Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4,6 TrustPilot
logo-home
Exam (elaborations)

ITN 260 Final Exam Study Guide with Complete Solutions

Rating
-
Sold
-
Pages
30
Grade
A+
Uploaded on
06-10-2024
Written in
2024/2025

ITN 260 Final Exam Study Guide with Complete Solutions True or False: TCP is responsible for addressing packets and sending them on the correct route to the destination , while IP is responsible for reliable packet transmission. - Answer-False True or False: TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application - Answer-False True or False: IEEE 802.1x is commonly used on wireless networks - Answer-True True or False: IP telephony and Voice over IP (VoIP) are identical - Answer-False True or False: Despite its promise to dramatically impact IT, cloud computing raises significant security concerns - Answer-True What protocol suite below is the most commonly used protocol for local area network (LAN) communication - Answer-TCP/IP EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 2/30 At what level of the OSI model does the IP protocol function - Answer-Network Layer Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices - Answer-Transport Layer The capability for devices to exchange low-level control messages is provided by what protocol below? - Answer-ICMP When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an agent? - Answer-community string Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree - Answer-DNS DNS poisoning can be prevented using the latest edition of what software below? - Answer-BIND An administrator needs to examine FTP commands being passed to a server, what pro should the administrator be monitoring?1 - Answer-21 What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks - Answer-router The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks: - Answer-flood guard Broadcast storms can be prevented by using loop prevention technology. which item be used to help prevent loops - Answer-802.1d EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 3/30 How can a network pf physical devices be grouped into logical units, regardless of what network switches they may be connected to? - Answer-VLAN Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of what standard below? - Answer-IEEE 802.1x Which of th three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user? - Answer-Cloud Software as a Service When setting up a server virtualization environment, what component below manages the ritual machine operation systems and supports one or more guest systems - Answer-hypervisor In what type of cloud computing does the customer have the highest level of control? - Answer- Cloud Infrastructure as a Service What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting - Answer- Dynamic Which of the following is not a benefit that can be provided by using IP telephony - Answer- Decreased network utilization What is the term used for a device that requests permission form an authenticator to join a network - Answer-supplicant What transport protocol is used by windows operating systems to allow applications of separate computer to communicate over LAN - Answer-NetBIOS EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 4/30 Bluejacking - Answer-An attack that sends unsolicited messages to Bluetooth-enabled devices. Bluesnarfing - Answer-An attack that accesses unauthorized information from a wireless device through a Bluetooth connection. Bluetooth - Answer-A wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings. Captive portal AP - Answer-An infrastructure that is used on public access WLANs to provide a higher degree of security. Challenge-Handshake Authentication Protocol (CHAP) - Answer-A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP). Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) - Answer- The encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES. Evil twin - Answer-An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead of the authorized AP. Extensible Authentication Protocol (EAP) - Answer-A framework for transporting authentication protocols that defines the format of the messages. Initialization vector (IV) - Answer-A 24-bit value used in WEP that changes each time a packet is encrypted. EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 5/30 Lightweight EAP (LEAP) - Answer-A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software. Media Access Control (MAC) address filtering - Answer-A method for controlling access to a WLAN based on the device's MAC address. Near field communication (NFC) - Answer-A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity. Password Authentication Protocol (PAP) - Answer-A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP). Preshared key (PSK) - Answer-The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.

Show more Read less
Institution
ITN
Course
ITN

Content preview

EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024




ITN 260 Final Exam Study Guide with
Complete Solutions

True or False:


TCP is responsible for addressing packets and sending them on the correct route to the destination ,

while IP is responsible for reliable packet transmission. - Answer✔✔-False


True or False:


TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport,

and Application - Answer✔✔-False


True or False:


IEEE 802.1x is commonly used on wireless networks - Answer✔✔-True


True or False:


IP telephony and Voice over IP (VoIP) are identical - Answer✔✔-False


True or False:


Despite its promise to dramatically impact IT, cloud computing raises significant security concerns -

Answer✔✔-True


What protocol suite below is the most commonly used protocol for local area network (LAN)

communication - Answer✔✔-TCP/IP



Page 1/30

,EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024


At what level of the OSI model does the IP protocol function - Answer✔✔-Network Layer


Which layer of the OSI model contains TCP protocol, which is used for establishing connections and

reliable data transport between devices - Answer✔✔-Transport Layer


The capability for devices to exchange low-level control messages is provided by what protocol below? -

Answer✔✔-ICMP


When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an

agent? - Answer✔✔-community string


Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a

database consisting of an organized hierarchy tree - Answer✔✔-DNS


DNS poisoning can be prevented using the latest edition of what software below? - Answer✔✔-BIND


An administrator needs to examine FTP commands being passed to a server, what pro should the

administrator be monitoring?1 - Answer✔✔-21


What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across

computer networks - Answer✔✔-router


The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood

attacks: - Answer✔✔-flood guard


Broadcast storms can be prevented by using loop prevention technology. which item be used to help

prevent loops - Answer✔✔-802.1d




Page 2/30

, EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024


How can a network pf physical devices be grouped into logical units, regardless of what network

switches they may be connected to? - Answer✔✔-VLAN


Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of

what standard below? - Answer✔✔-IEEE 802.1x


Which of th three Cloud computing service models allows a customer to access software provided by a

vendor using a web browser, without any installation, configuration, upgrading, or management from

the user? - Answer✔✔-Cloud Software as a Service


When setting up a server virtualization environment, what component below manages the ritual

machine operation systems and supports one or more guest systems - Answer✔✔-hypervisor


In what type of cloud computing does the customer have the highest level of control? - Answer✔✔-

Cloud Infrastructure as a Service


What MAC limiting configuration setting allows for MAC addresses to be automatically learned and

stored along with any addresses that were learned prior to using the configuration setting - Answer✔✔-

Dynamic


Which of the following is not a benefit that can be provided by using IP telephony - Answer✔✔-

Decreased network utilization


What is the term used for a device that requests permission form an authenticator to join a network -

Answer✔✔-supplicant


What transport protocol is used by windows operating systems to allow applications of separate

computer to communicate over LAN - Answer✔✔-NetBIOS


Page 3/30

Written for

Institution
ITN
Course
ITN

Document information

Uploaded on
October 6, 2024
Number of pages
30
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EmillyCharlotte Howard Community College
View profile
Follow You need to be logged in order to follow users or courses
Sold
121
Member since
1 year
Number of followers
5
Documents
12300
Last sold
7 hours ago
ALL-MAJOR.

On this page, you find all documents, package deals, and flashcards offered by seller Emilly Charlotte.

3.4

26 reviews

5
8
4
8
3
2
2
3
1
5

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions