Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

CMCS 77557

July 19, 2017
Spread spectrum transmission is used in WLANs for ________.
A) higher transmission speed
B) more reliable transmission
C) greater security
D) more efficient transmission
ACLs are used for packets in the ________ state.
A) connection-opening
B) ongoing communication
C) both A and B
D) neither A nor B
ARP operates at ________.
A) Layer 2
B) Layer 3
C) both A and B
D) neither A nor B
In antivirus filtering, the best ways to filter currently use ________.
A) application awareness
B) stateful inspection
C) signature detection
D) behavioral detection
0.02 Gbps can also be written as ________.
A) 2 Mbps
B) 20 Mbps
C) 200 Mbps
D) none of the above
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting
________ in the center.
A) the interface ID
B) the subnet ID
C) fffe
D) 0000
At what layer do you find EUI-48 addresses?
A) physical
B) data link
C) Internet
D) two or more of the above
________ read(s) the destination address in an Ethernet frame.
A) The destination host
B) Switches in the network
C) both A and B
D) neither A nor B
What propagation problem becomes worse as frequency increases?
A) inverse square law attenuation
B) electromagnetic interference
C) both A and B
D) neither A nor B
To determine if a host is reachable, you would send a(n) ________.
A) SNMP SET command
B) MIB
C) trap
D) ping
Which of the following attach themselves to other programs?
A) Viruses
B) Worms
C) both A and B
D) neither A nor B
Which of the following is used most heavily in LANs for fiber transmission links?
A) modal bandwidth fiber
B) 1.550 nm fiber
C) single-mode fiber
D) multimode fiber
Most corporations wish to have ________ domain names.
A) top-level
B) second-level
C) third-level
D) none of the above
Which of the following tends to be more damaging to the victim?
A) credit card theft
B) identity theft
C) Both are about equally damaging to the victim.
D) Neither is damaging to the victim.
The general name for a security flaw in a program is a ________.
A) virus
B) malware
C) security fault
D) vulnerability
Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you
have per subnet?
A) 126
B) 254
C) 534
D) 65,534
WANs are ________.
A) single networks
B) internets
C) either A or B
D) neither A nor B
Managed Ethernet switches ________.
A) are not standardized
B) are managed by an outsourcing company
C) reduce hardware costs
D) reduce labor costs
An attack in which an authentic-looking e-mail or website entices a user to enter his or
her username, password, or other sensitive information is called ________. (Select the
most specific answer.)
A) phishing
B) identity theft
C) social engineering
D) a spyware attack
A mask has ________ bits.
A) 8
B) 16
C) 32
D) We cannot say.
SDN can ________.
A) permit routing rules to be changed rapidly
B) reduces router costs
C) both A and B
D) neither A nor B
In TDM, a voice conversation gets the same ________ in each ________.
A) frame, packet
B) packet, frame
C) frame, slot
D) slot, frame
Part of WPS weakness is caused by ________.
A) 802.1X mode
B) WPA2 preshared key mode
C) dividing the 8 digit PIN into two 4 digit halves
D) IPsec
The source socket is 60.171.18.22:2707. The source is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
Bluetooth is for ________.
A) large WLANs
B) cable replacement
C) both A and B
D) neither A nor B
T1 leased lines run at a speed of about ________.
A) 250 kbps
B) 1 Mbps
C) 10 Mbps
D) 45 Mbps
A 5-bit field can represent ________ alternatives or different combinations.
A) 8
B) 16
C) 32
D) 64
Why is Carrier Ethernet popular?
A) It uses a familiar technology.
B) It has attractive prices.
C) both A and B
D) neither A nor B
After authentication in 80.11i PSK mode, a wireless client communicates with the
access point via a(n) ________ key.
A) VPN
B) session
C) 802.1X
D) preshared
The ________ standard was created to prevent attackers from walking in and simply
plugging a computer into a wall jack and therefore accessing the network.
A) Ethernet firewall
B) 802.1AE
C) 802.3X
D) 802.1X
An MTSO ________.
A) controls cellsites in a cellular system
B) links mobile users to wired telephone customers
C) both A and B
D) neither A nor B
How many wires are there is a UTP Ethernet cord?
A) 1
B) 2
C) 4
D) 8
Which of the following would a mail order company's customers prefer?
A) 900 number service
B) 800 number service
C) WATS service
D) They would have no preference among these choices.
The new version of Internet Protocol that is coming into use is IP version ________.
A) 1
B) 2
C) 6
D) 8