Book Title
Business Data Networks and Security 10th Edition

CMCS 33478

July 19, 2017
To make a forwarding decision, a router looks at the arriving packet's ________.
A) destination IP address
B) destination EUI-48 address
C) both A and B
D) MAC addresses
Which of the following can spread more rapidly?
A) directly-propagating viruses
B) directly-propagating worms
C) Both of the above can spread with approximately equal speed.
The application standard is almost always ________.
C) reliable
D) None of the above is true.
The main disadvantage of transport mode protection compared to tunnel mode
protection in IP is ________.
A) that it provides protection over only part of the route
B) higher cost
C) both A and B
D) neither A nor B
Which of the following is a host when it is on a network?
A) a client PC
B) a server
C) a mobile phone
D) all of the above
In SDN, which device manages the control function for individual devices?
A) SNMP manager console
B) forwarding device itself
C) SDN policy server
D) SDN controller
Leased lines offer ________ service.
A) fast
B) any-to-any
C) rapid-connection
D) none of the above
A notebook computer configured to act like a real access point is a(n) ________.
A) evil twin access point
B) rogue access point
On a server, well-known port numbers indicate ________.
A) applications
B) connections with client computers
C) both A and B
D) neither A nor B
What layer number is the physical layer?
A) 1
B) 2
C) 3
D) 4
Which of the following has a dangerous vulnerability that is causing problems today?
B) 802.11i
802.11i provides ________.
A) confidentiality
B) message integrity
C) both A and B
D) neither A nor B
Small malware programs that download larger malware programs are called ________.
A) downloaders
B) scouts
C) foothold programs
D) stage-one programs
Two-way amplifiers are needed for cable ________ service.
A) television
B) data
C) both A and B
D) neither A nor B
A company receives its domain name from ________.
B) its ISP
C) a domain registrar
D) its parents
A LAN is the network that ________.
A) links different sites together
B) provides service within a company
C) provides service within a site
D) all of the above
A ________ is a flaw in a program that permits a specific attack or set of attacks against
this problem.
A) malware
B) security error
C) vulnerability
D) security fault
How do WAN carriers typically get their trunk lines?
A) They construct them.
B) They lease them from telephone companies.
C) They use wireless transmission.
D) They use the Internet.
Latency is usually measured in ________.
A) bits per second (bps)
B) milliseconds (ms)
C) minutes of downtime
D) none of the above
ISPs usually offer QoS guarantees to ________.
A) residential customers
B) business customers
C) both A and B
D) neither A nor B
A program that can capture passwords as you enter them is ________.
A) a keystroke logger
B) data mining software
C) both A and B
D) neither A nor B
I wish to have a wireless LAN to serve my house. I will use ________.
A) 802.11
B) Bluetooth
C) either A or B
Which of the following provide(s) overall regulations for the U.S. carriers in the United
C) neither A nor B
Content delivery networks mainly ________.
A) increase transmission speed
B) increase program selection
C) decrease program selection
D) reduce latency
If I simplify the address 2001:0ed2:056b:00d3:000c:abcd:0bcd:0fe0, I get ________.
A) 2001:ed2:56b:d3:c:abcd:bcd:fe0
B) 2001:ed2:56b:d3:c:abcd:bcd:fe
C) either A or B
D) neither A nor B
How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP
SYN segment?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
How many bytes will it take to transmit "Brain Dead" without the quotation marks?
A) 2
B) 3
C) 9
D) none of the above
NAT enhances security by ________.
A) preventing sniffers from learning internal IP addresses
B) encryption
C) both A and B
D) neither A nor B
To handle multiple conversations in radio transmission, you normally use multiple
A) channels
B) frequencies
C) service bands
D) wires
The frequency spectrum extends ________.
A) into the gigahertz range
B) into the visible light range
C) into the ultraviolet range
D) to infinity
The password "velociraptor" can be defeated most quickly by a ________.
A) dictionary attack
B) reverse engineering attack
C) brute-force attack
D) None of the above because it is more than 8 characters long.
Which of the following usually offers higher speeds?
C) Both A and B are about equal in typical speeds.
In BitTorrent, the group of all connected computers that have all or part of the file to be
downloaded is called the ________.
A) swarm
B) index peers
C) trackers
D) none of the above
The version number field in IPv6 has the value ________.
A) 0001
B) 0100
C) 0101
D) 0110
What layer number is the Internet layer?
A) 1
B) 2
C) 3
D) 4