ITN 260 Final Exam | 246 Questions and Answers(A+ Solution guide)
True or False: TCP is responsible for addressing packets and sending them on the correct route to the destination , while IP is responsible for reliable packet transmission. - False True or False: TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application - False True or False: IEEE 802.1x is commonly used on wireless networks -True True or False: IP telephony and Voice over IP (VoIP) are identical - False True or False: Despite its promise to dramatically impact IT, cloud computing raises significant security concerns - True What protocol suite below is the most commonly used protocol for local area network (LAN) communication - TCP/IP At what level of the OSI model does the IP protocol function - Network Layer Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices - Transport Layer The capability for devices to exchange low-level control messages is provided by what protocol below? - ICMPWhen using SNMPv1 or SNMPv2,what piece of information is needed to view information form an agent? - community string Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree - DNS DNS poisoning can be prevented using the latest edition of what software below? - BIND An administrator needs to examine FTP commands being passed to a server, what pro should the administrator be monitoring?1 - 21 What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks - router The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks: - flood guard Broadcast storms can be prevented by using loop prevention technology. which item be used to help prevent loops - 802.1d How can a network pf physical devices be grouped into logical units, regardless of what network switches they may be connected to? - VLAN Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of what standard below? -IEEE 802.1x Which of th three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user? - Cloud Software as a ServiceWhen setting up a server virtualization environment, what component below manages the ritual machine operation systems and supports one or more guest systems - hypervisor
Written for
- Institution
- ITN 260
- Course
- ITN 260
Document information
- Uploaded on
- September 18, 2023
- Number of pages
- 26
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
Also available in package deal