COMP 97641

subject Type Homework Help
subject Pages 9
subject Words 989
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
LAN speeds are faster than WAN speeds. This is because of ________.
A) technological limitations
B) regulatory limitations
C) slow corporate adoption of newer WAN technologies
D) economic reasons
Throughput is ________.
A) the speed a network actually provides to users
B) a network's rated speed
C) both A and B
D) neither A nor B
Which of the following meets the definition of hacking ________.
A) to intentionally use a computer resource without authorization
B) to use a computer on which you have an account for unauthorized purposes
C) both A and B
page-pf2
D) neither A nor B
To transmit very rapidly in RADIO, you need ________.
A) single-frequency transmission
B) single-mode transmission
C) wide bandwidth
D) narrow bandwidth
Which of the following is a processor-sharing application?
A) BitTorrent
B) SETI@home
C) SIP
D) Skype
page-pf3
If someone says that a 1-bit flag is not set, this means that its value is ________.
A) 0
B) 1
C) blank
D) We cannot say.
According to the principle of defense in depth, antivirus filtering should be done in at
least ________ location(s).
A) 1
B) 2
C) 3
D) 4
page-pf4
Packets are ________.
A) switched
B) routed
C) both A and B
D) neither A nor B.
In DNS, a group of resources under the control of an organization is called a ________.
A) network
B) subnet
C) scope
D) domain
Which of the following is a socket?
A) 80
B) 21
C) both A and B
page-pf5
D) neither A nor B
Mail servers communicate with each other by using ________.
A) POP
B) HTTP
C) RFC 2822
D) SMTP
The longest transmission distances are possible with ________.
A) USB
B) UTP
C) single-mode fiber
D) multimode fiber
page-pf6
Deregulation is the least for ________.
A) customer premises equipment
B) local telephone service
C) long-distance telephone service
D) All of the above are deregulated to about the same degree.
Which lines run from one customer premise to another?
A) leased lines
B) access lines
C) both A and B
D) neither A nor B
page-pf7
The highest layer in SDN consists of ________.
A) switches
B) routers
C) the SDN controller
D) SDN applications
320,000 kbps is ________.
A) 320 bps
B) 320 Mbps
C) 320 Gbps
D) none of the above
Frequency is measured in terms of ________.
A) nanometers
B) hertz
C) microns
page-pf8
D) microseconds
Ethernet's hierarchical topology tends to create ________.
A) greater reliability
B) lower cost per frame handled
C) both A and B
D) none of the above
Mobile code is another name for ________.
A) virus
B) worm
C) both A and B
D) neither A nor B
page-pf9
At what layer would you find IP addresses?
A) 1
B) 2
C) 3
D) 4
________ is the percentage of time that a network is available for use.
A) Availability
B) Downtime
C) QoS
D) none of the above
page-pfa
In QAM, if you have four possible amplitudes, you have ________ possible states.
A) 4
B) 8
C) 16
D) none of the above
Which of the following is usually set up by a hacker outside the building?
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B
A ring topology is attractive because it brings ________.
A) higher speed
B) lower cost
C) greater reliability
page-pfb
D) all of the above
In Carrier Ethernet, which service is a competitor for leased line service?
A) E-Line
B) E-LAN
C) both A and B
D) neither A nor B
The ability to transmit in two directions simultaneously is ________.
A) parallel communication
B) full-duplex communication
C) both A and B
D) neither A nor B
page-pfc
Which layer's standards govern router operation?
A) 1
B) 2
C) 3
D) 4
An access point can transmit to more than one wireless client at a time with ________.
A) bonding
B) MIMO
C) Multiuser MIMO
D) CSMC/CA+ACK
page-pfd
What layer number is the data link layer?
A) 1
B) 2
C) 3
D) 4
Wireless radio transmission speed is usually measured in terms of ________.
A) wavelength
B) frequency
C) amplitude
D) wetness
In HTTP, which program may initiate communication?
A) browser
B) Webserver program
C) both A and B
page-pfe
D) neither A nor B
There is a single countermeasure in ________.
A) weakest links
B) defense in depth
C) both A and B
D) neither A nor B
How long are IPv4 addresses in octets?
A) 4 octets
B) 32 octets
C) 48 octets
D) 128 octets
page-pff
Depicting the Internet as a cloud symbolizes that ________.
A) the Internet is amorphous
B) the Internet is no longer understandable by humans
C) the Internet is too complex for anyone to depict
D) users do not have to know how the Internet operates and where resources are located

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.