ITN 262 MIDTERM EXAM
QUESTIONS WITH COMPLETE
A+ SOLUTIONS
Which basic principle is most closely associated with the troubles that a buffer overflow
can cause? - Answer-Chain of control
In a wireless transmission, a host first sends - Answer-An RTS Message
True or False? When a host detects a collision, it waits 0.25 seconds, then sends its
packet again. - Answer-false
Primary forms of Ethernet media include the following, except: - Answer-nano
True or False? Worms can be spread through means other than direct network access.
- Answer-true
True or False? A distinction of packet switching is that each packet can take its own
route. - Answer-true
A network host does the following:
- Accepts service requests from one or more other hosts
- Accepts responses from specific service queries that it has sent
Which of the following is the host behaving as? - Answer-Client
True or False? A disadvantage of circuit switching is the amount of delay between each
party. - Answer-false
Bob wants to send and receive packets reliably without ever worrying about duplicate
packets. He has set up a protocol that never sends multiple packets at once—it always
waits for the previous packet's ACK before it transmits the next packet. Will this work? -
Answer-No, transmission will stop as soon as a packet is lost
True or False? A disadvantage of message switching is that the message is divided
along its journey. - Answer-false
True or False? When operating correctly, a receiver should wait for "just one more
packet" before sending an ACK. - Answer-false
True or False? Each site's router contains the complete path followed by every packet
arriving at that site - Answer-false
, True or False? Network address translation (NAT) prevents hosts on a LAN from
sharing the global IP address assigned by the ISP. - Answer-false
Why does nmap pose a risk when scanning a host or network? - Answer-It sends
numerous messages to hosts and networks, which could interfere with more important
network traffic.
Here is a list of features appearing in a low-cost commercial gateway. Which feature is
most important in order to use private IP addresses? - Answer-Network Address
Translation
True or False? A router changes everything past the IP header. - Answer-false
True or False? The internet layer of every such protocol stack contains a routing table
that chooses a network and/or MAC address for the outgoing packet. - Answer-true
TCP and UDP are purely ___________ protocols. - Answer-end to end
True or False. IP provides global addressing for Internet hosts - Answer-True
Which if the following is not one of the stages that TCP connections go through? -
Answer-Error reporting
True or False? Though vulnerabilities exist, most DNS transactions take place without
trouble or interference. - Answer-True
We are implementing a server with off-line authentication. What is included in the
security boundary? - Answer-The server itself, which does not include an authentication
database
We are implementing a server with direct authentication. What is included in the security
boundary? - Answer-The server itself, including its credential checking mechanism and
the authentication database
True or False? The point of DNS redundancy is to provide other servers that can be
contacted in the event the main server goes down. - Answer-True
True or False? Randomized request are a part of the DNS Security Improvements. -
Answer-true
We are implementing a product with local authentication on the device. What is included
in the security boundary? - Answer-Everything from the point where the credential is
entered to the checking mechanism and the authentication database
QUESTIONS WITH COMPLETE
A+ SOLUTIONS
Which basic principle is most closely associated with the troubles that a buffer overflow
can cause? - Answer-Chain of control
In a wireless transmission, a host first sends - Answer-An RTS Message
True or False? When a host detects a collision, it waits 0.25 seconds, then sends its
packet again. - Answer-false
Primary forms of Ethernet media include the following, except: - Answer-nano
True or False? Worms can be spread through means other than direct network access.
- Answer-true
True or False? A distinction of packet switching is that each packet can take its own
route. - Answer-true
A network host does the following:
- Accepts service requests from one or more other hosts
- Accepts responses from specific service queries that it has sent
Which of the following is the host behaving as? - Answer-Client
True or False? A disadvantage of circuit switching is the amount of delay between each
party. - Answer-false
Bob wants to send and receive packets reliably without ever worrying about duplicate
packets. He has set up a protocol that never sends multiple packets at once—it always
waits for the previous packet's ACK before it transmits the next packet. Will this work? -
Answer-No, transmission will stop as soon as a packet is lost
True or False? A disadvantage of message switching is that the message is divided
along its journey. - Answer-false
True or False? When operating correctly, a receiver should wait for "just one more
packet" before sending an ACK. - Answer-false
True or False? Each site's router contains the complete path followed by every packet
arriving at that site - Answer-false
, True or False? Network address translation (NAT) prevents hosts on a LAN from
sharing the global IP address assigned by the ISP. - Answer-false
Why does nmap pose a risk when scanning a host or network? - Answer-It sends
numerous messages to hosts and networks, which could interfere with more important
network traffic.
Here is a list of features appearing in a low-cost commercial gateway. Which feature is
most important in order to use private IP addresses? - Answer-Network Address
Translation
True or False? A router changes everything past the IP header. - Answer-false
True or False? The internet layer of every such protocol stack contains a routing table
that chooses a network and/or MAC address for the outgoing packet. - Answer-true
TCP and UDP are purely ___________ protocols. - Answer-end to end
True or False. IP provides global addressing for Internet hosts - Answer-True
Which if the following is not one of the stages that TCP connections go through? -
Answer-Error reporting
True or False? Though vulnerabilities exist, most DNS transactions take place without
trouble or interference. - Answer-True
We are implementing a server with off-line authentication. What is included in the
security boundary? - Answer-The server itself, which does not include an authentication
database
We are implementing a server with direct authentication. What is included in the security
boundary? - Answer-The server itself, including its credential checking mechanism and
the authentication database
True or False? The point of DNS redundancy is to provide other servers that can be
contacted in the event the main server goes down. - Answer-True
True or False? Randomized request are a part of the DNS Security Improvements. -
Answer-true
We are implementing a product with local authentication on the device. What is included
in the security boundary? - Answer-Everything from the point where the credential is
entered to the checking mechanism and the authentication database