Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

CICS 58963

July 19, 2017
Priority addresses the problem of ________.
A) momentary traffic peaks
B) chronic under-capacity
C) both A and B
D) neither A nor B
The Trojan horse placed on the first compromised GHOSTNET client could ________.
A) conduct audio and video surveillance
B) delete files
C) both A and B
D) neither A nor B
In a single network transmission, there is always ________.
A) a single frame
B) a single data link
C) both A and B
D) neither A nor B
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have
per subnet?
A) 14
B) 16
C) 254
D) none of the above
Which of the following can be upgraded after it is installed on a victim computer?
(Choose the most specific answer.)
A) Trojan horses
B) bots
C) viruses
D) worms
The routing prefix in IPv6 is like the ________ part in an IPv4 address.
A) network
B) subnet
C) host
D) both A and B
The main benefit of parallel transmission over serial transmission is ________.
A) reliability
B) speed
C) both A and B
D) neither A nor B
What is pushing IPv6 adoption now?
A) pressure from ISPs
B) pressure from the IETF
C) pressure from ISO
D) none of the above
In coaxial cable, the two conductors ________.
A) run side-by-side
B) are twisted around each other
C) both A and B
D) neither A nor B
A networking device that plays an important role in directing network communication
is called a ________.
A) client
B) server
C) host
D) router
Satellite ________ operate on a point-to-point basis.
A) uplinks
B) downlinks
C) both A and B
D) neither A nor B
A media gateway translates ________ transmissions.
A) signaling
B) transport
C) both A and B
D) neither A nor B
Optical fiber cords use two strands ________.
A) for reliability through redundancy
B) to form a complete electrical loop
C) to double the transmission speed
D) for full-duplex transmission
Ethernet standards are specified at the ________ layer.
A) physical
B) data link
C) both A and B
D) neither A nor B
Which device holds authentication data?
A) authenticator
B) authentication server
C) both A and B
D) neither A nor B
Which of the following is one of the three parts of an IPv4 address?
A) subnet part
B) mask
C) both A and B
D) neither A nor B
When an application program transmits a message, what will the SECOND field be in
the message that is sent over the transmission link?
A) application header
B) packet header
C) transport header
D) frame header
The highest-level DNS servers are called ________.
A) root servers
B) top-level servers
C) both A and B
D) neither A nor B
To use an access point, you need to know its ________.
A) SSID
B) BSSID
C) ESSID
D) Wi-Fi ID
Balancing threats against protection costs is called ________.
A) economic justification
B) risk analysis
C) comprehensive security
D) defense in depth
In the United States, which of the following is a carrier?
A) ILEC
B) LATA
C) both A and B
D) neither A nor B
Application programs on ________ communicate by sending messages between each
other.
A) the same host
B) different hosts
C) the same network
D) different networks
________ are carried inside ________.
A) Packets, frames
B) Frames, packets
C) Frames, application message segments
D) Packets, application message segments
LANs are ________.
A) single networks
B) local internets
C) either A or B
D) neither A nor B
In caching, ________.
A) a message may not have to be transmitted
B) messages are cached at the transmitting end of the line
C) both A and B
D) neither A nor B
Which of the following is a benefit of using a central authentication server?
A) consistency in authentication
B) faster changes when authentication information needs to be changed
C) both A and B
D) neither A nor B
Which of the following uses an access point?
A) traditional Wi-Fi
B) Wi-Fi Direct
C) both A and B
D) neither A nor B
To drive around a city looking for working access points that are unprotected is
________.
A) drive-by hacking
B) war driving
In MPLS, the packet travels along the ________.
A) route
B) data link
C) label-switched path
D) MPLS path
In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in
order to get .torrent files.
A) swarm
B) index
C) tracker
D) none of the above
The messages of VPNs ________.
A) share the same transmission lines
B) are encrypted
C) both A and B
D) neither A nor B
Attackers only need to find a single weakness to break in. Consequently, companies
must ________.
A) have comprehensive security
B) have insurance
C) do risk analysis
D) only give minimum permissions
The address 60.49.7.254 is represented in ________.
A) dotted decimal notation
B) EUI-48 notation
C) hexadecimal notation
D) binary notation