100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 261 EXAM QUESTIONS AND CORRECT ANSWERS ALREADY PASSED

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
06-08-2025
Written in
2025/2026

ITN 261 EXAM QUESTIONS AND CORRECT ANSWERS ALREADY PASSED

Institution
ITN 261
Module
ITN 261









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 261
Module
ITN 261

Document information

Uploaded on
August 6, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITN 261 EXAM QUESTIONS AND
CORRECT ANSWERS ALREADY
PASSED

A hash algorithm can be compromised with a collision, which occurs when two separate
and different messages or inputs pass through the hashing process and generate: -
Answer-the same value

Traceroute is one of the easiest ways to identify the path to a targeted Web site -
Answer-True

The Internet Assigned Numbers Authority (IANA) is responsible for the global
coordination of the Domain Name System (DNS) root, IP addressing, and other Internet
protocol resources - Answer-True

Which of the following refers to the structured and methodical means of investigating,
uncovering, attacking, and reporting on a target system's strengths and vulnerabilities? -
Answer-Penetration testing

Sniffers are useful and problematic at the same time because network traffic that might
include sensitive data can be viewed through the use of a sniffer. - Answer-True

During the planning phase of a penetration test, the aim should be to: - Answer-
determine why a penetration test and its associated tasks are necessary.

To verify the integrity of the message when creating a digital signature, the message or
information to be sent is passed through a hashing algorithm that creates a: - Answer-
hash

Which of the following is used to bring trust, integrity, and security to electronic
transactions - Answer-Public key infrastructure

Blocking everything and allowing only what is needed is known as: - Answer-the deny-
all principle.

The environment in which a new facility is constructed has little impact on the level and
type of security needed. - Answer-False

, Which of the following terms refers to the ability to verify that information has not been
altered and has remained in the form originally intended by the creator? - Answer-
Integrity

Robot-controlled workstations that are part of a collection of other robot-controlled
workstations are called - Answer-botnets

The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the
Regional Internet Registries (RIRs) who then: - Answer-delegate resources as needed
to customers, who include Internet service providers (ISPs) and end-user organizations.


The terms algorithm and cipher describe the formula or process used to perform
encryption. - Answer-True

The Address Resolution Protocol (ARP) includes the ability to authenticate the systems
that use it. - Answer-False

A code is a mechanism that relies on the usage of complete words or phrases, whereas
ciphers utilize single letters to perform encryption - Answer-True

An attack in which a service is overwhelmed by traffic preventing or denying its
legitimate use is called a - Answer-denial of service attack

Which password attack method uses long lists of words that have been predefined and
can be quickly downloaded for use to break a password that is a word or a name -
Answer-Dictionary password attack

Public key infrastructure (PKI) addresses storing, managing, distributing, and
maintaining keys and digital certificates securely - Answer-True

What type of encryption uses the same key to encrypt and to decrypt information -
Answer-Symmetric encryption

Which of the following refers to a software program used to determine the path a data
packet traverses to get to a specific IP address - Answer-Traceroute

Which step(s) in the information-gathering process does footprinting cover? - Answer-
Gathering information and determining the network range

A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as the reverse (reverse
lookups) is called: - Answer-Domain Name Service (DNS).

Repeaters, hubs, bridges, and switches are part of: - Answer-Physical or Network
Access Layer equipment

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Perfectscorer Chamberlain College Of Nursng
Follow You need to be logged in order to follow users or courses
Sold
485
Member since
3 year
Number of followers
354
Documents
8849
Last sold
5 days ago

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Read more Read less
3.6

75 reviews

5
27
4
15
3
18
2
5
1
10

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions