Book Title
Business Data Networks and Security 10th Edition

COMP 66738

July 19, 2017
Client PCs must have digital certificates in ________.
A) transport mode
B) tunnel mode
C) both A and B
D) neither A nor B
Skype offers ________.
A) free calling among Skype customers
B) free calling to and from Public Switched Telephone Network customers
C) both A and B
D) neither A nor B
Which of the following is considered a bigger problem with traditional client/server
based architectures than with peer-to-peer architectures?
A) underutilized processing capacity of client PCs
B) potential for essential data/services to become unavailable as a device is turned off
C) both A and B
D) neither A nor B
Requiring someone to use a resource to prove his or her identity is ________.
A) confidentiality
B) authentication
C) authorization
D) both B and C
Compared to normal routing, decision caching is ________.
A) faster
B) less dangerous
C) both A and B
UTP categories rate the ________ of UTP cabling.
A) quality
B) speed
C) quality-of-service performance
D) error performance
The destination socket is The destination host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
Switches make decisions based on the ________.
A) physical link address
B) source data link layer address
C) destination data link layer address
D) phase of the moon
Address Resolution Protocol is used to find the destination data link layer destination
addresses of ________.
A) destination hosts
B) routers
C) both A and B
D) neither A nor B
How many fields are there in an IPv6 address written for human reading?
A) 8
B) 16
C) 32
D) 128
The advance that made the client/server application architecture possible was
A) the Internet
B) client processing power
C) application sophistication
D) input/output methods
How many HTTP request-response cycles are needed to transfer a webpage containing
three graphics images?
A) 1
B) 2
C) 3
D) none of the above
________ is the process of presenting external IP addresses that are different from
internal IP addresses used within the firm.
D) none of the above
Compared to network demand, network budgets are growing ________.
A) faster
B) as fast as it used to be
C) slower
D) both A and C
If someone says that a 1-bit flag is set, this means that it is given the value ________.
A) 0
B) 1
C) either A or B
D) neither A nor B
NGFWs ________.
A) can implement different rules for different applications
B) can detect threats that span multiple packets
C) both A and B
D) neither A nor B
If a frame passes through two routers between the source and destination hosts, how
many routes will there be?
A) 1
B) 2
C) 8
D) 9
At which layer would you find file transfer protocol (FTP) standards for downloading
files from an FTP server?
A) application
B) transport
C) Internet
D) none of the above
Companies should ________ single points of takeover.
A) eliminate
B) pay special attention to
C) multiply
D) authorize
QPSK modulation uses ________ phases.
A) 2
B) 4
C) 8
D) 15
Cross-connect devices are found in ________.
B) equipment rooms
C) telecommunications closets
D) switches
Compared to ADSL service, cable modem service typically is ________.
A) faster and more expensive
B) faster and less expensive
C) slower and more expensive
D) slower and less expensive
The main version of Internet Protocol in use today is IP version ________.
A) 1
B) 4
C) 5
D) 6
Passwords are widely used because they ________.
A) are demanded by users
B) offer strong authentication
C) are the only authentication techniques known by most security professionals
D) are inexpensive to use
According to the IETF standards, if a router receives a series of packets from the same
IP address to the same IP address, it should ________.
A) go through the entire process for each packet
B) cache the decision made for the first packet and use this decision on subsequent
C) skip the first step in the routing process but go through other steps for each
subsequent packet
D) none of the above
Which mode of IPsec may be more expensive if a company has a large number of
A) transport mode
B) tunnel mode
C) Both A and B are equally expensive.
A message always has a ________.
A) header
B) data field
C) both A and B
D) neither A nor B
A rogue access point is created by ________.
A) an employee
B) an external attacker
C) the IT security department
D) an evil twin
Which of the following is relatively immune to small errors?
A) analog signaling
B) binary signaling
C) both A and B
D) neither A nor B
Which of the following would be an SNMP object?
A) number of rows in routing table
B) system uptime (since last reboot)
C) both A and B
D) neither A nor B
In SDN, a switch receives its forwarding table rules directly from ________.
A) the SDN controller
B) an SDN management application
C) another switch
D) an SNMP manager
If a firewall does not have the processing power to filter all of the packets that arrive,
A) it will pass some packets without filtering them
B) it will drop packets it cannot process
C) both A and B
D) neither A nor B
A router must use the Address Resolution Protocol process ________.
A) when a new router comes online
B) when a router goes offline
C) whenever it forwards an IP packet
D) whenever it forwards an IP packet to a host that is not in its ARP cache
With 900 numbers, the ________ pays and pays ________ per minute than direct
distance dialing.
A) caller, more
B) caller, less
C) called party, more
D) called party, less
The password "R7%t&" can be defeated by a ________.
A) dictionary attack
B) hybrid mode dictionary attack
C) brute-force attack
D) All of the above could defeat the password equally quickly.