CAS CS 59632

subject Type Homework Help
subject Pages 9
subject Words 1024
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In IP subnet planning, you need to have at least 130 subnets. How large should your
subnet part be?
A) 6
B) 7
C) 8
D) none of the above
Which of the following uses OFDM?
A) 802.11ac
B) 802.11n
C) both A and B
D) neither A nor B
In 802.11g, channel bandwidth usually is ________.
A) 20 GHz
B) 40 GHz
page-pf2
C) 20 MHz
D) 40 MHz
In SNMP, companies are often reluctant to use ________ commands because of
security dangers.
A) Get
B) Set
C) trap
D) request
The main benefit of IPv6 over IPv4 is ________.
A) two more bits in the IP address
B) two more bytes in the IP address
C) the ability to have quality-of-service guarantees
D) the ability to support more possible hosts
page-pf3
In IPsec, agreements about how security will be done are called ________.
A) tranches
B) security contracts
C) service-level agreements
D) security associations
Using priority in Ethernet requires the use of ________ fields.
A) QoS
B) flag
C) extension
D) tag
page-pf4
The way in which application layer functions are spread among computers to deliver
service to users is called ________.
A) distributed processing
B) peer-to-peer computing
C) client/server computing
D) an application architecture
Which IPv4 header field is used to specify quality of service?
A) type of service
B) version number
C) ECN
D) differentiated services control point
After the side wishing to close a TCP connection sends a FIN segment, the other side
will ________.
page-pf5
A) not send any more segments
B) only send ACK segments
C) only send FIN segments
D) none of the above
Which of the following can route non-IP packets?
A) OSPF
B) EIGRP
C) both A and B
D) neither A nor B
An abrupt close uses a(n) ________ segment.
A) FIN
B) RST
C) either A or B
page-pf6
D) neither A nor B
In digital certificate authentication, the supplicant encrypts the challenge message with
________.
A) the supplicant's private key
B) the verifier's private key
C) the true party's private key
D) none of the above
Radio transmission is measured in terms of ________.
A) bytes per second
B) wavelength
C) frequency
D) bits per second
page-pf7
Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) none of the above
IaaSs own _________.
A) application software
B) servers
C) both A and B
D) neither A nor B
page-pf8
When a packet that is part of an ongoing connection arrives at a stateful inspection
firewall, the firewall usually ________.
A) drops the packet
B) drops the packet and notifies an administrator
C) passes the packet
D) passes the packet, but notifies an administrator
In SaaS, the user normally ________.
A) purchases software
B) pays for software by amount of use
C) both A and B
D) neither A nor B
A specific encryption method is called a ________.
A) code
B) schema
page-pf9
C) key method
D) cipher
________ is a general naming system for the Internet.
A) NAT
B) DNS
C) DHCP
D) Dotted decimal notation
A channel extends from 55 MHz to 60 MHz. Its bandwidth is ________.
A) 60 MHz
B) 55 MHz
C) 65 MHz
D) none of the above
page-pfa
For PBXs, nighttime calling is ________.
A) a user service
B) an attendant service
C) a management service
A wireless host sends a packet to a server on the company's wired Ethernet LAN via an
access point. How many frames will be involved in this one-way transmission?
A) 1
B) 2
C) 4
D) There will be one frame for each switch along the way.
To see if a target host can be reached, you normally would send it an ICMP ________
page-pfb
message.
A) echo request
B) error advisement
C) either A or B
D) neither A nor B
In the telephone system, the lines that connect customers to the nearest switch are called
the ________.
A) access lines
B) local lines
C) access loop
D) local loop
Which of the following sometimes uses direct propagation between computers?
A) viruses
B) worms
page-pfc
C) Trojan horses
D) downloaders
Bluetooth is standardized by the ________.
A) 802.11 Working Group
B) Wi-Fi Alliance
C) Bluetooth Special Interest Group
D) none of the above
TCP messages are called ________.
A) frames
B) packets
C) segments
D) fragments
page-pfd
TCP has six single-bit fields in headers and these single-bit fields are called ________
fields.
A) port
B) flag
C) ACK
D) binary
An SLA for latency should specify a ________.
A) maximum latency
B) minimum latency
C) both A and B
D) neither A nor B
page-pfe
Which of the following segments is not acknowledged?
A) FIN
B) RST
C) Both of the above are acknowledged.
D) Neither A nor B is acknowledged.
Which of the following is a form of biometrics?
A) reusable passwords
B) digital certificate authentication
C) facial recognition
D) all of the above

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.