COMP 18610

subject Type Homework Help
subject Pages 9
subject Words 981
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Strong security is needed to ________.
A) collect information from remote switches
B) reconfigure remote switches
C) have a MIB
D) reduce total costs
If more users move to an access point, this decreases ________.
A) individual throughput
B) aggregate throughput
C) both A and B
D) neither A nor B
How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP
FIN segment?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
page-pf2
C) both A and B
D) neither A nor B
For PBXs, call transfer is ________.
A) a user service
B) an attendant service
C) a management service
What type of address is 32 bits long?
A) IPv4
B) IPv6
C) EUI-48
D) all of the above
page-pf3
In the 5 GHz band, how many channels can you have with 802.11ac with 80 GHz
channels?
A) 1
B) 6
C) 12
D) 24
We use the terms Wi-Fi and ________ interchangeably in this book.
A) 802.1
B) 802.3
C) 802.11
D) 802.1X
page-pf4
A lesson of XSS is that programmers should never trust ________.
A) contractors
B) their own staff colleagues
C) databases
D) user input
Today, it can be problematic to have only a single IPv6 stack because ________.
A) a single IPv4 stack is out of date
B) a single IPv6 stack could not communicate with a single IPv4 stack
C) a dual stack has become a common solution
D) all of the above
Errors may substantially reduce throughput in ________. (Pick the standard most
affected.)
A) IP
B) TCP
page-pf5
C) UDP
D) HTTP
QAM uses ________ levels.
A) loudness
B) frequency
C) both A and B
D) neither A nor B
SONET/SDH applies ________ when there is a break in a trunk line between switches.
A) the Spanning Tree Protocol
B) wrapping
C) half-duplex transmission
D) full-duplex transmission
page-pf6
MIMO ________.
A) bonds two or more channels for higher speed
B) is used in all forms of 802.11
C) uses a single spatial stream but multiple signals
D) transmits multiple signals in the same channel
Wireless network standards are ________ standards.
A) OSI
B) TCP/IP
C) both A and B
With 888 numbers, the ________ pays and pays ________ per minute than direct
distance dialing.
page-pf7
A) caller, more
B) caller, less
C) called party, more
D) called party, less
Pinging is to send ICMP ________ messages to the target host.
A) echo request
B) error advisement
C) ping
D) echo
In an HTTP, which one (browser or Webserver application program) transmits message
first?
A) browser
B) Webserver application program
C) They transmit simultaneously.
page-pf8
D) It depends on the situation.
To connect two sites at 2.8 Mbps, I would use ________.
A) a T1 line
B) bonded T1 lines
C) a T2 line
D) a T3 line
When an application program transmits a message, what will the first field be in the
message that is sent over the transmission link?
A) application header
B) packet header
C) transport header
D) frame header
page-pf9
Fiber to the home service is normally created by ________.
A) running optical fiber to neighborhoods
B) running individual fiber cords from the nearest switching building to individual
homes
C) both A and B
D) neither A nor B
In switched networks, to what device is a frame addressed?
A) the destination host
B) switches
C) both A and B
D) neither A nor B
page-pfa
At what layer would you find switches?
A) 1
B) 2
C) 3
D) 4
SNMPv1 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) all of the above
Which of the following only operates in the 5 GHz band?
A) 802.11b
B) 802.11ac
C) 802.11g
page-pfb
D) 802.11n
What 802 Working Group creates Ethernet standards?
A) 802.1
B) 802.2
C) 802.3
D) 802.11
A rogue access point ________.
A) is an unauthorized internal access point
B) often has very poor security
C) often operates at high power
D) All of the above are true.
page-pfc
ARP cache poisoning can be defeated using ________.
A) 802.1X
B) 802.3 Lock
C) 802.1AE
D) 802.2
In cellular technology, a ________ is a small geographical area.
A) cell
B) cellsite
C) both A and B
D) neither A nor B
page-pfd
In digital certificate authentication, the verifier uses ________.
A) the supplicant's public key
B) the true party's public key
C) both A and B
D) neither A nor B
Which of the following standards permits central management?
A) IPsec
B) SSL/TLS
C) both A and B
D) neither A nor B
Which is a problem with IPv4 addresses?
A) They cannot be used on wireless devices.
B) They are too complex.
C) Routers find it difficult to handle them.
page-pfe
D) We have run out of them.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.