Book Title
Business Data Networks and Security 10th Edition

CDA 94637

July 19, 2017
BPSK modulation uses two ________.
A) amplitudes
B) frequencies
C) phases
D) none of the above
Which is NOT one of the three parts of a public IPv6 unicast address?
A) subnet ID
B) routing prefix
C) host part
D) All of the above are parts in a public IPv6 unicast address.
A message's semantics is its ________.
A) protocol
B) message order
C) meaning
D) structure
Which offers stronger security?
B) 802.11i
C) Both A and B offer equally strong security.
The total length of an IPv4 address is ________ bits.
A) 8
B) 16
C) 32
D) We cannot say.
A TCP segment begins with octet 8,658 and ends with octet 12,783. What number does
the receiving host put in the acknowledgment number field of the TCP segment that
acknowledges this TCP segment?
A) 8,658
B) 8,659
C) 12,783
D) 12,784
Plenum wiring is needed for ________.
A) heavy traffic loads
B) safety
C) both A and B
D) neither A nor B
Control is done on individual switches and routers in ________.
A) traditional operation
C) both A and B
D) neither A nor B
In telephone wiring, there need to be four wires for each computer on the floor in
A) horizontal distribution
B) vertical distribution
C) both A and B
D) neither A nor B
What is the maximum power for POE Plus in the standard?
A) 15 watts
B) 25 watts
C) 75 watts
D) 150 watts
Netflix uses the most VMs ________.
A) on weekends
B) on weekdays
C) in the evenings
D) during the day
In Internets, different networks are connected by ________.
A) switches
B) routers
C) PCs
D) hot spots
You discover that you can get into other e-mail accounts after you have logged in under
your account. You spend just a few minutes looking at another user's mail. Is that
A) Yes
B) No
C) We cannot say from the information given.
At what layer(s) do you find single network standards?
A) Layer 1
B) Layer 2
C) both A and B
D) neither A nor B
A sending host will retransmit a TCP segment if it ________.
A) receives an ACK segment
B) receives a NAC segment
C) receives an RPT segment
D) none of the above
In the Five General Layers Standard, which layer's standards govern application
message fragmentation?
A) 2
B) 3
C) 4
D) 5
Multiplexing ________.
A) reduces cost
B) increases transmission speed
C) both A and B
D) neither A nor B
What is the strongest security protocol for 802.11 today?
A) 802.11i
B) 802.11s
C) 802.11X
Which of the following is true about NAT?
A) It can enhance security.
B) It presents problems for some protocols.
C) both A and B
D) neither A nor B
In the mask, how many 1s are there?
A) 8
B) 16
C) 24
D) We cannot say.
802.11 data link layer standards govern ________.
A) frame organization
B) access point operation
C) both A and B
D) neither A nor B
IPsec is used for ________ VPNs.
A) remote-access
B) site-to-site
C) both A and B
D) neither A nor B
In symmetric key encryption, a key must be ________ bits long, or longer, to be
considered strong. (Choose the choice closest to the correct answer.)
A) 36
B) 56
C) 64
D) 128
2.4 GHz and 5 GHz are ________.
A) frequency spectrums
B) broadbands
C) channels
D) service bands
How many DNS root servers are there?
A) 1
B) 2
C) 10
D) 13
PSTN signaling in the United States uses ________.
A) SS7
If someone has been properly authenticated, they should receive ________ permissions.
A) all
B) no
C) maximum
D) minimum
Dividing an application message into a series of smaller message segments is called
A) fragmentation
B) packetization
C) serialization
D) multiplexing
For 100,000 addresses, which will have fewer rows?
A) a routing table
B) an Ethernet switching table
C) Both will be about the same length.
Which can be moved more easily?
A) a physical server
B) a virtual machine
C) Both are about equally easy to move.
D) Neither can be moved easily.