Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

COMPSCI 48062

July 19, 2017
________ are full programs.
A) Viruses
B) Worms
C) both A and B
D) neither A nor B
An EUI-48 address was formerly called a(n) ________ address.
A) IPv4
B) IPv6
C) MAC
D) DNS
What type of address is 100 bits long?
A) IPv4
B) IPv6
C) EUI-48
D) none of the above
Which of the following secures communication between the wireless computer and the
server it wishes to use against evil twin attacks?
A) VLANs
B) VPNs
C) PEAP
D) 802.1X mode
In the IPv4 address 1.2.3.4, what is the network part?
A) 1
B) 1.2
C) 1.2.3
D) It is hard to say with limited information.
Signals in a transmission usually ________.
A) travel at a single frequency
B) spread over a range of frequencies
C) spread over the entire frequency distribution
D) spread over the entire service band
Ethernet usually has a 100 meter distance limit for ________.
A) physical links
B) data links
C) routes
D) both A and B
In optical fiber, light travels through the ________.
A) core
B) cladding
C) both A and B
Stateful firewalls are attractive because of their ________.
A) high filtering sophistication
B) ability to filter complex application content
C) QoS guarantees
D) low cost
WLANs normally use ________.
A) licensed bands
B) unlicensed bands
C) both A and B
D) neither A or B
OpenFlow can be used to standardize ________.
A) northbound APIs
B) southbound APIs
C) both A and B
D) neither A nor B
If you have a subnet part of 7 bits, how many subnets can you have?
A) 126
B) 254
C) 510
D) none of the above
The range of port 1024 to port 4999 is the usual range for ________ port numbers.
A) well-known
B) ephemeral
C) both A and B
D) neither A nor B
Spread spectrum transmission is used in WLANs because ________.
A) it is required by regulators
B) it offers strong security
C) both A and B
D) neither A nor B
Transmission speed is normally measured in ________.
A) bits per second
B) bytes per second
C) octet per second
D) none of the above
Which of the following can use access points?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B
To represent 65 alternatives, your alternatives field would have to be at least ________
bits long.
A) 5
B) 6
C) 7
D) 8
Beamforming can allow an access point to ________.
A) direct power to individual clients
B) send signals to two different clients at the same time
C) both A and B
D) neither A nor B
The main promise of VoIP is to ________.
A) add video
B) improve voice quality
C) improve reliability
D) reduce cost
Viruses most commonly spread from one computer to another ________.
A) via e-mail
B) by propagating directly by themselves
C) through obfuscation
D) all of the above
In IP, the first bit in the second row is ________.
A) 0
B) 31
C) 32
D) 63
Which layer process does NOT do any encapsulation when an application layer process
transmits a message?
A) physical
B) data link
C) Internet
D) All layers do encapsulation.
To use a leased line, the customer requires a(n) ________ at each site.
A) switch
B) router
C) CSU/DSU
D) modem
The five senses can be represented with a ________-bit field.
A) 2
B) 3
C) 4
D) 5
Pieces of code that are executed after the virus or worm has spread are called
________.
A) vulnerabilities
B) exploits
C) compromises
D) payloads
Directory servers organize information in a ________.
A) mesh
B) hierarchy
C) relational database
D) all of the above
After selecting a row on a routing table, a router will send packets out to the ________.
A) port
B) socket
C) interface
D) plug
Variability in delay is called ________.
A) jitter
B) variance
C) a QoS failure
D) latency
".com" is a ________.
A) root domain
B) top-level domain
C) second-level domain
D) none of the above
Channels with wide bandwidths are called ________ channels.
A) multimode
B) full-duplex
C) broadband
D) parallel
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16
and the reliability metric 10. Which row will the router choose if both are matches?
A) 2707
B) 4400
C) either A or B
D) The router will choose the default row.
After two wireless clients authenticate themselves via PSK to an access point, they will
use ________ to communicate with the access point.
A) the preshared key
B) an 802.1X key
C) WPS keys
D) different session keys
A policy specifies ________.
A) what should be done
B) how to do it
C) both A and B
D) neither A nor B
Wireless network standards operate at ________.
A) the data link layer
B) the Internet layer
C) both A and B
D) neither A nor B