Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

CDA 63081

July 19, 2017
For Netflix, ________ is a(n) ________, and ________ is a(n) ________.
A) Google, IaaS, AWS, IaaS
B) Google, SaaS, AWS, SaaS
C) Google, IaaS, AWS, SaaS
D) Google, SaaS, AWS, IaaS
When a firewall policy server is used to manage SPI firewalls, what device creates
specific ACL rules?
A) the policy server
B) the SNMP manager
C) individual firewalls
D) none of the above
Which of the following was created for PANs?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B
The main advantage of ________ file sharing is that it brings cost savings by using
clients rather than server processing power.
A) BitTorrent
B) client/server
C) both A and B
D) neither A nor B
At what layer would you find wire connections?
A) 1
B) 2
C) 3
D) 4
CAT 5e and CAT 6 wiring can carry Ethernet traffic 100 meters up to ________.
A) 10 Mbps
B) 100 Mbps
C) 1 Gbps
D) 10 Gbps
The first step in the routing process involves ________.
A) selecting the best match row
B) comparing the packet's destination IP address to all rows
C) comparing the packet's destination IP address to matching rows
D) selecting an interface
IPsec protects ________ layer messages.
A) data link
B) application
C) both A and B
D) neither A nor B
The Ethernet length field gives the length of the ________.
A) frame
B) frame, less the frame check field's size
C) data field
D) data field plus PAD
Because of the curvature of the earth, microwave systems that must travel over long
distances need ________.
A) to operate at low frequencies
B) to operate at high frequencies
C) repeaters
D) mirrors
Which of the following allows routers to check for errors in the header when a packet
arrives?
A) IPv4
B) IPv6
C) both A and B
D) neither A nor B
The other wireless device is far away in a known direction. It would be better to use
________.
A) an omnidirectional antenna
B) a dish antenna
C) neither A nor B
At what layer is the 100BASE-TX standard?
A) physical
B) data link
C) Internet
D) physical and data link
SNMP agents can initiate ________.
A) Get commands
B) traps
C) both A and B
D) neither A nor B
In Active Directory domains, there is a partial replication between domain controllers
________.
A) in the same domain
B) in different domains at adjacent levels in the domain hierarchy
C) both A and B
D) neither A nor B
Which of the following is inside the header of messages?
A) address field
B) IP address field
C) data field
D) trailer
In an IPv6 global unicast address, the interface ID is ________ bits long.
A) 32
B) 64
C) 128
D) It varies.
WAN optimization devices are deployed ________.
A) at the ends of leased lines
B) by the telephone carrier
C) by the PSDN carrier
D) by the ISP
Compared to other methods for reducing problems during momentary traffic peaks,
overprovisioning ________.
A) increases capital cost
B) increases labor costs
C) both A and B
D) neither A nor B
How a message is organized is its ________.
A) protocol
B) order
C) syntax
D) semantics
Overprovisioning is ________.
A) wasteful of capacity
B) highly labor-intensive
C) both A and B
D) neither A nor B
SSL/TLS is used for ________.
A) Web applications
B) any application
C) both A and B
D) neither A nor B
The part of an IPv6 global unicast address that designates the host is called the
________.
A) host part
B) interface ID
C) routing prefix
D) none of the above
Transient client presence tends to be a problem in ________.
A) P2P applications
B) client/server applications
C) both A and B
D) neither A nor B
________ is the dominant firewall filtering method used on main border firewalls
today.
A) ACL filtering
B) Application content filtering
C) Stateful packet inspection
D) none of the above
Writing 37,400 Mbps properly in metric notation would be________.
A) It is written properly.
B) 37.4 kbps
C) 37.4 Mbps
D) 37.4 Gbps
QoS is quantified through ________.
A) criteria
B) consensus
C) metrics
D) none of the above
The standard for roaming among access points is ________.
A) 802.11r
B) 802.11s
C) 802.11W
D) the wireless handoff protocol
In Active Directory domains, there is complete replication between domain controllers
________.
A) in the same domain
B) in adjacent levels in the domain hierarchy
C) throughout a tree
D) throughout a forest
The 2.4 GHz band supports ________ possible non-overlapping 20 MHz channel(s).
A) 1
B) 3
C) 7
D) 11