Preview

NTC 360 Final Exam Answers

Powerful Essays
Open Document
Open Document
817 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
NTC 360 Final Exam Answers
NTC 360 Final Exam

True/False
Indicate whether the statement is true or false.

____F 1. The frame’s destination address of a broadcast frame is a value of all binary 0s.

____T 2. Class A addresses are intended for use by large corporations and governments.

____F 3. 1000BaseT, released as the 802.3ab standard in June 1999, supports Gigabit Ethernet over 100-meter segments of balanced Category 5 copper cabling and requires two pairs of wires.

____T 4. The signaling rates associated with SONET are the same as those for ATM.

____F 5. A hardware firewall is configured with two or more network interfaces typically placed between a corporate LAN and the WAN connection.

____T 6. An intrusion detection system (IDS) usually works
…show more content…
Encryption prevents somebody using eavesdropping technology, such as a(n) ____, from capturing packets and using data in the packets for malicious purposes.
a.|IDS|c.|rootkit|
b.|VPN|d.|packet sniffer|

____D 25. IPSec works by establishing a(n) ____ between two communicating devices.
a.|circuit|c.|association|
b.|channel|d.|tunnel|

____B 26. ____ authentication can be used in a Windows domain environment or on a Linux system to authenticate users and computers.
a.|Digital|c.|PAM|
b.|Kerberos|d.|VPN|

____D 27. ____ are temporary or permanent connections across a public network—such as the Internet—that use encryption technology to transmit and receive data.
a.|IDSs|c.|Firewalls|
b.|RRASs|d.|VPNs|

____B 28. ____ supports advanced authentication and encryption technologies; however, it requires Windows machines on both sides of any remote connection.
a.|PPTP|c.|PPP|
b.|L2TP|d.|SLIP|

____C 29. A(n) ____ is a hardware device or software program that inspects packets going into or out of a network or computer and then discards or forwards those packets based on a set of rules.
a.|gateway|c.|firewall|
b.|IDS|d.|router|

____B 30. A ____ is a program that spreads by replicating itself into other programs or

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Unit 5 Lab JM

    • 625 Words
    • 5 Pages

    6. IP packet is sent to forwarding host by addressing it to the resolved MAC address.…

    • 625 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    ii. Transport – Defines the type of connection established between hosts and how acknowledgements are sent.…

    • 890 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    robust hardware based firewall. Having an intranet is a key feature that will enable the…

    • 4187 Words
    • 22 Pages
    Powerful Essays
  • Powerful Essays

    NT 1230 FINAL EXAM REVIEW

    • 542 Words
    • 2 Pages

    what do you use to determine if your machine can be upgraded? Windows Upgrade Advisor.…

    • 542 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    Firewalls are hardware or software-based network security system that controls the outgoing and incoming network traffic by analyzing the data packets and determining whether they should be allowed through or not based upon the settings. A firewall establishes a barrier between a trusted, secure internal network and another network that is not assumed to be secure and trusted. Many computers and other hardware such as routers and modems have built-in firewall capabilities. These firewalls can be effective with little or no configuration. Software firewalls can be installed on your computer and can be configured according to your needs. Many software firewalls have user defined controls for setting up safe file and printer sharing and to block unsafe applications from running on your computer. Software firewalls may also incorporate privacy controls and web content…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    NT1210 Final Exam Review

    • 1591 Words
    • 9 Pages

    7. What is the piece of hardware that allows a device to physically access a network?…

    • 1591 Words
    • 9 Pages
    Satisfactory Essays
  • Good Essays

    nt2640 week1

    • 1824 Words
    • 8 Pages

    3. The process of HTTP asking TCP to send some data and make sure that it is received correctly is an example of what?…

    • 1824 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Hash ____ are mathematical functions that create a hash value, also known as a message digest, by converting variable-length messages into a single fixed-length value.…

    • 1195 Words
    • 17 Pages
    Good Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    2. ____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission. a. Spoofing c. Phishing b. Unauthorized access d. Vandalizing 3. ____ refers to the act of breaking into a computer or network. a. Spamming c. Hacking b. Phishing d. Spoofing 4. Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them. a. spoofing c. spamming b. phishing d. war driving 5. ____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems. a. Touch object c. Two-factor b. Possessed object d. Biometric 6. A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access. a. Trojan horse c. hub b. firewall d. bridge 7. ____ uses a single secret key to both encrypt and decrypt the file or message. a. Private key encryption c. Public key encryption b. Asymmetric key encryption d. Synchronous key encryption 8. Some Web-based encrypted e-mail system, such as the popular free ____ service梤 equire both the sender and recipient to have accounts through that system. a. CryptMail c. HushMail b. QuietMail d. PrivateMail…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    What is a device that lets your computer send data to and receive data from other computers or to a network?…

    • 1566 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Lab8 1 Some Common Risks

    • 505 Words
    • 3 Pages

    Using multi-factor authentication is a recommended best practice when implementing a Remote Access Policy server user authentication service (Scarfone, Hoffman, & Souppaya, 2009).…

    • 505 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Ntc-360 Short Answer Paper

    • 1584 Words
    • 7 Pages

    Asynchronous communication utilizes a transmitter, a receiver and a wire without coordination about the timing of individual bits. There is no coordination between the two end points on just how long the transmiter leaves the signal at a certain level to represent a single digital bit. Each device uses a clock to measure out the 'length ' of a bit. The transmitting device simply transmits. The receiving device has to look at the incoming signal and figure out what it is receiving and coordinate and retime its clock to match the incoming signal.…

    • 1584 Words
    • 7 Pages
    Better Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Nuts and bolts of computer networks. Computer networks consist of end systems, packet switches, and communication links. End systems—also called hosts—include desktop PCs, laptops, hand-held network devices (including cell phones, PDAs, and BlackBerries), sensors, and servers (such as Web and mail servers). Just as cities are interconnected by a network of roads and intersections, end systems of a computer network are interconnected by a network of communication links and packet switches. Communication links can be wired or wireless. Distributed applications. A computer network enables distributed applications. A distributed application runs on end systems and exchanges data via the computer network. Distributed applications include Web surfing, e-mail, instant messaging, Internet phone, distributed games, peer-to-peer file sharing, television distribution, and video conferencing. New distributed applications continue to be invented and deployed on the Internet. Packet switching. When one end system sends data to another end system, the sending end system breaks the data into chunks, called packets. Similar to the process of delivering post-office mail, the Internet transports each packet separately, routing a packet to its destination using a destination address that is written into the packet. When a packet switch receives a packet, it uses the packet’s destination address to determine on which link it should forward the packet. Thus, a packet switch performs “packet switching,” forwarding incoming packets to outgoing links packet by packet. Also, packet switches typically “store and forward” packets—that is, before a switch begins to forward a packet on an outgoing link, first it receives and stores the entire packet. Protocol. A protocol defines the format and order of messages exchanged…

    • 8590 Words
    • 35 Pages
    Powerful Essays
  • Satisfactory Essays

    A computer network, or simply a network is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information .where at least one process in one device is able to send/receive data to/from at least one process residing in a remote device, then the two devices are said to be in a network. Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network. Networks may be classified according to a wide variety of characteristics, such as the medium used to transport the data, communications protocol used, scale, topology and organizational scope.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays

Related Topics