COMPSCI 90751

subject Type Homework Help
subject Pages 9
subject Words 1045
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
________ is a technique for preventing two wireless stations from transmitting at the
same time and therefore interfering with each other.
A) Creating extended service sets
B) Roaming
C) The distribution system
D) Media access control
The password "NeVEr" can be defeated by a ________.
A) dictionary attack
B) hybrid dictionary attack
C) brute-force attack
D) none of the above
A user picks the password "tiger." This is likely to be cracked quickly by a(n)
________.
A) attack on an application running as root
B) brute-force attack
page-pf2
C) dictionary attack
D) reverse engineering attack
If a frame passes through eight switches between the source and destination hosts on a
single network, how many data links will there be?
A) 1
B) 2
C) 8
D) 9
In the Five General Layers Standard, which layer's standards govern application World
Wide Web exchanges over the Internet?
A) 2
B) 3
C) 4
D) 5
page-pf3
Standards mean the same thing as ________.
A) semantics
B) syntax
C) rules
D) protocols
When a packet that is not part of an ongoing connection and that does not attempt to
open a connection arrives at a stateful inspection firewall, the firewall ________. (Read
this question carefully.)
A) drops the packet
B) passes the packet
C) opens a new connection
D) does not approve the connection
page-pf4
Which 802 working group created 802.11i?
A) 802.1
B) 802.3
C) 802.11
D) It was not an 802 working group. It was the Wi-Fi Alliance
Wireless LAN standards come from ________.
A) OSI
B) TCP/IP
C) both A and B
D) neither A nor B
What propagation problem is especially bad in moist air?
page-pf5
A) absorptive attenuation
B) electromagnetic interference
C) multipath interference
D) inverse square law attenuation
The UDP has ________ fields.
A) 4
B) 8
C) 16
D) 32
Advanced persistent threats are ________.
A) inexpensive for the attacker
B) extremely dangerous for the victim
C) both A and B
page-pf6
D) neither A nor B
The most widely used single network address is the ________.
A) EUI-48 address
B) MAC address
C) IP address
D) PPP address
An attacker must break through two firewalls to get to a host. This illustrates the
principle called ________. (Select the most specific answer.)
A) comprehensive security
B) risk assurance
C) having a DMZ
D) defense in depth
page-pf7
Tor provides confidentiality ________.
A) all the way to the destination host
B) up to the entry P2P node
C) up to the exit P2P node
D) Tor does not provide confidentiality.
Session keys are used to ________.
A) make cryptanalysis more difficult
B) improve authentication
C) both A and B
D) neither A nor B
page-pf8
Speech codecs vary with respect to ________.
A) compression
B) voice quality
C) both A and B
D) neither A nor B
At what layer are frames standardized?
A) physical
B) data link
C) Internet
D) all of the above
Near-field communication has a maximum transmission distance of about ________.
A) 400 cm/200 in
B) 40 cm/20 in
C) 4 cm/2 in
page-pf9
D) The devices must be physically touching.
For Netflix, Google is a(n) ________.
A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Communication between SDN applications and SDN controllers is governed by
________.
A) northbound APIs
B) southbound APIs
C) both A and B
D) neither A nor B
page-pfa
In 802.11i ________, hosts must know a shared initial key.
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B
Application message fragmentation is done on the ________.
A) source host
B) destination host
C) both A and B
D) neither A nor B
page-pfb
For every conversation, a client randomly generates an ephemeral port number for
________.
A) applications
B) conversations
C) both A and B
D) neither A nor B
Which of the following is an integer?
A) 4,307
B) 45.7
C) both A and B
D) neither A nor B
If a packet is highly suspicious but not a provable attack packet, a(n) ________ may
drop it.
A) SPI firewall
B) IDS
page-pfc
C) IPS
D) all of the above
Implementation guidance is less specific than ________.
A) policy
B) implementation
C) standards
D) none of the above
Optical fiber's main advantage over UTP is ________.
A) lower cost
B) lower fragility
C) higher speed
D) greater distance span
page-pfd
An attack aimed at a single person or a small group of individuals is a(n) ________
attack. (Choose the most specific answer.)
A) phishing
B) spear phishing
C) highly targeted
D) customized
Which form of Bluetooth has a typical transmission speed of less than 3 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) personal Bluetooth
D) none of the above
page-pfe
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
A) 16 bits
B) 32 bits
C) 64 bits
D) none of the above
The source socket is 60.171.18.22:2707. The source host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
The meaning of a message is referred to as the message's ________.
A) protocol
B) order
C) syntax
page-pff
D) semantics

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.