ITN 262 FINAL EXAM 2025 WITH 100%
ACCURATE SOLUTIONS
An advantage of packet switching is - ✅✅✅CORRECT -parallel transmission
The following is part of the networks protocol stack - ✅✅✅CORRECT -bot of the answers ( link layer
and transport layer)
In wireless transmission , a host first sends a - ✅✅✅CORRECT -RTS message
All of the following are types of switching except - ✅✅✅CORRECT -message switching
To launch a DDOS attack, an attacker often uses - ✅✅✅CORRECT -a botnet
Another term for "maximum data rate" is - ✅✅✅CORRECT -bandwidth
Primary form of Ethernet include the following except - ✅✅✅CORRECT -nano
A rootkit is - ✅✅✅CORRECT -software that hides on a computer and provides a back door for the
attacker
The OSI model has how many layers - ✅✅✅CORRECT -7
To see a list of MAC addresses on a Windows-based network - ✅✅✅CORRECT -issue the ifconfig/all
command
A disadvantage of a start network is - ✅✅✅CORRECT -one link per device
The well known port number 80 is used for - ✅✅✅CORRECT -the world wide web
, The element that automatically assigns IP addresses to LAN hosts is - ✅✅✅CORRECT -Dynamic host
configuration protocol
A disadvantage of a mesh network is - ✅✅✅CORRECT -congestion
A tool that captures packets on a network and helps you analyze the packets is - ✅✅✅CORRECT -
wireshark
A disadvantage of tree network is - ✅✅✅CORRECT -address-based size limits
a disadvantage of a point-to-point network is - ✅✅✅CORRECT -no broadcasting
192.168.1.1 is an example of - ✅✅✅CORRECT -an IPv4 address
1111 1111-1111 1111-1111 0000-0000 0000 is an example of a - ✅✅✅CORRECT -binary network
mask
The three-way handshake consists of 4 packets 1.SYN 2.SYN and ACK 3. ACK and 4 - ✅✅✅CORRECT -
FIN
Packet filtering looks at any packet header and filters on these values except - ✅✅✅CORRECT -
number of addresses
Identify which of the following is NOT a TCP/IP attack - ✅✅✅CORRECT -SQL injection
To resolve a domain name on the Internet, the DNS resolver first contacts - ✅✅✅CORRECT -the root
DNS server
Identify which of the following is NOT a way attackers have exploited protocols to perform three general
types of attacks - ✅✅✅CORRECT -compromise a data center
ACCURATE SOLUTIONS
An advantage of packet switching is - ✅✅✅CORRECT -parallel transmission
The following is part of the networks protocol stack - ✅✅✅CORRECT -bot of the answers ( link layer
and transport layer)
In wireless transmission , a host first sends a - ✅✅✅CORRECT -RTS message
All of the following are types of switching except - ✅✅✅CORRECT -message switching
To launch a DDOS attack, an attacker often uses - ✅✅✅CORRECT -a botnet
Another term for "maximum data rate" is - ✅✅✅CORRECT -bandwidth
Primary form of Ethernet include the following except - ✅✅✅CORRECT -nano
A rootkit is - ✅✅✅CORRECT -software that hides on a computer and provides a back door for the
attacker
The OSI model has how many layers - ✅✅✅CORRECT -7
To see a list of MAC addresses on a Windows-based network - ✅✅✅CORRECT -issue the ifconfig/all
command
A disadvantage of a start network is - ✅✅✅CORRECT -one link per device
The well known port number 80 is used for - ✅✅✅CORRECT -the world wide web
, The element that automatically assigns IP addresses to LAN hosts is - ✅✅✅CORRECT -Dynamic host
configuration protocol
A disadvantage of a mesh network is - ✅✅✅CORRECT -congestion
A tool that captures packets on a network and helps you analyze the packets is - ✅✅✅CORRECT -
wireshark
A disadvantage of tree network is - ✅✅✅CORRECT -address-based size limits
a disadvantage of a point-to-point network is - ✅✅✅CORRECT -no broadcasting
192.168.1.1 is an example of - ✅✅✅CORRECT -an IPv4 address
1111 1111-1111 1111-1111 0000-0000 0000 is an example of a - ✅✅✅CORRECT -binary network
mask
The three-way handshake consists of 4 packets 1.SYN 2.SYN and ACK 3. ACK and 4 - ✅✅✅CORRECT -
FIN
Packet filtering looks at any packet header and filters on these values except - ✅✅✅CORRECT -
number of addresses
Identify which of the following is NOT a TCP/IP attack - ✅✅✅CORRECT -SQL injection
To resolve a domain name on the Internet, the DNS resolver first contacts - ✅✅✅CORRECT -the root
DNS server
Identify which of the following is NOT a way attackers have exploited protocols to perform three general
types of attacks - ✅✅✅CORRECT -compromise a data center