Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

CMCS 14176

July 19, 2017
BPSK uses ________ phase levels.
A) 2
B) 4
C) 8
D) 15
Which of the following layers has more standards than the other three layers?
A) data link
B) Internet
C) transport
D) application
Actions that people are allowed to take on a resource come under the heading of
________.
A) hacks
B) authorizations
C) exploits
D) risks
Which of the following must be followed?
A) standards
B) guidelines
C) both A and B
D) neither A nor B
In authentication, the ________ is the party trying to prove his or her identity.
A) supplicant
B) verifier
C) true party
D) all of the above
A network that runs on the customer premises is a ________.
A) LAN
B) WAN
C) both A and B
D) neither A nor B
The encapsulating security protocol offers ________.
A) confidentiality
B) authentication
C) both A and B
D) neither A nor B
Which part of a message is less often in a message compared to the other two parts?
A) header
B) data field
C) trailer
D) All of the above are commonly seen in all messages.
In LANs, ________ typically is for ________.
A) optical fiber, access lines
B) UTP, access lines
C) UTP, trunk lines
D) none of the above
SDN holds the promise of bringing ________.
A) lower cost
B) lower agility
C) both A and B
D) neither A nor B
In ________, when a wireless host wishes to send, it first sends a message to the
wireless access point asking for permission to send. When the access point sends back a
response, the host sending the original message may transmit. All other hosts must wait.
A) CSMA/CA+ACK
B) CSMA/CA
C) CSMA/CD
D) RTS/CTS
Which Bluetooth profile would a desktop use with a Bluetooth keyboard?
A) Bluetooth input profile
B) Bluetooth I/O profile
C) human interface device profile
D) none of the above
Which of the following has more diversity in technologies?
A) LANs
B) WANs
C) Both A and B are about equal in diversity of technologies.
Which type of service manages application software for users?
A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Media access control governs transmission by ________.
A) access points
B) wireless hosts
C) both A and B
D) neither A nor B
Which of the following is a common use for carrier WANs?
A) to connect corporate sites
B) to connect a corporate site to the Internet
C) both A and B
D) neither A nor B
For PBXs, call forwarding is ________.
A) a user service
B) an attendant service
C) a management service
In MPLS, the ________ adds the label to the packet.
A) source host
B) first label-switching router
C) both A and B
D) neither A nor B
In VPNs designed to frustrate evil twin attacks, the shared secret ________.
A) is transmitted in the clear
B) is transmitted with cryptographic protections
C) is not transmitted
D) Any of the above.
For their transmission medium, cable television companies primarily use ________.
A) 2-pair VG UTP cabling
B) 2-pair DG UTP cabling
C) coaxial cable
D) 4-pair UTP
Ethernet standards are specified at the ________ layer.
A) physical
B) internet
C) both A and B
D) neither A nor B
In a PSDN, customers connect to the network core at ________.
A) NAPs
B) public/private access points
C) POPs
D) DSLAMs
WAN optimization provides ________.
A) network protocol acceleration
B) caching
C) both A and B
D) neither A nor B
Which of the following DSL services usually offers QoS guarantees?
A) residential
B) business
C) both A and B
D) neither A nor B
Which of the following signaling standards is likely to dominate in VoIP?
A) SIP
B) H.323
Which of the following can handle an application message that is one megabyte in size?
A) TCP
B) UDP
C) both A and B
D) neither A nor B
Companies are moving to the 5 GHz band because there is ________ than in the 2.5
GHz band.
A) more bandwidth
B) less absorptive attenuation
C) both A and B
D) neither A nor B
Routers usually are connected in a ________ topology.
A) point-to-point
B) mesh
C) hierarchical
D) bus
The general name for malware on a user's PC that collects sensitive information and
sends this information to an attacker is ________.
A) keystroke loggers
B) anti-privacy software
C) spyware
D) data mining software
SDN ________.
A) reduces CapEx
B) increases OPEx
C) both A and B
D) neither A nor B
Which of the following probably suffered the most financial damage from the Target
breach?
A) Target
B) banks
C) consumers
D) POS vendors
An extended service set (ESS) is a group of BSSs that ________.
A) are connected to the same distribution system
B) have the same SSID
C) both A and B
D) neither A nor B
In data wiring, there need to be four wires for each computer on the floor in ________.
A) horizontal distribution
B) vertical distribution
C) both A and B
D) neither A nor B
Electronic signatures provide message-by-message ________.
A) authentication
B) confidentiality
C) both A and B
D) neither A nor B