COMPSCI 48062

subject Type Homework Help
subject Pages 9
subject Words 1011
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
________ are full programs.
A) Viruses
B) Worms
C) both A and B
D) neither A nor B
An EUI-48 address was formerly called a(n) ________ address.
A) IPv4
B) IPv6
C) MAC
D) DNS
What type of address is 100 bits long?
A) IPv4
B) IPv6
C) EUI-48
page-pf2
D) none of the above
Which of the following secures communication between the wireless computer and the
server it wishes to use against evil twin attacks?
A) VLANs
B) VPNs
C) PEAP
D) 802.1X mode
In the IPv4 address 1.2.3.4, what is the network part?
A) 1
B) 1.2
C) 1.2.3
D) It is hard to say with limited information.
page-pf3
Signals in a transmission usually ________.
A) travel at a single frequency
B) spread over a range of frequencies
C) spread over the entire frequency distribution
D) spread over the entire service band
Ethernet usually has a 100 meter distance limit for ________.
A) physical links
B) data links
C) routes
D) both A and B
page-pf4
In optical fiber, light travels through the ________.
A) core
B) cladding
C) both A and B
Stateful firewalls are attractive because of their ________.
A) high filtering sophistication
B) ability to filter complex application content
C) QoS guarantees
D) low cost
WLANs normally use ________.
A) licensed bands
B) unlicensed bands
C) both A and B
D) neither A or B
page-pf5
OpenFlow can be used to standardize ________.
A) northbound APIs
B) southbound APIs
C) both A and B
D) neither A nor B
If you have a subnet part of 7 bits, how many subnets can you have?
A) 126
B) 254
C) 510
D) none of the above
page-pf6
The range of port 1024 to port 4999 is the usual range for ________ port numbers.
A) well-known
B) ephemeral
C) both A and B
D) neither A nor B
Spread spectrum transmission is used in WLANs because ________.
A) it is required by regulators
B) it offers strong security
C) both A and B
D) neither A nor B
Transmission speed is normally measured in ________.
A) bits per second
B) bytes per second
page-pf7
C) octet per second
D) none of the above
Which of the following can use access points?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B
To represent 65 alternatives, your alternatives field would have to be at least ________
bits long.
A) 5
B) 6
C) 7
D) 8
page-pf8
Beamforming can allow an access point to ________.
A) direct power to individual clients
B) send signals to two different clients at the same time
C) both A and B
D) neither A nor B
The main promise of VoIP is to ________.
A) add video
B) improve voice quality
C) improve reliability
D) reduce cost
page-pf9
Viruses most commonly spread from one computer to another ________.
A) via e-mail
B) by propagating directly by themselves
C) through obfuscation
D) all of the above
In IP, the first bit in the second row is ________.
A) 0
B) 31
C) 32
D) 63
Which layer process does NOT do any encapsulation when an application layer process
transmits a message?
A) physical
B) data link
page-pfa
C) Internet
D) All layers do encapsulation.
To use a leased line, the customer requires a(n) ________ at each site.
A) switch
B) router
C) CSU/DSU
D) modem
The five senses can be represented with a ________-bit field.
A) 2
B) 3
C) 4
D) 5
page-pfb
Pieces of code that are executed after the virus or worm has spread are called
________.
A) vulnerabilities
B) exploits
C) compromises
D) payloads
Directory servers organize information in a ________.
A) mesh
B) hierarchy
C) relational database
D) all of the above
page-pfc
After selecting a row on a routing table, a router will send packets out to the ________.
A) port
B) socket
C) interface
D) plug
Variability in delay is called ________.
A) jitter
B) variance
C) a QoS failure
D) latency
".com" is a ________.
A) root domain
B) top-level domain
C) second-level domain
page-pfd
D) none of the above
Channels with wide bandwidths are called ________ channels.
A) multimode
B) full-duplex
C) broadband
D) parallel
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16
and the reliability metric 10. Which row will the router choose if both are matches?
A) 2707
B) 4400
C) either A or B
D) The router will choose the default row.
page-pfe
After two wireless clients authenticate themselves via PSK to an access point, they will
use ________ to communicate with the access point.
A) the preshared key
B) an 802.1X key
C) WPS keys
D) different session keys
A policy specifies ________.
A) what should be done
B) how to do it
C) both A and B
D) neither A nor B
page-pff
Wireless network standards operate at ________.
A) the data link layer
B) the Internet layer
C) both A and B
D) neither A nor B

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.