Book Title
Business Data Networks and Security 10th Edition

CDA 40150

July 19, 2017
7,000 bps can also be written as ________.
A) 7 Kbps
B) 7 Mbps
C) 7 Gbps
D) none of the above
Creating effective backup links in RSTP is ________.
A) completely automatic
B) simple and largely automatic
C) difficult and time consuming
D) impossible
QAM uses ________.
A) amplitude modulation
B) phase modulation
C) both A and B
D) neither A nor B
The 802.11 standard has two mechanisms for media access control. One of two
mechanisms is mandatory; it is ________.
In HTTP headers, the end of a header field is usually indicated by a ________.
A) .
B) :
C) ;
D) none of the above
In MPLS, the router interface to send the packet back out will be decided ________.
A) during the router's routing process
B) before the packet arrives
C) by a dynamic routing protocol
D) none of the above
A message's syntax is its ________.
A) protocol
B) message order
C) meaning
D) structure
An individual switch knows the frame's entire ________.
A) session
B) data link
C) route
D) none of the above
Which has stronger security?
B) IPsec
C) Both have about equal security.
Deciding what interface and to what device to send the packet back out is step
________ in the routing process.
A) 1
B) 2
C) 3
D) 4
RFC 822 and RFC 2822 standards govern ________.
A) plain text content of e-mail messages
B) HTTP page contents
C) HTML page contents
D) pages written in any language
In 802.1X, the workgroup switch is the ________.
A) authentication server
B) authenticator
C) both A and B
D) neither A nor B
If a host is to be able to communicate via IPv4 and IPv6, it is said to ________.
A) be bilingual
B) have a dual-stack
C) be IPv6-ready
D) be IP-agile
If two hosts are separated by seven networks, how many packets will there be along the
way when a host transmits a packet to another host?
A) 1
B) 2
C) 7
D) 14
The ________ contains the content being delivered by a message.
A) address field
B) header
C) data field
D) trailer
DoS attacks attempt to ________.
A) hack a computer
B) reduce the availability of a computer
C) steal information from a computer
D) delete files on a computer
When a cloud client customer moves from one machine to another machine, ________.
A) the same data files are available
B) the same application software personalization is in effect
C) both A and B
D) neither A nor B
In two-way dialogues using symmetric key encryption, how many keys are used for
encryption and decryption?
A) 1
B) 2
C) 4
D) none of the above
In the United States, ________ handle long-distance communication.
For PBXs, call detail reporting is ________.
A) a user service
B) an attendant service
C) a management service
Access points in the same ESS communicate via ________.
A) wireless transmission
B) the distribution system
C) a master access point
D) routers
Which of the following can be used within a firm?
A) private IP addresses
B) public IP addresses
C) both A and B
D) neither A nor B
PTTs were found in ________.
A) Europe
B) United States
C) both A and B
D) neither A nor B
The distance between two corresponding points in adjacent cycles is the ________.
A) frequency
B) wavelength
C) bandwidth
D) span
The Target attackers sold their stolen card information to ________.
A) crimeware shops
B) card shops
C) card counterfeiters
D) Hallmark
A traditional e-mail user retrieving messages from his or her mail server could use
A) IMAP standard
B) POP standard
C) either IMAP or POP standard
D) SMTP standard
Which of the following is the easiest to understand?
A) firewall hardware
B) firewall ACLs
C) firewall policies
D) firewall IDSs
What form of transmission is most resistant to transmission errors?
A) digital
B) analog
C) Both are about equally resistant to transmission errors.
D) none of the above
Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the
cost metric 10. Which row will the router choose if both are matches?
A) 2707
B) 4400
C) either A or B
D) The router will choose the default row.
BitTorrent's .torrent files are stored on the ________.
A) swarm
B) index server
C) tracker
D) individual peers
Electronic signatures also provide ________ in addition to authentication.
A) message integrity
B) message encryption
C) both A and B
D) neither A nor B