COMP 66738

subject Type Homework Help
subject Pages 9
subject Words 1209
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Client PCs must have digital certificates in ________.
A) transport mode
B) tunnel mode
C) both A and B
D) neither A nor B
Skype offers ________.
A) free calling among Skype customers
B) free calling to and from Public Switched Telephone Network customers
C) both A and B
D) neither A nor B
Which of the following is considered a bigger problem with traditional client/server
based architectures than with peer-to-peer architectures?
A) underutilized processing capacity of client PCs
B) potential for essential data/services to become unavailable as a device is turned off
page-pf2
C) both A and B
D) neither A nor B
Requiring someone to use a resource to prove his or her identity is ________.
A) confidentiality
B) authentication
C) authorization
D) both B and C
Compared to normal routing, decision caching is ________.
A) faster
B) less dangerous
C) both A and B
page-pf3
UTP categories rate the ________ of UTP cabling.
A) quality
B) speed
C) quality-of-service performance
D) error performance
The destination socket is 60.171.18.22:161. The destination host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
Switches make decisions based on the ________.
page-pf4
A) physical link address
B) source data link layer address
C) destination data link layer address
D) phase of the moon
Address Resolution Protocol is used to find the destination data link layer destination
addresses of ________.
A) destination hosts
B) routers
C) both A and B
D) neither A nor B
How many fields are there in an IPv6 address written for human reading?
A) 8
B) 16
C) 32
page-pf5
D) 128
The advance that made the client/server application architecture possible was
________.
A) the Internet
B) client processing power
C) application sophistication
D) input/output methods
How many HTTP request-response cycles are needed to transfer a webpage containing
three graphics images?
A) 1
B) 2
C) 3
D) none of the above
page-pf6
________ is the process of presenting external IP addresses that are different from
internal IP addresses used within the firm.
A) DNS
B) NAT
C) DHCP
D) none of the above
Compared to network demand, network budgets are growing ________.
A) faster
B) as fast as it used to be
C) slower
D) both A and C
page-pf7
If someone says that a 1-bit flag is set, this means that it is given the value ________.
A) 0
B) 1
C) either A or B
D) neither A nor B
NGFWs ________.
A) can implement different rules for different applications
B) can detect threats that span multiple packets
C) both A and B
D) neither A nor B
If a frame passes through two routers between the source and destination hosts, how
many routes will there be?
A) 1
B) 2
page-pf8
C) 8
D) 9
At which layer would you find file transfer protocol (FTP) standards for downloading
files from an FTP server?
A) application
B) transport
C) Internet
D) none of the above
Companies should ________ single points of takeover.
A) eliminate
B) pay special attention to
C) multiply
D) authorize
page-pf9
QPSK modulation uses ________ phases.
A) 2
B) 4
C) 8
D) 15
Cross-connect devices are found in ________.
A) PBXs
B) equipment rooms
C) telecommunications closets
D) switches
page-pfa
Compared to ADSL service, cable modem service typically is ________.
A) faster and more expensive
B) faster and less expensive
C) slower and more expensive
D) slower and less expensive
The main version of Internet Protocol in use today is IP version ________.
A) 1
B) 4
C) 5
D) 6
Passwords are widely used because they ________.
A) are demanded by users
B) offer strong authentication
C) are the only authentication techniques known by most security professionals
page-pfb
D) are inexpensive to use
According to the IETF standards, if a router receives a series of packets from the same
IP address to the same IP address, it should ________.
A) go through the entire process for each packet
B) cache the decision made for the first packet and use this decision on subsequent
packets
C) skip the first step in the routing process but go through other steps for each
subsequent packet
D) none of the above
Which mode of IPsec may be more expensive if a company has a large number of
computers?
A) transport mode
B) tunnel mode
C) Both A and B are equally expensive.
page-pfc
A message always has a ________.
A) header
B) data field
C) both A and B
D) neither A nor B
A rogue access point is created by ________.
A) an employee
B) an external attacker
C) the IT security department
D) an evil twin
page-pfd
Which of the following is relatively immune to small errors?
A) analog signaling
B) binary signaling
C) both A and B
D) neither A nor B
Which of the following would be an SNMP object?
A) number of rows in routing table
B) system uptime (since last reboot)
C) both A and B
D) neither A nor B
In SDN, a switch receives its forwarding table rules directly from ________.
A) the SDN controller
B) an SDN management application
C) another switch
page-pfe
D) an SNMP manager
If a firewall does not have the processing power to filter all of the packets that arrive,
________.
A) it will pass some packets without filtering them
B) it will drop packets it cannot process
C) both A and B
D) neither A nor B
A router must use the Address Resolution Protocol process ________.
A) when a new router comes online
B) when a router goes offline
C) whenever it forwards an IP packet
D) whenever it forwards an IP packet to a host that is not in its ARP cache
page-pff
With 900 numbers, the ________ pays and pays ________ per minute than direct
distance dialing.
A) caller, more
B) caller, less
C) called party, more
D) called party, less
The password "R7%t&" can be defeated by a ________.
A) dictionary attack
B) hybrid mode dictionary attack
C) brute-force attack
D) All of the above could defeat the password equally quickly.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.