Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

COMP 97641

July 19, 2017
LAN speeds are faster than WAN speeds. This is because of ________.
A) technological limitations
B) regulatory limitations
C) slow corporate adoption of newer WAN technologies
D) economic reasons
Throughput is ________.
A) the speed a network actually provides to users
B) a network's rated speed
C) both A and B
D) neither A nor B
Which of the following meets the definition of hacking ________.
A) to intentionally use a computer resource without authorization
B) to use a computer on which you have an account for unauthorized purposes
C) both A and B
D) neither A nor B
To transmit very rapidly in RADIO, you need ________.
A) single-frequency transmission
B) single-mode transmission
C) wide bandwidth
D) narrow bandwidth
Which of the following is a processor-sharing application?
A) BitTorrent
C) SIP
D) Skype
If someone says that a 1-bit flag is not set, this means that its value is ________.
A) 0
B) 1
C) blank
D) We cannot say.
According to the principle of defense in depth, antivirus filtering should be done in at
least ________ location(s).
A) 1
B) 2
C) 3
D) 4
Packets are ________.
A) switched
B) routed
C) both A and B
D) neither A nor B.
In DNS, a group of resources under the control of an organization is called a ________.
A) network
B) subnet
C) scope
D) domain
Which of the following is a socket?
A) 80
B) 21
C) both A and B
D) neither A nor B
Mail servers communicate with each other by using ________.
A) POP
B) HTTP
C) RFC 2822
D) SMTP
The longest transmission distances are possible with ________.
A) USB
B) UTP
C) single-mode fiber
D) multimode fiber
Deregulation is the least for ________.
A) customer premises equipment
B) local telephone service
C) long-distance telephone service
D) All of the above are deregulated to about the same degree.
Which lines run from one customer premise to another?
A) leased lines
B) access lines
C) both A and B
D) neither A nor B
The highest layer in SDN consists of ________.
A) switches
B) routers
C) the SDN controller
D) SDN applications
320,000 kbps is ________.
A) 320 bps
B) 320 Mbps
C) 320 Gbps
D) none of the above
Frequency is measured in terms of ________.
A) nanometers
B) hertz
C) microns
D) microseconds
Ethernet's hierarchical topology tends to create ________.
A) greater reliability
B) lower cost per frame handled
C) both A and B
D) none of the above
Mobile code is another name for ________.
A) virus
B) worm
C) both A and B
D) neither A nor B
At what layer would you find IP addresses?
A) 1
B) 2
C) 3
D) 4
________ is the percentage of time that a network is available for use.
A) Availability
B) Downtime
C) QoS
D) none of the above
In QAM, if you have four possible amplitudes, you have ________ possible states.
A) 4
B) 8
C) 16
D) none of the above
Which of the following is usually set up by a hacker outside the building?
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B
A ring topology is attractive because it brings ________.
A) higher speed
B) lower cost
C) greater reliability
D) all of the above
In Carrier Ethernet, which service is a competitor for leased line service?
A) E-Line
B) E-LAN
C) both A and B
D) neither A nor B
The ability to transmit in two directions simultaneously is ________.
A) parallel communication
B) full-duplex communication
C) both A and B
D) neither A nor B
Which layer's standards govern router operation?
A) 1
B) 2
C) 3
D) 4
An access point can transmit to more than one wireless client at a time with ________.
A) bonding
B) MIMO
C) Multiuser MIMO
D) CSMC/CA+ACK
What layer number is the data link layer?
A) 1
B) 2
C) 3
D) 4
Wireless radio transmission speed is usually measured in terms of ________.
A) wavelength
B) frequency
C) amplitude
D) wetness
In HTTP, which program may initiate communication?
A) browser
B) Webserver program
C) both A and B
D) neither A nor B
There is a single countermeasure in ________.
A) weakest links
B) defense in depth
C) both A and B
D) neither A nor B
How long are IPv4 addresses in octets?
A) 4 octets
B) 32 octets
C) 48 octets
D) 128 octets
Depicting the Internet as a cloud symbolizes that ________.
A) the Internet is amorphous
B) the Internet is no longer understandable by humans
C) the Internet is too complex for anyone to depict
D) users do not have to know how the Internet operates and where resources are located