Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

COMP 18610

July 19, 2017
Strong security is needed to ________.
A) collect information from remote switches
B) reconfigure remote switches
C) have a MIB
D) reduce total costs
If more users move to an access point, this decreases ________.
A) individual throughput
B) aggregate throughput
C) both A and B
D) neither A nor B
How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP
FIN segment?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
For PBXs, call transfer is ________.
A) a user service
B) an attendant service
C) a management service
What type of address is 32 bits long?
A) IPv4
B) IPv6
C) EUI-48
D) all of the above
In the 5 GHz band, how many channels can you have with 802.11ac with 80 GHz
channels?
A) 1
B) 6
C) 12
D) 24
We use the terms Wi-Fi and ________ interchangeably in this book.
A) 802.1
B) 802.3
C) 802.11
D) 802.1X
A lesson of XSS is that programmers should never trust ________.
A) contractors
B) their own staff colleagues
C) databases
D) user input
Today, it can be problematic to have only a single IPv6 stack because ________.
A) a single IPv4 stack is out of date
B) a single IPv6 stack could not communicate with a single IPv4 stack
C) a dual stack has become a common solution
D) all of the above
Errors may substantially reduce throughput in ________. (Pick the standard most
affected.)
A) IP
B) TCP
C) UDP
D) HTTP
QAM uses ________ levels.
A) loudness
B) frequency
C) both A and B
D) neither A nor B
SONET/SDH applies ________ when there is a break in a trunk line between switches.
A) the Spanning Tree Protocol
B) wrapping
C) half-duplex transmission
D) full-duplex transmission
MIMO ________.
A) bonds two or more channels for higher speed
B) is used in all forms of 802.11
C) uses a single spatial stream but multiple signals
D) transmits multiple signals in the same channel
Wireless network standards are ________ standards.
A) OSI
B) TCP/IP
C) both A and B
With 888 numbers, the ________ pays and pays ________ per minute than direct
distance dialing.
A) caller, more
B) caller, less
C) called party, more
D) called party, less
Pinging is to send ICMP ________ messages to the target host.
A) echo request
B) error advisement
C) ping
D) echo
In an HTTP, which one (browser or Webserver application program) transmits message
first?
A) browser
B) Webserver application program
C) They transmit simultaneously.
D) It depends on the situation.
To connect two sites at 2.8 Mbps, I would use ________.
A) a T1 line
B) bonded T1 lines
C) a T2 line
D) a T3 line
When an application program transmits a message, what will the first field be in the
message that is sent over the transmission link?
A) application header
B) packet header
C) transport header
D) frame header
Fiber to the home service is normally created by ________.
A) running optical fiber to neighborhoods
B) running individual fiber cords from the nearest switching building to individual
homes
C) both A and B
D) neither A nor B
In switched networks, to what device is a frame addressed?
A) the destination host
B) switches
C) both A and B
D) neither A nor B
At what layer would you find switches?
A) 1
B) 2
C) 3
D) 4
SNMPv1 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) all of the above
Which of the following only operates in the 5 GHz band?
A) 802.11b
B) 802.11ac
C) 802.11g
D) 802.11n
What 802 Working Group creates Ethernet standards?
A) 802.1
B) 802.2
C) 802.3
D) 802.11
A rogue access point ________.
A) is an unauthorized internal access point
B) often has very poor security
C) often operates at high power
D) All of the above are true.
ARP cache poisoning can be defeated using ________.
A) 802.1X
B) 802.3 Lock
C) 802.1AE
D) 802.2
In cellular technology, a ________ is a small geographical area.
A) cell
B) cellsite
C) both A and B
D) neither A nor B
In digital certificate authentication, the verifier uses ________.
A) the supplicant's public key
B) the true party's public key
C) both A and B
D) neither A nor B
Which of the following standards permits central management?
A) IPsec
B) SSL/TLS
C) both A and B
D) neither A nor B
Which is a problem with IPv4 addresses?
A) They cannot be used on wireless devices.
B) They are too complex.
C) Routers find it difficult to handle them.
D) We have run out of them.