100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4,6 TrustPilot
logo-home
Exam (elaborations)

IT 640 -- Final Exam Questions Answered Correctly Latest Update

Rating
-
Sold
-
Pages
9
Grade
A+
Uploaded on
08-08-2025
Written in
2025/2026

IT 640 -- Final Exam Questions Answered Correctly Latest Update certification authority - Answers__________ binds public key to particular entity confidentiality, integrity, and authenication - AnswersWhat are the three things SSL provided? SSL - Answers______ provides application programming interface (API) to applications handshake - Answers__________ Alice and Bob use their certificates, private keys to authenticate each other and exchange shared secret key derivation - Answers__________ Alice and Bob use shared secret to derive set of keys data transfer - Answers__________ data to be transferred is broken up into series of records connection closure - Answers__________ special messages to securely close connection DES, 3DES, RC2, RC4 - AnswersWhat are the four common SSL symmetric ciphers? server authentication, agree on crypto algorithms, establish keys, and client authentication - AnswersWhat are the four purposes for a SSL handshake? data integrity, origin authentication, replay attack prevention, and confidentiality - AnswersWhat are four IPsec Servics? Authentication Header Protocol - Answers_________ provides source authentication & data integrity but not confidentiality Encapsulation Security Protocol - Answers_________ provides source authentication, data integrity, and confidentiality security association database - Answersendpoint holds SA state in ________________, where it can locate them during processing. security association - Answersbefore sending data, _____________ established from sending to receiving entity extensible authentication protocol - Answers_______________ end-end client (mobile) to authentication server protocol stateless packet filters, stateful packet filters, and application gateways - AnswersWhats are three types of firewalls? Stateless packet filtering - Answers_____________ internal network connected to Internet via router firewall. Access Control Lists - Answers_____________ table of rules, applied top to bottom to incoming packets: (action, condition) pairs stateful packet filter - Answers___________ track status of every TCP connection application gateways - Answers___________ filters packets on application data as well as on IP/TCP/UDP fields. Node - AnswersWhat is a host and routers? Links - AnswersCommunication channels that connect adjacent nodes along communication path is called? Wired link, Wireless Link, and LAN's - AnswersWhat are the three types of Links? data-link layer - Answers___________ has responsibility of transferring data gram from one node to physically adjacent node over a link. Framing Link Access - Answers___________ encapsulate datagram into frame, adding header, trailer and channel access if shared medium and a MAC addresses used in frame headers to identify source/dest.

Show more Read less
Institution
IT 640
Course
IT 640









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
IT 640
Course
IT 640

Document information

Uploaded on
August 8, 2025
Number of pages
9
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

IT 640 -- Final Exam Questions Answered Correctly Latest Update 2025-2026

certification authority - Answers__________ binds public key to particular entity

confidentiality, integrity, and authenication - AnswersWhat are the three things SSL provided?

SSL - Answers______ provides application programming interface (API) to applications

handshake - Answers__________ Alice and Bob use their certificates, private keys to authenticate
each other and exchange shared secret

key derivation - Answers__________ Alice and Bob use shared secret to derive set of keys

data transfer - Answers__________ data to be transferred is broken up into series of records

connection closure - Answers__________ special messages to securely close connection

DES, 3DES, RC2, RC4 - AnswersWhat are the four common SSL symmetric ciphers?

server authentication, agree on crypto algorithms, establish keys, and client authentication -
AnswersWhat are the four purposes for a SSL handshake?

data integrity, origin authentication, replay attack prevention, and confidentiality - AnswersWhat
are four IPsec Servics?

Authentication Header Protocol - Answers_________ provides source authentication & data
integrity but not confidentiality

Encapsulation Security Protocol - Answers_________ provides source authentication, data
integrity, and confidentiality

security association database - Answersendpoint holds SA state in ________________, where it
can locate them during processing.

security association - Answersbefore sending data, _____________ established from sending to
receiving entity

extensible authentication protocol - Answers_______________ end-end client (mobile) to
authentication server protocol

stateless packet filters, stateful packet filters, and application gateways - AnswersWhats are
three types of firewalls?

Stateless packet filtering - Answers_____________ internal network connected to Internet via
router firewall.

Access Control Lists - Answers_____________ table of rules, applied top to bottom to incoming
packets: (action, condition) pairs

, stateful packet filter - Answers___________ track status of every TCP connection

application gateways - Answers___________ filters packets on application data as well as on
IP/TCP/UDP fields.

Node - AnswersWhat is a host and routers?

Links - AnswersCommunication channels that connect adjacent nodes along communication
path is called?

Wired link, Wireless Link, and LAN's - AnswersWhat are the three types of Links?

data-link layer - Answers___________ has responsibility of transferring data gram from one node
to physically adjacent node over a link.

Framing Link Access - Answers___________ encapsulate datagram into frame, adding header,
trailer and channel access if shared medium and a MAC addresses used in frame headers to
identify source/dest.

Framing, Reliabe Delivery, Flow Control, Error Detection, Error Correction, and Half Duplex and
Full Duplex - AnswersWhat are the seven link layer services?

In each and every host and a NIC or on a chip. - AnswersWhere is the link layer implemented?

Encapsulates datagram and adds error checking bits - AnswersHow do the adaptors
communicate?

No - AnswersIs Error detection 100% reliable?

Single Bit Parity - Answers__________ detect single bit errors

Two-Dimensional Bit Parity - Answers_________ detect and correct single bit errors

Cycle Redundancy Check - Answers___________ more powerful error-detection coding

Point to Point and Broadcast - AnswersWhat are the two types of link?

Multiple Access Protocol - Answers_____________ distributed algorithm that determines how
nodes share channel and determine when node can transmit and communication about channel
sharing must use channel itself.

Single Shared broadcast channel and two or more simultaneous transmissions - AnswersWhat
are the two types of Multiple Access Controls?

Collision - Answers__________ if node receives two or more signals at the same time

Channel Partitioning, Random Access and Taking Turns - AnswersWhat are the three broad
classes of MAC protocols?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
Follow You need to be logged in order to follow users or courses
Sold
361
Member since
1 year
Number of followers
16
Documents
29373
Last sold
1 day ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3,6

58 reviews

5
20
4
15
3
12
2
0
1
11

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can immediately select a different document that better matches what you need.

Pay how you prefer, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card or EFT and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions