Answer✔✔-Cloud Software as a Service
When setting up a server virtualization environment, what component below manages the ritual
machine operation systems and supports one or more guest systems - Answer✔✔-hypervisor
In what type of cloud computing does the customer have the highest level of control? - Answer✔✔-
Cloud Infrastructure as a Service
What MAC limiting configuration setting allows for MAC addresses to be automatically learned and
stored along with any addresses that were learned prior to using the configuration setting - Answer✔✔-
Dynamic
Which of the following is not a benefit that can be provided by using IP telephony - Answer✔✔-
Decreased network utilization
What is the term used for a device that requests permission form an authenticator to join a network -
Answer✔✔-supplicant
What transport protocol is used by windows operating systems to allow applications of separate
computer to communicate over LAN - Answer✔✔-NetBIOS
Page 3/30