CDA 41397

subject Type Homework Help
subject Pages 9
subject Words 1065
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In HTTP, the end of a header field is usually indicated by a ________.
A) bit position
B) CRLF
C) colon
D) blank line
After the data link layer process does encapsulation, it passes the IP packet to the
________ layer process.
A) physical
B) internet
C) transport
D) none of the above
There is an access point that serves eight wireless hosts. On how many channels will
these devices transmit and receive during the course of an hour or two?
A) 1
B) 2
page-pf2
C) 8
D) 9
Speech codecs ________.
A) translate human voice signals into digital signals for transmission
B) translate human voice signals into analog signals for transmission
C) both A and B
D) neither A nor B
TCP messages are called ________.
A) segments
B) fragments
C) packets
D) datagrams
page-pf3
The Wi-Fi Alliance calls 802.1X mode ________ mode.
A) enterprise
B) personal
C) WEP
D) WPA
Which of the following is true?
A) Guidelines must be followed.
B) Guidelines must be considered.
C) both A and B
D) neither A nor B
page-pf4
Which of the following is NOT one of the three categories of PBX services?
A) attendant services
B) management services
C) advanced services
D) user services
One-bit fields are called ________ fields.
A) SYN
B) flag
C) ACK
D) none of the above
In binary signaling there is (are) ________ state(s).
A) one
B) two
C) a number of
page-pf5
D) an infinite number of
Standards govern ________.
A) semantics
B) syntax
C) both A and B
D) neither A nor B
Which type of firewall filtering looks at application-layer content?
A) static packet filtering
B) stateful packet inspection
C) NGFW
D) all of the above
page-pf6
DSL offers ________.
A) voice transmission
B) data transmission
C) both A and B
D) neither A nor B
A packet will definitely get through if it has ________.
A) QoS reserved capacity
B) priority
C) both A and B
What type of switch connects users to the network?
page-pf7
A) user switches
B) core switches
C) access switches
D) workgroup switches
What happens if two nearby access points use the same channel?
A) They will interfere with each other.
B) They will be bonded for joint operation automatically.
C) They will be bonded for joint operation automatically if they are on the same ESS.
D) They will be bonded for joint operation automatically if they have the same SSID.
Which of the following specifies what should be done?
A) policies
B) implementation
C) both A and B
D) neither A nor B
page-pf8
Which of the following is the newest Wi-Fi standard?
A) 802.11ac
B) 802.11g
C) 802.11n
D) 802.11b
There is a row for each individual Ethernet address in a(n) ________.
A) Router table
B) Ethernet switching table
C) both A and B
D) neither A nor B
page-pf9
When a packet travels through a network, the time it takes to get from the sender to the
receiver is called ________.
A) latency
B) milliseconds
C) jitter
D) throughput
Standards tend to bring _________.
A) interoperability
B) higher prices
C) both A and B
D) neither A nor B
Guarantees by a provider to meet certain delivery quality specifications are called
________.
A) speed quality guarantees
page-pfa
B) service level agreements
C) service warranties
D) contracts
VoIP users have ________ in their phones or on their computers.
A) media gateways
B) codecs
C) both A and B
D) neither A nor B
In ________, the authenticator is the ________.
A) 802.1X, wireless access point
B) 802.11i, switch
C) 802.11i, wireless access point
D) 802.1X, central authentication server
page-pfb
Which of the following probably suffered the most financial damage from the Target
breach?
A) retailers other than Target
B) banks
C) consumers
D) POS terminal vendors
When the light energies of two pulses arrive at overlapping times, this is ________.
A) multimode transmission
B) modal bandwidth
C) modal dispersion
D) modal interference
page-pfc
Today's dominant cellular technology is ________.
A) LTE
B) 3G
C) HSPA+
D) MTSO
A TCP segment carries data octets 456 through 980. The following TCP segment is a
supervisory segment carrying no data. What value is in the sequence number field of
the latter TCP segment?
A) 456
B) 457
C) 980
D) 981
Which layer's standards govern delivering frames?
A) 1
page-pfd
B) 2
C) both A and B
D) neither A nor B
A 100/1 increase in power corresponds to approximately ________ decibels.
A) 6
B) 10
C) 20
D) none of the above
Which of the following offers more reliable antivirus protection?
A) antivirus software on user PCs
B) antivirus software on the mail server
C) Both A and B are about equally reliable.
page-pfe
The official name for Ethernet addresses is the ________ addresses.
A) MAC
B) EUI-48
C) both A and B
D) neither A nor B
Which light wavelength dominates in LANs?
A) 850 nm
B) 1,310 nm
C) 1,550 nm
D) 1 Gbps
page-pff
In 802.11i, protection is provided between the client and the ________.
A) access point
B) switch
C) router
D) server
In which frequency band does NFC operate?
A) 2.4 GHz
B) 5 GHz
C) both A and B
D) neither A nor B

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.