This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
In IP subnet planning, you need to have at least 130 subnets. How large should your
subnet part be?
A) 6
B) 7
C) 8
D) none of the above
Which of the following uses OFDM?
A) 802.11ac
B) 802.11n
C) both A and B
D) neither A nor B
In 802.11g, channel bandwidth usually is ________.
A) 20 GHz
B) 40 GHz
C) 20 MHz
D) 40 MHz
In SNMP, companies are often reluctant to use ________ commands because of
security dangers.
A) Get
B) Set
C) trap
D) request
The main benefit of IPv6 over IPv4 is ________.
A) two more bits in the IP address
B) two more bytes in the IP address
C) the ability to have quality-of-service guarantees
D) the ability to support more possible hosts
In IPsec, agreements about how security will be done are called ________.
A) tranches
B) security contracts
C) service-level agreements
D) security associations
Using priority in Ethernet requires the use of ________ fields.
A) QoS
B) flag
C) extension
D) tag
The way in which application layer functions are spread among computers to deliver
service to users is called ________.
A) distributed processing
B) peer-to-peer computing
C) client/server computing
D) an application architecture
Which IPv4 header field is used to specify quality of service?
A) type of service
B) version number
C) ECN
D) differentiated services control point
After the side wishing to close a TCP connection sends a FIN segment, the other side
will ________.
A) not send any more segments
B) only send ACK segments
C) only send FIN segments
D) none of the above
Which of the following can route non-IP packets?
A) OSPF
B) EIGRP
C) both A and B
D) neither A nor B
An abrupt close uses a(n) ________ segment.
A) FIN
B) RST
C) either A or B
D) neither A nor B
In digital certificate authentication, the supplicant encrypts the challenge message with
________.
A) the supplicant's private key
B) the verifier's private key
C) the true party's private key
D) none of the above
Radio transmission is measured in terms of ________.
A) bytes per second
B) wavelength
C) frequency
D) bits per second
Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) none of the above
IaaSs own _________.
A) application software
B) servers
C) both A and B
D) neither A nor B
When a packet that is part of an ongoing connection arrives at a stateful inspection
firewall, the firewall usually ________.
A) drops the packet
B) drops the packet and notifies an administrator
C) passes the packet
D) passes the packet, but notifies an administrator
In SaaS, the user normally ________.
A) purchases software
B) pays for software by amount of use
C) both A and B
D) neither A nor B
A specific encryption method is called a ________.
A) code
B) schema
C) key method
D) cipher
________ is a general naming system for the Internet.
A) NAT
B) DNS
C) DHCP
D) Dotted decimal notation
A channel extends from 55 MHz to 60 MHz. Its bandwidth is ________.
A) 60 MHz
B) 55 MHz
C) 65 MHz
D) none of the above
For PBXs, nighttime calling is ________.
A) a user service
B) an attendant service
C) a management service
A wireless host sends a packet to a server on the company's wired Ethernet LAN via an
access point. How many frames will be involved in this one-way transmission?
A) 1
B) 2
C) 4
D) There will be one frame for each switch along the way.
To see if a target host can be reached, you normally would send it an ICMP ________
message.
A) echo request
B) error advisement
C) either A or B
D) neither A nor B
In the telephone system, the lines that connect customers to the nearest switch are called
the ________.
A) access lines
B) local lines
C) access loop
D) local loop
Which of the following sometimes uses direct propagation between computers?
A) viruses
B) worms
C) Trojan horses
D) downloaders
Bluetooth is standardized by the ________.
A) 802.11 Working Group
B) Wi-Fi Alliance
C) Bluetooth Special Interest Group
D) none of the above
TCP messages are called ________.
A) frames
B) packets
C) segments
D) fragments
TCP has six single-bit fields in headers and these single-bit fields are called ________
fields.
A) port
B) flag
C) ACK
D) binary
An SLA for latency should specify a ________.
A) maximum latency
B) minimum latency
C) both A and B
D) neither A nor B
Which of the following segments is not acknowledged?
A) FIN
B) RST
C) Both of the above are acknowledged.
D) Neither A nor B is acknowledged.
Which of the following is a form of biometrics?
A) reusable passwords
B) digital certificate authentication
C) facial recognition
D) all of the above
Trusted by Thousands of
Students
Here are what students say about us.
Resources
Company
Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.