Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

COMP 30703

July 19, 2017
Express the mask /18 in dotted decimal notation.
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) none of the above
Users are primarily concerned with the ________ layer.
A) application
B) transport
C) internet
D) physical
Application message reassembly is done on the ________.
A) source host
B) destination host
C) both A and B
D) neither A nor B
The domain name system ________.
A) is a way to find a host's IP addresses if your computer only knows the host's host
name
B) is a general naming system for the Internet
C) both A and B
D) neither A nor B
A codec ________.
A) encodes voice sounds into digital signals for transmission
B) encodes voice sounds into analog signals for transmission
C) encrypts the signal
D) converts binary voice signals into digital signals for transmission
Which is less expensive to implement?
A) SSL/TLS
B) IPsec
C) Both cost about the same to implement.
The promise of FTTH is ________.
A) higher speed
B) lower cost
C) both A and B
D) neither A nor B
Iris scanning is attractive because of its ________.
A) low cost
B) precision
C) both A and B
D) neither A nor B
In a firewall, VPN traversal ________.
A) increases the effectiveness of firewall filtering
B) reduces firewall filtering effectiveness
C) both A and B
D) neither A nor B
If I simplify the address 2001:0000:0000:00fe:0000:0000:abcd:13ef, I get ________.
A) 2001:::fe:::abcd:13ef
B) 2001::fe:::abcd:13ef
C) 2001:::fe::abcd:13ef
D) 2001::fe::abcd:13ef
Methods that hackers use to break into computers are ________.
A) cracks
B) magics
C) exploits
D) compromises
Amplitude modulation uses two ________ levels.
A) loudness
B) frequency
C) both A and B
Netflix uses AWS for its ________.
A) recommendation system
B) content delivery appliances
C) both A and B
D) neither A nor B
Which of the following is NOT one of the main elements of the Skype network?
A) login server
B) proxy server
C) host node
D) super node
Centralized access point management ________.
A) increases management costs but provides better control
B) reduces management costs
A local area network operates ________.
A) on a customer premises
B) between customer premises
C) both A and B
D) neither A nor B
The network part of an IPv4 address is ________ bits long.
A) 8
B) 16
C) 32
D) It is hard to say with limited information.
Companies use carriers for WAN transmission because ________.
A) companies lack rights of way
B) carriers have extremely strong security
C) both A and B
D) neither A nor B
For human reading, IPv6 fields are separated by ________.
A) dashes
B) slashes
C) colons
D) none of the above
Attack programs that can be remotely controlled by an attacker are ________.
A) bots
B) DoS programs
C) exploits
D) sock puppets
For human reading, IPv6 address is written in ________ notation.
A) decimal
B) hexadecimal
C) binary
D) runic
Vulnerability-based attacks that occur before a patch is available are called ________
attacks.
A) preinstallation
B) stealth
C) malware
D) zero-day
All single network addresses are ________ addresses.
A) EUI-48
B) IP
C) both A and B
D) neither A nor B
In ________ file retrieval, your computer downloads a file from a server.
A) P2P
B) client/server
C) BitTorrent
D) none of the above
An SLA for availability should specify a ________.
A) maximum availability
B) minimum availability
C) both A and B
D) neither A nor B
".edu" is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) none of the above
802.11 standards are being developed to work in the ________ unlicensed band.
A) 2.4 GHz
B) 5 GHz
C) both A and B
D) neither A nor B
In the mask /14, how many 1s are there?
A) 8
B) 16
C) 24
D) none of the above
An SLA should specify the ________.
A) best case
B) worst case
C) both A and B
D) neither A nor B
DSL residential service provides ________.
A) symmetric speed
B) asymmetric speed
C) both A and B
D) neither A nor B