100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
ITN 260 Final Exam Questions and Correct Answers | Latest Updat $13.49   Add to cart

Exam (elaborations)

ITN 260 Final Exam Questions and Correct Answers | Latest Updat

 0 view  0 purchase
  • Course
  • ITN
  • Institution
  • ITN

TCP is responsible for addressing packets and sending them on the correct route to the destination , while IP is responsible for reliable packet transmission.  False True or False: TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control, Transport, an...

[Show more]

Preview 4 out of 42  pages

  • October 4, 2024
  • 42
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • ITN
  • ITN
avatar-seller
Apluss
1 | P a g e | © copyright 2024/2025 | Grade A+



ITN 260 Final Exam Questions and
Correct Answers | Latest Update
True or False:

TCP is responsible for addressing packets and sending them on the correct route to the

destination , while IP is responsible for reliable packet transmission.

 False



True or False:

TCP/IP uses it own Five-layer architecture that includes Network Interface, Internet, Control,

Transport, and Application

 False



True or False:

IEEE 802.1x is commonly used on wireless networks

 True



True or False:

IP telephony and Voice over IP (VoIP) are identical

 False



True or False:

Despite its promise to dramatically impact IT, cloud computing raises significant security

concerns

 True



Master01 | September, 2024/2025 | Latest update

, 1 | P a g e | © copyright 2024/2025 | Grade A+

What protocol suite below is the most commonly used protocol for local area network (LAN)

communication

 TCP/IP



At what level of the OSI model does the IP protocol function

 Network Layer



Which layer of the OSI model contains TCP protocol, which is used for establishing connections

and reliable data transport between devices

 Transport Layer



The capability for devices to exchange low-level control messages is provided by what

protocol below?

 ICMP



When using SNMPv1 or SNMPv2,what piece of information is needed to view information

form an agent?

 community string



Select below the TCP/IP protocol that resolves a symbolic name to its corresponding IP

address using a database consisting of an organized hierarchy tree

 DNS



DNS poisoning can be prevented using the latest edition of what software below?

 BIND

Master01 | September, 2024/2025 | Latest update

, 1 | P a g e | © copyright 2024/2025 | Grade A+



An administrator needs to examine FTP commands being passed to a server, what pro should

the administrator be monitoring?1

 21



What device operates at the Network Layer (layer 3) of the OSI model and forwards packets

across computer networks

 router



The deployment of this technology below can be used as a defense against DoS and DDoS

SYN flood attacks:

 flood guard



Broadcast storms can be prevented by using loop prevention technology. which item be used

to help prevent loops

 802.1d



How can a network pf physical devices be grouped into logical units, regardless of what

network switches they may be connected to?

 VLAN



Port-based authentication,in which users are authenticated on a per-switch pro basis, is a

function of what standard below?

 IEEE 802.1x




Master01 | September, 2024/2025 | Latest update

, 1 | P a g e | © copyright 2024/2025 | Grade A+

Which of th three Cloud computing service models allows a customer to access software

provided by a vendor using a web browser, without any installation, configuration, upgrading,

or management from the user?

 Cloud Software as a Service



When setting up a server virtualization environment, what component below manages the

ritual machine operation systems and supports one or more guest systems

 hypervisor



In what type of cloud computing does the customer have the highest level of control?

 Cloud Infrastructure as a Service



What MAC limiting configuration setting allows for MAC addresses to be automatically

learned and stored along with any addresses that were learned prior to using the

configuration setting

 Dynamic



Which of the following is not a benefit that can be provided by using IP telephony

 Decreased network utilization



What is the term used for a device that requests permission form an authenticator to join a

network

 supplicant




Master01 | September, 2024/2025 | Latest update

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Apluss. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

78834 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.49
  • (0)
  Add to cart