CICS 58963

subject Type Homework Help
subject Pages 9
subject Words 1039
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Priority addresses the problem of ________.
A) momentary traffic peaks
B) chronic under-capacity
C) both A and B
D) neither A nor B
The Trojan horse placed on the first compromised GHOSTNET client could ________.
A) conduct audio and video surveillance
B) delete files
C) both A and B
D) neither A nor B
In a single network transmission, there is always ________.
A) a single frame
B) a single data link
C) both A and B
page-pf2
D) neither A nor B
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have
per subnet?
A) 14
B) 16
C) 254
D) none of the above
Which of the following can be upgraded after it is installed on a victim computer?
(Choose the most specific answer.)
A) Trojan horses
B) bots
C) viruses
D) worms
page-pf3
The routing prefix in IPv6 is like the ________ part in an IPv4 address.
A) network
B) subnet
C) host
D) both A and B
The main benefit of parallel transmission over serial transmission is ________.
A) reliability
B) speed
C) both A and B
D) neither A nor B
page-pf4
What is pushing IPv6 adoption now?
A) pressure from ISPs
B) pressure from the IETF
C) pressure from ISO
D) none of the above
In coaxial cable, the two conductors ________.
A) run side-by-side
B) are twisted around each other
C) both A and B
D) neither A nor B
A networking device that plays an important role in directing network communication
is called a ________.
A) client
B) server
page-pf5
C) host
D) router
Satellite ________ operate on a point-to-point basis.
A) uplinks
B) downlinks
C) both A and B
D) neither A nor B
A media gateway translates ________ transmissions.
A) signaling
B) transport
C) both A and B
D) neither A nor B
page-pf6
Optical fiber cords use two strands ________.
A) for reliability through redundancy
B) to form a complete electrical loop
C) to double the transmission speed
D) for full-duplex transmission
Ethernet standards are specified at the ________ layer.
A) physical
B) data link
C) both A and B
D) neither A nor B
page-pf7
Which device holds authentication data?
A) authenticator
B) authentication server
C) both A and B
D) neither A nor B
Which of the following is one of the three parts of an IPv4 address?
A) subnet part
B) mask
C) both A and B
D) neither A nor B
When an application program transmits a message, what will the SECOND field be in
the message that is sent over the transmission link?
A) application header
B) packet header
page-pf8
C) transport header
D) frame header
The highest-level DNS servers are called ________.
A) root servers
B) top-level servers
C) both A and B
D) neither A nor B
To use an access point, you need to know its ________.
A) SSID
B) BSSID
C) ESSID
D) Wi-Fi ID
page-pf9
Balancing threats against protection costs is called ________.
A) economic justification
B) risk analysis
C) comprehensive security
D) defense in depth
In the United States, which of the following is a carrier?
A) ILEC
B) LATA
C) both A and B
D) neither A nor B
page-pfa
Application programs on ________ communicate by sending messages between each
other.
A) the same host
B) different hosts
C) the same network
D) different networks
________ are carried inside ________.
A) Packets, frames
B) Frames, packets
C) Frames, application message segments
D) Packets, application message segments
LANs are ________.
A) single networks
B) local internets
page-pfb
C) either A or B
D) neither A nor B
In caching, ________.
A) a message may not have to be transmitted
B) messages are cached at the transmitting end of the line
C) both A and B
D) neither A nor B
Which of the following is a benefit of using a central authentication server?
A) consistency in authentication
B) faster changes when authentication information needs to be changed
C) both A and B
D) neither A nor B
page-pfc
Which of the following uses an access point?
A) traditional Wi-Fi
B) Wi-Fi Direct
C) both A and B
D) neither A nor B
To drive around a city looking for working access points that are unprotected is
________.
A) drive-by hacking
B) war driving
In MPLS, the packet travels along the ________.
A) route
page-pfd
B) data link
C) label-switched path
D) MPLS path
In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in
order to get .torrent files.
A) swarm
B) index
C) tracker
D) none of the above
The messages of VPNs ________.
A) share the same transmission lines
B) are encrypted
C) both A and B
D) neither A nor B
page-pfe
Attackers only need to find a single weakness to break in. Consequently, companies
must ________.
A) have comprehensive security
B) have insurance
C) do risk analysis
D) only give minimum permissions
The address 60.49.7.254 is represented in ________.
A) dotted decimal notation
B) EUI-48 notation
C) hexadecimal notation
D) binary notation

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.