Contents
- 1 Liberty CSIS 330 Final Exam Answers Complete Solutions
- 1.1 STATUS
- 1.1.1 · Question 22
- 1.1.2 · Question 34
- 1.1.3 · Question 35
- 1.1.4 · Question 39
- 1.1.5 · Question 41
- 1.1.6 · Question 42
- 1.1.7 · Question 55
- 1.1.8 · Question 61
- 1.1.9 · Question 62
- 1.1.10 · Question 75
- 1.1.11 · Question 76
- 1.1.12 · Question 77
- 1.1.13 · Question 93
- 1.1.14 · Question 94
- 1.1.15 · Question 99
- 1.1.16 · Question 100
Liberty CSIS 330 Final Exam Answers Complete Solutions
Complete many different versions to get an A on your grade!
The below shown is just one version sample.
Download it for more and ace on your quizzes and exams!
· Question 1
1 out of 1 points
Data ______________ means having the assurance that the information has not been altered in transmission from origin to destination.
· Question 2
1 out of 1 points
According to the textbook, initial business data networks evolved to enable the transmission of many different types of information services except
· Question 5
1 out of 1 points
____________________________ give(s) people the opportunity to work together on shared documents.
· Question 18
1 out of 1 points
Which protocol enables clients to access email stored on a mail server and maintains email on the server?
· Question 19
1 out of 1 points
Which layers in the OSI model correspond to the Application layer in the TCP/IP model?
· Question 21
1 out of 1 points
Which organization coordinates IP address allocation, the management of domain names used by DNS, and the protocol identifiers or port numbers used by TCP and UDP protocols?
STATUS
· Question 22
1 out of 1 points
______ is the IP address of the sending device.
· Question 34
1 out of 1 points
____________ is the simplest topology that consists of a permanent link between two endpoints.
· Question 35
1 out of 1 points
To offer wireless capability, a network must incorporate a ____________ to which to connect devices.
· Question 39
1 out of 1 points
In 1998, the IEEE 802.3ac standard extended the maximum allowable frame size to be 1522 bytes in order to accommodate a technology called ____________________.
· Question 41
1 out of 1 points
Which of the following Ethernet changes occurred in the year 2002?
· Question 42
1 out of 1 points
What is the name given to the Ethernet MAC sublayer PDU?
· Question 55
1 out of 1 points
In the second step of the TCP three-way handshake, which flag(s) is(are) set by the destination host?
· Question 61
1 out of 1 points
IPv6 routing is not enabled by default on a Cisco router. To enable a router as an IPv6 router, what IOS command must be used?
· Question 62
1 out of 1 points
Like IPv4, IPv6 uses both the prefix length and the dotted-decimal subnet mask notation for indicate the network portion of an IPv6 address.
· Question 75
Which protocol is used to assign an IP address, subnet mask, default gateway and DNS address to a host?
· Question 76
1 out of 1 points
Which protocol handles inbound mail delivery?
· Question 77
What is the difference between HTTP and HTTPS?
· Question 93
1 out of 1 points
Which type of physical threat involves physical damage to servers, routers, switches, cabling, and workstations?
· Question 94
1 out of 1 points
A DDoS attack differs from a regular DoS attack in that the victim is attacked in a coordinated manner from several compromised systems known as __________.
· Question 99
1 out of 1 points
Which type of traffic should be given the highest priority on a network?
· Question 100
1 out of 1 points
___________________ attacks are the unauthorized discovery and mapping of systems, services, or vulnerabilities.