CMCS 14176

subject Type Homework Help
subject Pages 9
subject Words 1086
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
BPSK uses ________ phase levels.
A) 2
B) 4
C) 8
D) 15
Which of the following layers has more standards than the other three layers?
A) data link
B) Internet
C) transport
D) application
Actions that people are allowed to take on a resource come under the heading of
________.
A) hacks
B) authorizations
page-pf2
C) exploits
D) risks
Which of the following must be followed?
A) standards
B) guidelines
C) both A and B
D) neither A nor B
In authentication, the ________ is the party trying to prove his or her identity.
A) supplicant
B) verifier
C) true party
D) all of the above
page-pf3
A network that runs on the customer premises is a ________.
A) LAN
B) WAN
C) both A and B
D) neither A nor B
The encapsulating security protocol offers ________.
A) confidentiality
B) authentication
C) both A and B
D) neither A nor B
page-pf4
Which part of a message is less often in a message compared to the other two parts?
A) header
B) data field
C) trailer
D) All of the above are commonly seen in all messages.
In LANs, ________ typically is for ________.
A) optical fiber, access lines
B) UTP, access lines
C) UTP, trunk lines
D) none of the above
SDN holds the promise of bringing ________.
A) lower cost
B) lower agility
C) both A and B
page-pf5
D) neither A nor B
In ________, when a wireless host wishes to send, it first sends a message to the
wireless access point asking for permission to send. When the access point sends back a
response, the host sending the original message may transmit. All other hosts must wait.
A) CSMA/CA+ACK
B) CSMA/CA
C) CSMA/CD
D) RTS/CTS
Which Bluetooth profile would a desktop use with a Bluetooth keyboard?
A) Bluetooth input profile
B) Bluetooth I/O profile
C) human interface device profile
D) none of the above
page-pf6
Which of the following has more diversity in technologies?
A) LANs
B) WANs
C) Both A and B are about equal in diversity of technologies.
Which type of service manages application software for users?
A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
page-pf7
Media access control governs transmission by ________.
A) access points
B) wireless hosts
C) both A and B
D) neither A nor B
Which of the following is a common use for carrier WANs?
A) to connect corporate sites
B) to connect a corporate site to the Internet
C) both A and B
D) neither A nor B
For PBXs, call forwarding is ________.
A) a user service
B) an attendant service
C) a management service
page-pf8
In MPLS, the ________ adds the label to the packet.
A) source host
B) first label-switching router
C) both A and B
D) neither A nor B
In VPNs designed to frustrate evil twin attacks, the shared secret ________.
A) is transmitted in the clear
B) is transmitted with cryptographic protections
C) is not transmitted
D) Any of the above.
page-pf9
For their transmission medium, cable television companies primarily use ________.
A) 2-pair VG UTP cabling
B) 2-pair DG UTP cabling
C) coaxial cable
D) 4-pair UTP
Ethernet standards are specified at the ________ layer.
A) physical
B) internet
C) both A and B
D) neither A nor B
In a PSDN, customers connect to the network core at ________.
A) NAPs
B) public/private access points
page-pfa
C) POPs
D) DSLAMs
WAN optimization provides ________.
A) network protocol acceleration
B) caching
C) both A and B
D) neither A nor B
Which of the following DSL services usually offers QoS guarantees?
A) residential
B) business
C) both A and B
D) neither A nor B
page-pfb
Which of the following signaling standards is likely to dominate in VoIP?
A) SIP
B) H.323
Which of the following can handle an application message that is one megabyte in size?
A) TCP
B) UDP
C) both A and B
D) neither A nor B
Companies are moving to the 5 GHz band because there is ________ than in the 2.5
GHz band.
page-pfc
A) more bandwidth
B) less absorptive attenuation
C) both A and B
D) neither A nor B
Routers usually are connected in a ________ topology.
A) point-to-point
B) mesh
C) hierarchical
D) bus
The general name for malware on a user's PC that collects sensitive information and
sends this information to an attacker is ________.
A) keystroke loggers
B) anti-privacy software
C) spyware
page-pfd
D) data mining software
SDN ________.
A) reduces CapEx
B) increases OPEx
C) both A and B
D) neither A nor B
Which of the following probably suffered the most financial damage from the Target
breach?
A) Target
B) banks
C) consumers
D) POS vendors
page-pfe
An extended service set (ESS) is a group of BSSs that ________.
A) are connected to the same distribution system
B) have the same SSID
C) both A and B
D) neither A nor B
In data wiring, there need to be four wires for each computer on the floor in ________.
A) horizontal distribution
B) vertical distribution
C) both A and B
D) neither A nor B
page-pff
Electronic signatures provide message-by-message ________.
A) authentication
B) confidentiality
C) both A and B
D) neither A nor B

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.