Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

ITN 260 Final Exam Study Guide with Complete Solutions

Puntuación
-
Vendido
-
Páginas
30
Grado
A+
Subido en
06-10-2024
Escrito en
2024/2025

ITN 260 Final Exam Study Guide with Complete Solutions True or False: TCP is responsible for addressing packets and sending them on the correct route to the destination , while IP is responsible for reliable packet transmission. - Answer-False True or False: TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport, and Application - Answer-False True or False: IEEE 802.1x is commonly used on wireless networks - Answer-True True or False: IP telephony and Voice over IP (VoIP) are identical - Answer-False True or False: Despite its promise to dramatically impact IT, cloud computing raises significant security concerns - Answer-True What protocol suite below is the most commonly used protocol for local area network (LAN) communication - Answer-TCP/IP EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 2/30 At what level of the OSI model does the IP protocol function - Answer-Network Layer Which layer of the OSI model contains TCP protocol, which is used for establishing connections and reliable data transport between devices - Answer-Transport Layer The capability for devices to exchange low-level control messages is provided by what protocol below? - Answer-ICMP When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an agent? - Answer-community string Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a database consisting of an organized hierarchy tree - Answer-DNS DNS poisoning can be prevented using the latest edition of what software below? - Answer-BIND An administrator needs to examine FTP commands being passed to a server, what pro should the administrator be monitoring?1 - Answer-21 What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across computer networks - Answer-router The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood attacks: - Answer-flood guard Broadcast storms can be prevented by using loop prevention technology. which item be used to help prevent loops - Answer-802.1d EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 3/30 How can a network pf physical devices be grouped into logical units, regardless of what network switches they may be connected to? - Answer-VLAN Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of what standard below? - Answer-IEEE 802.1x Which of th three Cloud computing service models allows a customer to access software provided by a vendor using a web browser, without any installation, configuration, upgrading, or management from the user? - Answer-Cloud Software as a Service When setting up a server virtualization environment, what component below manages the ritual machine operation systems and supports one or more guest systems - Answer-hypervisor In what type of cloud computing does the customer have the highest level of control? - Answer- Cloud Infrastructure as a Service What MAC limiting configuration setting allows for MAC addresses to be automatically learned and stored along with any addresses that were learned prior to using the configuration setting - Answer- Dynamic Which of the following is not a benefit that can be provided by using IP telephony - Answer- Decreased network utilization What is the term used for a device that requests permission form an authenticator to join a network - Answer-supplicant What transport protocol is used by windows operating systems to allow applications of separate computer to communicate over LAN - Answer-NetBIOS EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 4/30 Bluejacking - Answer-An attack that sends unsolicited messages to Bluetooth-enabled devices. Bluesnarfing - Answer-An attack that accesses unauthorized information from a wireless device through a Bluetooth connection. Bluetooth - Answer-A wireless technology that uses short-range radio frequency (RF) transmissions and provides rapid ad hoc device pairings. Captive portal AP - Answer-An infrastructure that is used on public access WLANs to provide a higher degree of security. Challenge-Handshake Authentication Protocol (CHAP) - Answer-A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP). Counter Mode with Cipher Block Chaining Message Authentication Code Protocol (CCMP) - Answer- The encryption protocol used for WPA2 that specifies the use of a general-purpose cipher mode algorithm providing data privacy with AES. Evil twin - Answer-An AP set up by an attacker to mimic an authorized AP and capture transmissions, so a user's device will unknowingly connect to this evil twin instead of the authorized AP. Extensible Authentication Protocol (EAP) - Answer-A framework for transporting authentication protocols that defines the format of the messages. Initialization vector (IV) - Answer-A 24-bit value used in WEP that changes each time a packet is encrypted. EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED FIRST PUBLISH SEPTEMBER 2024 Page 5/30 Lightweight EAP (LEAP) - Answer-A proprietary EAP method developed by Cisco Systems requiring mutual authentication used for WLAN encryption using Cisco client software. Media Access Control (MAC) address filtering - Answer-A method for controlling access to a WLAN based on the device's MAC address. Near field communication (NFC) - Answer-A set of standards primarily for smartphones and smart cards that can be used to establish communication between devices in close proximity. Password Authentication Protocol (PAP) - Answer-A weak authentication protocol that has been replaced by the Extensible Authentication Protocol (EAP). Preshared key (PSK) - Answer-The authentication model used in WPA that requires a secret key value to be entered into the AP and all wireless devices prior to communicating.

Mostrar más Leer menos
Institución
ITN
Grado
ITN

Vista previa del contenido

EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024




ITN 260 Final Exam Study Guide with
Complete Solutions

True or False:


TCP is responsible for addressing packets and sending them on the correct route to the destination ,

while IP is responsible for reliable packet transmission. - Answer✔✔-False


True or False:


TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport,

and Application - Answer✔✔-False


True or False:


IEEE 802.1x is commonly used on wireless networks - Answer✔✔-True


True or False:


IP telephony and Voice over IP (VoIP) are identical - Answer✔✔-False


True or False:


Despite its promise to dramatically impact IT, cloud computing raises significant security concerns -

Answer✔✔-True


What protocol suite below is the most commonly used protocol for local area network (LAN)

communication - Answer✔✔-TCP/IP



Page 1/30

,EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024


At what level of the OSI model does the IP protocol function - Answer✔✔-Network Layer


Which layer of the OSI model contains TCP protocol, which is used for establishing connections and

reliable data transport between devices - Answer✔✔-Transport Layer


The capability for devices to exchange low-level control messages is provided by what protocol below? -

Answer✔✔-ICMP


When using SNMPv1 or SNMPv2,what piece of information is needed to view information form an

agent? - Answer✔✔-community string


Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP address using a

database consisting of an organized hierarchy tree - Answer✔✔-DNS


DNS poisoning can be prevented using the latest edition of what software below? - Answer✔✔-BIND


An administrator needs to examine FTP commands being passed to a server, what pro should the

administrator be monitoring?1 - Answer✔✔-21


What device operates at the Network Layer (layer 3) of the OSI model and forwards packets across

computer networks - Answer✔✔-router


The deployment of this technology below can be used as a defense against DoS and DDoS SYN flood

attacks: - Answer✔✔-flood guard


Broadcast storms can be prevented by using loop prevention technology. which item be used to help

prevent loops - Answer✔✔-802.1d




Page 2/30

, EMILLYCHARLOTTE 2024/2025 ACADEMIC YAER ©2024 EMILLYCHARLOTTE. ALL RIGHTS RESERVED
FIRST PUBLISH SEPTEMBER 2024


How can a network pf physical devices be grouped into logical units, regardless of what network

switches they may be connected to? - Answer✔✔-VLAN


Port-based authentication,in which users are authenticated on a per-switch pro basis, is a function of

what standard below? - Answer✔✔-IEEE 802.1x


Which of th three Cloud computing service models allows a customer to access software provided by a

vendor using a web browser, without any installation, configuration, upgrading, or management from

the user? - Answer✔✔-Cloud Software as a Service


When setting up a server virtualization environment, what component below manages the ritual

machine operation systems and supports one or more guest systems - Answer✔✔-hypervisor


In what type of cloud computing does the customer have the highest level of control? - Answer✔✔-

Cloud Infrastructure as a Service


What MAC limiting configuration setting allows for MAC addresses to be automatically learned and

stored along with any addresses that were learned prior to using the configuration setting - Answer✔✔-

Dynamic


Which of the following is not a benefit that can be provided by using IP telephony - Answer✔✔-

Decreased network utilization


What is the term used for a device that requests permission form an authenticator to join a network -

Answer✔✔-supplicant


What transport protocol is used by windows operating systems to allow applications of separate

computer to communicate over LAN - Answer✔✔-NetBIOS


Page 3/30

Escuela, estudio y materia

Institución
ITN
Grado
ITN

Información del documento

Subido en
6 de octubre de 2024
Número de páginas
30
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
EmillyCharlotte Howard Community College
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
121
Miembro desde
1 año
Número de seguidores
5
Documentos
12300
Última venta
7 horas hace
ALL-MAJOR.

On this page, you find all documents, package deals, and flashcards offered by seller Emilly Charlotte.

3.4

26 reseñas

5
8
4
8
3
2
2
3
1
5

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes