CSCI 4629 MIDTERM EXAM 2025/2026 WITH
100% ACCURATE ANSWERS
1. Discuss why TFTP is considered an insecure protocol in the context of
network security.
TFTP is secure for transferring configurations.
TFTP is only insecure when used with port 22.
TFTP lacks encryption and authentication, making it vulnerable
to interception and unauthorized access.
TFTP is secure because it uses TCP.
2. Discuss how encrypted traffic can impact the functionality of packet
filtering firewalls.
Encrypted traffic can obscure packet headers, making it
difficult for firewalls to apply filtering rules effectively.
Encrypted traffic is always blocked by firewalls.
Encrypted traffic is processed faster by firewalls than
unencrypted traffic.
Firewalls do not need to inspect encrypted traffic.
3. Describe how a microwave oven can affect the performance of an
802.11g wireless network.
A microwave oven operates on a different frequency than
802.11g, causing no interference.
A microwave oven can emit electromagnetic interference that
disrupts the 2.4 GHz frequency used by 802.11g networks.
,A microwave oven enhances the signal strength of wireless
networks.
A microwave oven can only affect wired networks, not wireless.
,4. Alicìa is having trouble browsing the Internet on the wireless network
from the employee lunchroom on her lunch break. You check her
connection, and it appears that the connection works for a few minutes
but then disconnects. The NIC settings show the correct IP address and
Wi-Fi settings, but you continue to see the up/down on the connection.
Which of the following could best explain why Alicìa is having
problems?
The wireless NIC is broken.
The microwave in the lunchroom is causing interference.
The WAP is configured wrong.
The computer OS needs upgrades.
5. If your corporate network is experiencing frequent malware attacks,
which device would you implement to enhance security and why?
Router, because it manages traffic flow effectively.
Web security gateway, because it provides content filtering
and virus defense.
Switch, because it connects multiple devices in the network.
Firewall, because it blocks unauthorized access without filtering
content.
6. You are responsible for network security at Acme Company. Users have
been reporting that personal data is being stolen when using the
wireless network. They all insist they only connect to the corporate
wireless access point (WAP). However, logs for the WAP show that users
have not connected to it. Which of the following could best explain this
situation?
Rogue Access Point
Clickjacking
, Session Hijacking
Bluejacking
7. A perimeter survey finds that the wireless network within a facility is
easily reachable outside of the physical perimeter. Which of the
following should be adjusted to mitigate this risk?
Power level controls
CCMP
MAC filter
SSID broadcast
8. Describe the primary function of an Intrusion Prevention System (IPS) in
network security.
An IPS creates virtual networks to separate traffic.
An IPS monitors network traffic for suspicious activity and
takes action to block or prevent potential intrusions.
An IPS encrypts data to secure it during transmission.
An IPS manages user access to network resources.
9. Describe the implications of a rogue access point in a corporate
network environment.
A rogue access point is a tool used for monitoring network
traffic.
A rogue access point improves network performance by
increasing bandwidth.
A rogue access point can allow unauthorized users to connect
to the network, potentially leading to data breaches and
security vulnerabilities.
100% ACCURATE ANSWERS
1. Discuss why TFTP is considered an insecure protocol in the context of
network security.
TFTP is secure for transferring configurations.
TFTP is only insecure when used with port 22.
TFTP lacks encryption and authentication, making it vulnerable
to interception and unauthorized access.
TFTP is secure because it uses TCP.
2. Discuss how encrypted traffic can impact the functionality of packet
filtering firewalls.
Encrypted traffic can obscure packet headers, making it
difficult for firewalls to apply filtering rules effectively.
Encrypted traffic is always blocked by firewalls.
Encrypted traffic is processed faster by firewalls than
unencrypted traffic.
Firewalls do not need to inspect encrypted traffic.
3. Describe how a microwave oven can affect the performance of an
802.11g wireless network.
A microwave oven operates on a different frequency than
802.11g, causing no interference.
A microwave oven can emit electromagnetic interference that
disrupts the 2.4 GHz frequency used by 802.11g networks.
,A microwave oven enhances the signal strength of wireless
networks.
A microwave oven can only affect wired networks, not wireless.
,4. Alicìa is having trouble browsing the Internet on the wireless network
from the employee lunchroom on her lunch break. You check her
connection, and it appears that the connection works for a few minutes
but then disconnects. The NIC settings show the correct IP address and
Wi-Fi settings, but you continue to see the up/down on the connection.
Which of the following could best explain why Alicìa is having
problems?
The wireless NIC is broken.
The microwave in the lunchroom is causing interference.
The WAP is configured wrong.
The computer OS needs upgrades.
5. If your corporate network is experiencing frequent malware attacks,
which device would you implement to enhance security and why?
Router, because it manages traffic flow effectively.
Web security gateway, because it provides content filtering
and virus defense.
Switch, because it connects multiple devices in the network.
Firewall, because it blocks unauthorized access without filtering
content.
6. You are responsible for network security at Acme Company. Users have
been reporting that personal data is being stolen when using the
wireless network. They all insist they only connect to the corporate
wireless access point (WAP). However, logs for the WAP show that users
have not connected to it. Which of the following could best explain this
situation?
Rogue Access Point
Clickjacking
, Session Hijacking
Bluejacking
7. A perimeter survey finds that the wireless network within a facility is
easily reachable outside of the physical perimeter. Which of the
following should be adjusted to mitigate this risk?
Power level controls
CCMP
MAC filter
SSID broadcast
8. Describe the primary function of an Intrusion Prevention System (IPS) in
network security.
An IPS creates virtual networks to separate traffic.
An IPS monitors network traffic for suspicious activity and
takes action to block or prevent potential intrusions.
An IPS encrypts data to secure it during transmission.
An IPS manages user access to network resources.
9. Describe the implications of a rogue access point in a corporate
network environment.
A rogue access point is a tool used for monitoring network
traffic.
A rogue access point improves network performance by
increasing bandwidth.
A rogue access point can allow unauthorized users to connect
to the network, potentially leading to data breaches and
security vulnerabilities.