CMCS 33478

subject Type Homework Help
subject Pages 9
subject Words 1101
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
To make a forwarding decision, a router looks at the arriving packet's ________.
A) destination IP address
B) destination EUI-48 address
C) both A and B
D) MAC addresses
Which of the following can spread more rapidly?
A) directly-propagating viruses
B) directly-propagating worms
C) Both of the above can spread with approximately equal speed.
The application standard is almost always ________.
A) HTTP
B) TCP
C) reliable
D) None of the above is true.
page-pf2
The main disadvantage of transport mode protection compared to tunnel mode
protection in IP is ________.
A) that it provides protection over only part of the route
B) higher cost
C) both A and B
D) neither A nor B
Which of the following is a host when it is on a network?
A) a client PC
B) a server
C) a mobile phone
D) all of the above
page-pf3
In SDN, which device manages the control function for individual devices?
A) SNMP manager console
B) forwarding device itself
C) SDN policy server
D) SDN controller
Leased lines offer ________ service.
A) fast
B) any-to-any
C) rapid-connection
D) none of the above
A notebook computer configured to act like a real access point is a(n) ________.
A) evil twin access point
B) rogue access point
page-pf4
On a server, well-known port numbers indicate ________.
A) applications
B) connections with client computers
C) both A and B
D) neither A nor B
What layer number is the physical layer?
A) 1
B) 2
C) 3
D) 4
page-pf5
Which of the following has a dangerous vulnerability that is causing problems today?
A) PEAP
B) 802.11i
C) WPA
D) WPS
802.11i provides ________.
A) confidentiality
B) message integrity
C) both A and B
D) neither A nor B
Small malware programs that download larger malware programs are called ________.
A) downloaders
B) scouts
page-pf6
C) foothold programs
D) stage-one programs
Two-way amplifiers are needed for cable ________ service.
A) television
B) data
C) both A and B
D) neither A nor B
A company receives its domain name from ________.
A) IETF
B) its ISP
C) a domain registrar
D) its parents
page-pf7
A LAN is the network that ________.
A) links different sites together
B) provides service within a company
C) provides service within a site
D) all of the above
A ________ is a flaw in a program that permits a specific attack or set of attacks against
this problem.
A) malware
B) security error
C) vulnerability
D) security fault
page-pf8
How do WAN carriers typically get their trunk lines?
A) They construct them.
B) They lease them from telephone companies.
C) They use wireless transmission.
D) They use the Internet.
Latency is usually measured in ________.
A) bits per second (bps)
B) milliseconds (ms)
C) minutes of downtime
D) none of the above
ISPs usually offer QoS guarantees to ________.
A) residential customers
B) business customers
C) both A and B
page-pf9
D) neither A nor B
A program that can capture passwords as you enter them is ________.
A) a keystroke logger
B) data mining software
C) both A and B
D) neither A nor B
I wish to have a wireless LAN to serve my house. I will use ________.
A) 802.11
B) Bluetooth
C) either A or B
page-pfa
Which of the following provide(s) overall regulations for the U.S. carriers in the United
States?
A) FCC
B) PUCs
C) neither A nor B
Content delivery networks mainly ________.
A) increase transmission speed
B) increase program selection
C) decrease program selection
D) reduce latency
If I simplify the address 2001:0ed2:056b:00d3:000c:abcd:0bcd:0fe0, I get ________.
A) 2001:ed2:56b:d3:c:abcd:bcd:fe0
page-pfb
B) 2001:ed2:56b:d3:c:abcd:bcd:fe
C) either A or B
D) neither A nor B
How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP
SYN segment?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
How many bytes will it take to transmit "Brain Dead" without the quotation marks?
A) 2
B) 3
C) 9
D) none of the above
page-pfc
NAT enhances security by ________.
A) preventing sniffers from learning internal IP addresses
B) encryption
C) both A and B
D) neither A nor B
To handle multiple conversations in radio transmission, you normally use multiple
________.
A) channels
B) frequencies
C) service bands
D) wires
page-pfd
The frequency spectrum extends ________.
A) into the gigahertz range
B) into the visible light range
C) into the ultraviolet range
D) to infinity
The password "velociraptor" can be defeated most quickly by a ________.
A) dictionary attack
B) reverse engineering attack
C) brute-force attack
D) None of the above because it is more than 8 characters long.
Which of the following usually offers higher speeds?
A) LANs
B) WANs
page-pfe
C) Both A and B are about equal in typical speeds.
In BitTorrent, the group of all connected computers that have all or part of the file to be
downloaded is called the ________.
A) swarm
B) index peers
C) trackers
D) none of the above
The version number field in IPv6 has the value ________.
A) 0001
B) 0100
C) 0101
D) 0110
page-pff
What layer number is the Internet layer?
A) 1
B) 2
C) 3
D) 4

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.