CMCS 77557

subject Type Homework Help
subject Pages 9
subject Words 1021
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Spread spectrum transmission is used in WLANs for ________.
A) higher transmission speed
B) more reliable transmission
C) greater security
D) more efficient transmission
ACLs are used for packets in the ________ state.
A) connection-opening
B) ongoing communication
C) both A and B
D) neither A nor B
ARP operates at ________.
A) Layer 2
B) Layer 3
C) both A and B
page-pf2
D) neither A nor B
In antivirus filtering, the best ways to filter currently use ________.
A) application awareness
B) stateful inspection
C) signature detection
D) behavioral detection
0.02 Gbps can also be written as ________.
A) 2 Mbps
B) 20 Mbps
C) 200 Mbps
D) none of the above
page-pf3
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting
________ in the center.
A) the interface ID
B) the subnet ID
C) fffe
D) 0000
At what layer do you find EUI-48 addresses?
A) physical
B) data link
C) Internet
D) two or more of the above
page-pf4
________ read(s) the destination address in an Ethernet frame.
A) The destination host
B) Switches in the network
C) both A and B
D) neither A nor B
What propagation problem becomes worse as frequency increases?
A) inverse square law attenuation
B) electromagnetic interference
C) both A and B
D) neither A nor B
To determine if a host is reachable, you would send a(n) ________.
A) SNMP SET command
B) MIB
C) trap
page-pf5
D) ping
Which of the following attach themselves to other programs?
A) Viruses
B) Worms
C) both A and B
D) neither A nor B
Which of the following is used most heavily in LANs for fiber transmission links?
A) modal bandwidth fiber
B) 1.550 nm fiber
C) single-mode fiber
D) multimode fiber
page-pf6
Most corporations wish to have ________ domain names.
A) top-level
B) second-level
C) third-level
D) none of the above
Which of the following tends to be more damaging to the victim?
A) credit card theft
B) identity theft
C) Both are about equally damaging to the victim.
D) Neither is damaging to the victim.
page-pf7
The general name for a security flaw in a program is a ________.
A) virus
B) malware
C) security fault
D) vulnerability
Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you
have per subnet?
A) 126
B) 254
C) 534
D) 65,534
WANs are ________.
A) single networks
B) internets
page-pf8
C) either A or B
D) neither A nor B
Managed Ethernet switches ________.
A) are not standardized
B) are managed by an outsourcing company
C) reduce hardware costs
D) reduce labor costs
An attack in which an authentic-looking e-mail or website entices a user to enter his or
her username, password, or other sensitive information is called ________. (Select the
most specific answer.)
A) phishing
B) identity theft
C) social engineering
D) a spyware attack
page-pf9
A mask has ________ bits.
A) 8
B) 16
C) 32
D) We cannot say.
SDN can ________.
A) permit routing rules to be changed rapidly
B) reduces router costs
C) both A and B
D) neither A nor B
page-pfa
In TDM, a voice conversation gets the same ________ in each ________.
A) frame, packet
B) packet, frame
C) frame, slot
D) slot, frame
Part of WPS weakness is caused by ________.
A) 802.1X mode
B) WPA2 preshared key mode
C) dividing the 8 digit PIN into two 4 digit halves
D) IPsec
The source socket is 60.171.18.22:2707. The source is a(n) ________.
A) client
B) server
C) well-known server
page-pfb
D) ephemeral server
Bluetooth is for ________.
A) large WLANs
B) cable replacement
C) both A and B
D) neither A nor B
T1 leased lines run at a speed of about ________.
A) 250 kbps
B) 1 Mbps
C) 10 Mbps
D) 45 Mbps
page-pfc
A 5-bit field can represent ________ alternatives or different combinations.
A) 8
B) 16
C) 32
D) 64
Why is Carrier Ethernet popular?
A) It uses a familiar technology.
B) It has attractive prices.
C) both A and B
D) neither A nor B
page-pfd
After authentication in 80.11i PSK mode, a wireless client communicates with the
access point via a(n) ________ key.
A) VPN
B) session
C) 802.1X
D) preshared
The ________ standard was created to prevent attackers from walking in and simply
plugging a computer into a wall jack and therefore accessing the network.
A) Ethernet firewall
B) 802.1AE
C) 802.3X
D) 802.1X
An MTSO ________.
A) controls cellsites in a cellular system
B) links mobile users to wired telephone customers
page-pfe
C) both A and B
D) neither A nor B
How many wires are there is a UTP Ethernet cord?
A) 1
B) 2
C) 4
D) 8
Which of the following would a mail order company's customers prefer?
A) 900 number service
B) 800 number service
C) WATS service
D) They would have no preference among these choices.
page-pff
The new version of Internet Protocol that is coming into use is IP version ________.
A) 1
B) 2
C) 6
D) 8

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.