100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITN 261 EXAM QUESTIONS AND CORRECT ANSWERS ALREADY PASSED

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
06-08-2025
Geschreven in
2025/2026

ITN 261 EXAM QUESTIONS AND CORRECT ANSWERS ALREADY PASSED

Instelling
ITN 261
Vak
ITN 261









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ITN 261
Vak
ITN 261

Documentinformatie

Geüpload op
6 augustus 2025
Aantal pagina's
7
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

ITN 261 EXAM QUESTIONS AND
CORRECT ANSWERS ALREADY
PASSED

A hash algorithm can be compromised with a collision, which occurs when two separate
and different messages or inputs pass through the hashing process and generate: -
Answer-the same value

Traceroute is one of the easiest ways to identify the path to a targeted Web site -
Answer-True

The Internet Assigned Numbers Authority (IANA) is responsible for the global
coordination of the Domain Name System (DNS) root, IP addressing, and other Internet
protocol resources - Answer-True

Which of the following refers to the structured and methodical means of investigating,
uncovering, attacking, and reporting on a target system's strengths and vulnerabilities? -
Answer-Penetration testing

Sniffers are useful and problematic at the same time because network traffic that might
include sensitive data can be viewed through the use of a sniffer. - Answer-True

During the planning phase of a penetration test, the aim should be to: - Answer-
determine why a penetration test and its associated tasks are necessary.

To verify the integrity of the message when creating a digital signature, the message or
information to be sent is passed through a hashing algorithm that creates a: - Answer-
hash

Which of the following is used to bring trust, integrity, and security to electronic
transactions - Answer-Public key infrastructure

Blocking everything and allowing only what is needed is known as: - Answer-the deny-
all principle.

The environment in which a new facility is constructed has little impact on the level and
type of security needed. - Answer-False

, Which of the following terms refers to the ability to verify that information has not been
altered and has remained in the form originally intended by the creator? - Answer-
Integrity

Robot-controlled workstations that are part of a collection of other robot-controlled
workstations are called - Answer-botnets

The Internet Assigned Numbers Authority (IANA) delegates Internet resources to the
Regional Internet Registries (RIRs) who then: - Answer-delegate resources as needed
to customers, who include Internet service providers (ISPs) and end-user organizations.


The terms algorithm and cipher describe the formula or process used to perform
encryption. - Answer-True

The Address Resolution Protocol (ARP) includes the ability to authenticate the systems
that use it. - Answer-False

A code is a mechanism that relies on the usage of complete words or phrases, whereas
ciphers utilize single letters to perform encryption - Answer-True

An attack in which a service is overwhelmed by traffic preventing or denying its
legitimate use is called a - Answer-denial of service attack

Which password attack method uses long lists of words that have been predefined and
can be quickly downloaded for use to break a password that is a word or a name -
Answer-Dictionary password attack

Public key infrastructure (PKI) addresses storing, managing, distributing, and
maintaining keys and digital certificates securely - Answer-True

What type of encryption uses the same key to encrypt and to decrypt information -
Answer-Symmetric encryption

Which of the following refers to a software program used to determine the path a data
packet traverses to get to a specific IP address - Answer-Traceroute

Which step(s) in the information-gathering process does footprinting cover? - Answer-
Gathering information and determining the network range

A hierarchical system of servers and services specifically designed to translate IP
addresses into domain names (forward lookups) as well as the reverse (reverse
lookups) is called: - Answer-Domain Name Service (DNS).

Repeaters, hubs, bridges, and switches are part of: - Answer-Physical or Network
Access Layer equipment

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Perfectscorer Chamberlain College Of Nursng
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
485
Lid sinds
3 jaar
Aantal volgers
354
Documenten
8849
Laatst verkocht
5 dagen geleden

Our store offers a wide selection of materials on various subjects and difficulty levels, created by experienced teachers. We specialize on NURSING,WGU,ACLS USMLE,TNCC,PMHNP,ATI and other major courses, Updated Exam, Study Guides and Test banks. If you don't find any document you are looking for in this store contact us and we will fetch it for you in minutes, we love impressing our clients with our quality work and we are very punctual on deadlines. Please go through the sets description appropriately before any purchase and leave a review after purchasing so as to make sure our customers are 100% satisfied. I WISH YOU SUCCESS IN YOUR EDUCATION JOURNEY

Lees meer Lees minder
3,6

75 beoordelingen

5
27
4
15
3
18
2
5
1
10

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen