100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

ITN 262 FINAL EXAM WITH COMPLETE SOLUTIONS 100% GUARANTEE PASS

Rating
-
Sold
-
Pages
19
Grade
A+
Uploaded on
10-10-2024
Written in
2024/2025

ITN 262 FINAL EXAM WITH COMPLETE SOLUTIONS 100% GUARANTEE PASS How does DNS cache poisoning work? - Answer- b) The attacker transmits bogus DNS responses to the victim, or the victim's DNS server, containing the bogus information. How have DDOS attacks affected DNS and hosts that rely on it? Select all that apply. - Answer- b) DDOS attacks on DNS servers for specific hosts have made it difficult for some users to reach those hosts. a) Partially successful attacks on root DNS servers have had little effect on Internet traffic. d) Botnets may have been used in some DNS DDOS attacks. True or False? Randomized request are a part of the DNS Security Improvements. - Answer- True True or False? Though vulnerabilities exist, most DNS transactions take place without trouble or interference. - Answer- True DNS security improvements include which of the following? Select all that apply. - Answer- d) Limited access to resolvers c) Distributed DNS servers b) Randomized requests A firewall gateway for a household or small business LAN contains several of the following features. Select all that appear in a typical gateway. - Answer- c) DHCP protocol b) Share a single IP address assigned by the ISP among multiple hosts inside the network A simple gateway as described in Section 12.4 can filter on a variety of packet contents. Select all types of packets listed below that a simple gateway can filter. - Answer- e) Broadcasts c) ICMP d) IP addresses b) Web traffic True or False? The purpose of a gateway firewall is to block potentially hostile traffic from reaching the internal LAN. - Answer- True

Show more Read less
Institution
ITN 262
Course
ITN 262










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ITN 262
Course
ITN 262

Document information

Uploaded on
October 10, 2024
Number of pages
19
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

ITN 262 FINAL EXAM WITH COMPLETE
SOLUTIONS 100% GUARANTEE PASS

How does DNS cache poisoning work? - Answer- b) The attacker transmits bogus DNS
responses to the victim, or the victim's DNS server, containing the bogus information.

How have DDOS attacks affected DNS and hosts that rely on it? Select all that apply. -
Answer- b) DDOS attacks on DNS servers for specific hosts have made it difficult for
some users to reach those hosts.
a) Partially successful attacks on root DNS servers have had little effect on Internet
traffic.
d) Botnets may have been used in some DNS DDOS attacks.

True or False? Randomized request are a part of the DNS Security Improvements. -
Answer- True

True or False? Though vulnerabilities exist, most DNS transactions take place without
trouble or interference. - Answer- True

DNS security improvements include which of the following? Select all that apply. -
Answer- d) Limited access to resolvers
c) Distributed DNS servers
b) Randomized requests

A firewall gateway for a household or small business LAN contains several of the
following features. Select all that appear in a typical gateway. - Answer- c) DHCP
protocol
b) Share a single IP address assigned by the ISP among multiple hosts inside the
network

A simple gateway as described in Section 12.4 can filter on a variety of packet contents.
Select all types of packets listed below that a simple gateway can filter. - Answer- e)
Broadcasts
c) ICMP
d) IP addresses
b) Web traffic

True or False? The purpose of a gateway firewall is to block potentially hostile traffic
from reaching the internal LAN. - Answer- True

,True or False? Hosts behind a network address translation (NAT) gateway are typically
assigned local IP addresses. - Answer- True

Packet filtering looks at any packet header and filters on all of the following values,
except: - Answer- a) email address.

We are implementing a product with local authentication on the device. What is included
in the security boundary? - Answer- a) Everything from the point where the credential is
entered to the checking mechanism and the authentication database

We need to implement services on several servers, and we wish to use the same login
credentials for all of them. Which authentication patterns are most effective for this?
Select all that apply. - Answer- c) Indirect authentication
d) Off-line authentication

Which authentication pattern may be implemented with no cryptography at all? -
Answer- a) Local authentication

We are implementing a server with direct authentication. What is included in the security
boundary? - Answer- b) The server itself, including its credential checking mechanism
and the authentication database

We are implementing a server with off-line authentication. What is included in the
security boundary? - Answer- d) The server itself, which does not include an
authentication database

Which authentication pattern requires public-key cryptography? - Answer- d) Off-line
authentication

A network's topology refers to the structure of its: - Answer- b) connections.

Modern internet technology evolved from research on: - Answer- d) the ARPANET.

Highway systems of driveways, local roads, and national roads are networks for
automobiles, much like the internet is a network for data traffic. Both types of network
share some similarities. Select the most appropriate similarities from those listed below.
- Answer- d) The networks may be used for private, public service, and commercial
traffic.
c) There is no single organization responsible for all network elements.
b) The networks connect their elements across many different types of links.

The ______ was carefully designed so that the network protocols worked seamlessly
across a broad range of computing equipment. - Answer- ARPANET

A router is traditionally called a(n) ________. - Answer- gateway

, True or False? The internet layer of every such protocol stack contains a routing table
that chooses a network and/or MAC address for the outgoing packet. - Answer- True

True or False? A router changes everything past the IP header. - Answer- False

Which of the following explanations of how packet addresses are used during routing is
most accurate? - Answer- b) The packet's destination IP address is used to select the
packet's next MAC address.

True or False? When internet technology connects two networks with separate link
layers together, each individual network is called a subnet. - Answer- True

True or False? The time to live (TTL) field in an IP header counts the number of hops a
packet takes through routers on its way to its destination. - Answer- True

True or False? Each site's router contains the complete path followed by every packet
arriving at that site. - Answer- False

Internet routing: - Answer- c) makes routing decisions one at a time as a packet crosses
individual networks.

Routing devices on the early ARPANET were called: - Answer- b) IMPs.

Handles a cluster of networks, usually for paying customers - Answer- Internet Service
Provider (ISP)

Establishes protocol standards used on the internet - Answer- Internet Engineering
Task Force (IETF)

Organizes the internet into clusters of networks for routing - Answer- Autonomous
system (AS)

Routes network traffic between ASes - Answer- Border routers

An autonomous system (AS): - Answer- b) uses border routers to connect one AS to
another.
a) handles two types of routing: interior and exterior.

Each _______ is essentially a(n) _______ that handles routing between its networking
customers. - Answer- AS; ISP

True or False? Exterior routing relies on interior routers. - Answer- False

Which interface provides a well-known way of addressing hosts and processes on a
computer and of writing client or server software? - Answer- Socket interface

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Scholarsstudyguide nursing
Follow You need to be logged in order to follow users or courses
Sold
780
Member since
3 year
Number of followers
475
Documents
15153
Last sold
3 days ago
NURSING

Here you will find everything you need in nursing Assignments, EXAMS AND TESTBANKS. For students who want to see results twice as fast. I strive for my content to be of the highest quality. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.

3,9

163 reviews

5
87
4
21
3
25
2
6
1
24

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions