ITN 260 Final Exam Study Questions And Accurate
Answers 2024-2025
Which layer of the OSI model does TCP fall under, which is used to provide reliable
transport of data and to establish connections between devices? Answer Transport
Layer
Port-based authentication is a process where different users are authenticated on a
per-switch port basis. Which standard below provides this function? - Answer IEEE
802.1x
A group of physical devices in a network could be logically grouped together without
regard to what network switch they were connected to. ANSWER VLAN
What device works at the Network Layer, layer 3, of the OSI model to route packets
across computer networks? ANSWER Router
TCP/IP is based on its own five-layer architecture comprising Network Interface,
Internet, Control, and Application ANSWER False
What type of cloud computing would a client have the most control over? - Ans Cloud
Infrastructure as a Service
An administrator wishes to track FTP commands sent to a server. Which port should the
administrator be monitoring? - Ans 21
What transport protocol is used by Windows operating systems to allow applications on
other computers to communicate over a LAN? - Ans NetBIOS
, Broadcast storms are unable to happen when making use of loop prevention
technology. Which of the following below can be used to help prevent loops? - Answer
802.1d
DNS poisoning can be prevented using what software below newest edition? - Answer
BIND
When using AES-CCMP, the AES-256 bit key requires how many rounds? - Answer 13
When utilizing EAP request packets, which option listed below is responsible for issuing
those packets? - Answer Authenticator
Because PEAP is vulnerable to some types of attack, Cisco suggests migrating to at
least a safer EAP than PEAP. -Answer: False
Which of the following is not one of four packet types used by EAP? -Answer: Error
The TKIP encryption technology extends the IVs to how many bits in length? -Answer: 48
bits
How could an administrator force wireless clients to use a standard web browser to
deliver information and require a user to accept a usage policy or enter valid login
credentials? Answer Captive portal access point
Which EAP protocol does WPA2 Enterprise support that securely delivers, via a TLS
tunnel, any form of credential for authentication? Answer EAP-FAST
Piconets where the connections are available between various piconets are called a: -
Answer Scatternet
Which encryption protocol below is used in the WPA2 standard? - Answer AES-CCMP
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Easton. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.99. You're not tied to anything after your purchase.