BUS 53921

subject Type Homework Help
subject Pages 14
subject Words 1727
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which of the following is NOT one of classes of function for control signaling?
A. establishment
B. supervisory
C. call information
D. network management
One type of attack on the security of a computer system or network that impacts the
availability of a system (e.g. destruction of a resource in the system) is referred to as
___________.
A. interruption
B. interception
C. modification
D. all of the above
The technique employed by Frame Relay is called __________.
A. inband signaling
B. outband signaling
page-pf2
C. common channel signaling
D. open shortest path first routing
One of the main differences between amplifiers and repeaters is that:
A. amplifiers forward noise as well as data
B. amplifiers clean the signal and then forward it
C. amplifiers increase the amount of attenuation
D. amplifiers focus primarily on digital signals
No redundancy guarantees for servers, storage systems, network equipment, and
communication connections to Internet or other networks; single path for power and
cooling distribution; no redundant components; and availability: 99.671% are
_________ characteristics of data centers.
A. Tier 1
B. Tier 2
C. Tier 3
D. Tier 4
page-pf3
Multiple IP addresses referring to a block of CIDR addresses can be identified with a
single mask, a process known as __________ .
A. uni-masking
B. OSPF
C. supernetting
D. block masking
Peak download rate for a 3G network is _________.
A. 1 Gbps
B. 100 Mbps
C. 500 Mbps
D. 384 kbps
page-pf4
All of the following are part of the LAPF core except:
A. frame delimiting
B. error correction
C. frame correction
D. congestion control
Wireless networking brings:
A. increased security risks
B. management headaches
C. increased demands on support staff
D. all of the above
The types of networks commonly used in businesses today include:
A. Local area networks, wide-area networks, and telephone networks
B. Local area networks, telephone networks, and voice mail networks
page-pf5
C. Wide area networks, voice mail networks, and email networks
D. Voice mail networks, email networks, and local area networks
A company that provides other companies or individuals with access to, or presence on,
the Internet is a(n) __________.
A. point of presence
B. ISP
C. network service provider
D. central office
________ are the switching centers in the network.
A. Subscribers
B. Subscriber line
C. Exchanges
D. Trunks
page-pf6
A paradigm for electronic communications where a dedicated path is opened and
maintained during the exchange is called _________.
A. message switching
B. circuit switching
C. packet switching
D. data switching
When using ATM, which of the following is NOT a characteristic of virtual channel
connections?
A. quality of service can be specified
B. all connections are switched
C. sequencing is provided
D. traffic patterns can be monitored
page-pf7
A(n) _________ is an Internet e-mail provider.
A. POP
B. ADMD
C. DNS
D. IEP
The most complex part of SSL is the ___________ Protocol.
A. Handshake
B. Change Cipher Spec
C. Alert
D. Record
Signals produced on a line that is the sum or difference of the signals that created it is:
A. thermal noise
B. intermodulation noise
page-pf8
C. crosstalk
D. impulse noise
A multiplexing technique where multiple users use distinct time slots such that the
transmitted bits are shared by all users is called ___________.
A. frequency division multiplexing
B. time division multiplexing
C. separate channel multiplexing
D. common channel multiplexing
Which of the following is a feature of Wide Area Networks?
A. strategic control
B. reliability
C. security
D. all of the above
page-pf9
Which of the following statements regarding macro viruses is true?
A. a macro virus is platform independent
B. macro viruses infect documents, not executable portions of code
C. macro viruses are easily spread
D. all of the above
Which of the following is not a central element of a typical antivirus scheme?
A. detection
B. identification
C. removal
D. deterrence
page-pfa
The problem of using IP numbers for addressing hosts in the Internet are resolved using
__________.
A. the concept of domains and the use of domain names
B. the use of Telnet applications
C. the use of email servers
D. splitting IP addresses into four octets
The key features of the DNA database are:
A. variable-depth hierarchy for names, distributed databases, and name servers
B. resolvers, distributed databases, and name servers
C. distribution controlled by the database, resolvers, and distributed databases
D. variable-depth hierarchy for names, distributed databases, and distribution controlled
by the database
A virus can be attached to a program by _________.
A. prepending
B. postpending
page-pfb
C. embedding other than at the beginning or end
D. all of the above
Which of the following are emerging enterprise network applications?
A. video broadcasting and smart objects
B. cloud computing and telepresence
C. video enriched collaboration and cloud computing
D. all of the above
Which of the following describes class C networks?
A. Many networks, each with a few hosts
B. Medium number of networks, each with a medium number of hosts
C. Few networks, each with many hosts
D. A dedicated network, with a set number of hosts
page-pfc
With ________ the light steaming through the fiber consists of many colors,
or wavelengths, each carrying a separate channel of data.
A. LCF
B. WDM
C. TDM
D. FWD
In _________ the phase of the carrier signal is shifted to encode data.
A. PSK
B. FSK
C. ASK
D. BFSK
page-pfd
The _________ is used to send files from one system to another under user command.
A. UDP
B. SMTP
C. FTP
D. SSH
Email functions visible to a user, such as facilities for preparing and submitting
messages, filing, replying, and forwarding, are considered:
A. message transfer agent functions
B. client functions
C. email client functions
D. user agent functions
The frame format for the 802.3 protocol consists of:
A. preamble
B. SFD
page-pfe
C. destination address
D. all of the above
When using HTTP, an application program that establishes connections for the purpose
of sending requests to a server is called a __________.
A. client
B. server
C. host
D. resource
_________ was developed to address the limitations of cellular and other
wireless networks for providing data services to mobile devices.
A. WAP
B. Droid
C. GEOS
D. WML
page-pff
________ is a set of function and call programs that allow clients and servers to
intercommunicate.
One of the least common error-detecting codes is the cyclic redundancy check.
With ____________, a cell is divided into a number of wedge shaped sectors, each with
its own set of channels, typically three or six sectors per cell.
page-pf10
Transport mode in IPSec provides protection to the entire IP packet.
MIME subtypes of the multi-part type are used to describe how the different parts of a
message go together.
Multipath problems are particularly problematic in line of sight applications.
Typical ranges (distance between sender and receiver) for a wireless LAN are of the
order 100 to 1000 meters.
page-pf11
The ________ is a directory lookup service that provides a mapping between the name
of a host on the Internet and its numerical address.
The Internet is an unusual corporate tool in that it is owned and managed by a single
entity.
An internet routing protocol is used to exchange information about reachability and
traffic delays, allowing each router to construct a next-hop routing table for paths
through the internet.
page-pf12
The two media technologies currently driving the evolution of data communications
networks are local area networks and cable television networks.
In most networks, not every sender/receiver pair can be connected.
A _________ is a sequence of voltage pulses that may be transmitted over a wired
medium; for example, a constant positive voltage may represent binary 0, and a
constant negative value may represent binary 1.
When using wireless systems, you are limited in how often you can use the same
frequency band for different communications
because the signals are not constrained and can interfere with each other even when
separated geographically.
page-pf13
The standard network management protocol for TCP/IP networks is _________.
When using a wireless LAN with a notebook computer, it is necessary for the computer
not to move while the connection is active.
The Host-based IDS monitors network traffic for particular network segments or
devices and analyzes network, transport, and application protocols to identify
suspicious activity.
page-pf14
__________ is the communication of data across a computer network by the
propagation and processing of signals.
Ipsec is based primarily upon the DES standard.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.