100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CSCI 4629 MIDTERM EXAM 2025/2026 WITH 100% ACCURATE ANSWERS

Rating
-
Sold
-
Pages
44
Grade
A+
Uploaded on
12-11-2025
Written in
2025/2026

CSCI 4629 MIDTERM EXAM 2025/2026 WITH 100% ACCURATE ANSWERS

Institution
CSCI 4629
Course
CSCI 4629











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CSCI 4629
Course
CSCI 4629

Document information

Uploaded on
November 12, 2025
Number of pages
44
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CSCI 4629 MIDTERM EXAM 2025/2026 WITH
100% ACCURATE ANSWERS

1. Discuss why TFTP is considered an insecure protocol in the context of
network security.

TFTP is secure for transferring configurations.

TFTP is only insecure when used with port 22.

TFTP lacks encryption and authentication, making it vulnerable
to interception and unauthorized access.

TFTP is secure because it uses TCP.

2. Discuss how encrypted traffic can impact the functionality of packet
filtering firewalls.

Encrypted traffic can obscure packet headers, making it
difficult for firewalls to apply filtering rules effectively.

Encrypted traffic is always blocked by firewalls.

Encrypted traffic is processed faster by firewalls than
unencrypted traffic.

Firewalls do not need to inspect encrypted traffic.

3. Describe how a microwave oven can affect the performance of an
802.11g wireless network.

A microwave oven operates on a different frequency than
802.11g, causing no interference.

A microwave oven can emit electromagnetic interference that
disrupts the 2.4 GHz frequency used by 802.11g networks.

,A microwave oven enhances the signal strength of wireless
networks.

A microwave oven can only affect wired networks, not wireless.

,4. Alicìa is having trouble browsing the Internet on the wireless network
from the employee lunchroom on her lunch break. You check her
connection, and it appears that the connection works for a few minutes
but then disconnects. The NIC settings show the correct IP address and
Wi-Fi settings, but you continue to see the up/down on the connection.
Which of the following could best explain why Alicìa is having
problems?

The wireless NIC is broken.

The microwave in the lunchroom is causing interference.

The WAP is configured wrong.

The computer OS needs upgrades.

5. If your corporate network is experiencing frequent malware attacks,
which device would you implement to enhance security and why?

Router, because it manages traffic flow effectively.

Web security gateway, because it provides content filtering
and virus defense.

Switch, because it connects multiple devices in the network.

Firewall, because it blocks unauthorized access without filtering
content.

6. You are responsible for network security at Acme Company. Users have
been reporting that personal data is being stolen when using the
wireless network. They all insist they only connect to the corporate
wireless access point (WAP). However, logs for the WAP show that users
have not connected to it. Which of the following could best explain this
situation?

Rogue Access Point

Clickjacking

, Session Hijacking

Bluejacking

7. A perimeter survey finds that the wireless network within a facility is
easily reachable outside of the physical perimeter. Which of the
following should be adjusted to mitigate this risk?

Power level controls

CCMP

MAC filter

SSID broadcast

8. Describe the primary function of an Intrusion Prevention System (IPS) in
network security.

An IPS creates virtual networks to separate traffic.

An IPS monitors network traffic for suspicious activity and
takes action to block or prevent potential intrusions.

An IPS encrypts data to secure it during transmission.

An IPS manages user access to network resources.

9. Describe the implications of a rogue access point in a corporate
network environment.

A rogue access point is a tool used for monitoring network
traffic.

A rogue access point improves network performance by
increasing bandwidth.

A rogue access point can allow unauthorized users to connect
to the network, potentially leading to data breaches and
security vulnerabilities.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectjarnniey Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
71
Member since
2 year
Number of followers
43
Documents
3094
Last sold
1 week ago
Your Success, Our Blueprint

Your Success, Our Blueprint

4.3

13 reviews

5
8
4
3
3
1
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions