Book Title
Business Data Networks and Security 10th Edition


July 19, 2017
________ is a technique for preventing two wireless stations from transmitting at the
same time and therefore interfering with each other.
A) Creating extended service sets
B) Roaming
C) The distribution system
D) Media access control
The password "NeVEr" can be defeated by a ________.
A) dictionary attack
B) hybrid dictionary attack
C) brute-force attack
D) none of the above
A user picks the password "tiger." This is likely to be cracked quickly by a(n)
A) attack on an application running as root
B) brute-force attack
C) dictionary attack
D) reverse engineering attack
If a frame passes through eight switches between the source and destination hosts on a
single network, how many data links will there be?
A) 1
B) 2
C) 8
D) 9
In the Five General Layers Standard, which layer's standards govern application World
Wide Web exchanges over the Internet?
A) 2
B) 3
C) 4
D) 5
Standards mean the same thing as ________.
A) semantics
B) syntax
C) rules
D) protocols
When a packet that is not part of an ongoing connection and that does not attempt to
open a connection arrives at a stateful inspection firewall, the firewall ________. (Read
this question carefully.)
A) drops the packet
B) passes the packet
C) opens a new connection
D) does not approve the connection
Which 802 working group created 802.11i?
A) 802.1
B) 802.3
C) 802.11
D) It was not an 802 working group. It was the Wi-Fi Alliance
Wireless LAN standards come from ________.
C) both A and B
D) neither A nor B
What propagation problem is especially bad in moist air?
A) absorptive attenuation
B) electromagnetic interference
C) multipath interference
D) inverse square law attenuation
The UDP has ________ fields.
A) 4
B) 8
C) 16
D) 32
Advanced persistent threats are ________.
A) inexpensive for the attacker
B) extremely dangerous for the victim
C) both A and B
D) neither A nor B
The most widely used single network address is the ________.
A) EUI-48 address
B) MAC address
C) IP address
D) PPP address
An attacker must break through two firewalls to get to a host. This illustrates the
principle called ________. (Select the most specific answer.)
A) comprehensive security
B) risk assurance
C) having a DMZ
D) defense in depth
Tor provides confidentiality ________.
A) all the way to the destination host
B) up to the entry P2P node
C) up to the exit P2P node
D) Tor does not provide confidentiality.
Session keys are used to ________.
A) make cryptanalysis more difficult
B) improve authentication
C) both A and B
D) neither A nor B
Speech codecs vary with respect to ________.
A) compression
B) voice quality
C) both A and B
D) neither A nor B
At what layer are frames standardized?
A) physical
B) data link
C) Internet
D) all of the above
Near-field communication has a maximum transmission distance of about ________.
A) 400 cm/200 in
B) 40 cm/20 in
C) 4 cm/2 in
D) The devices must be physically touching.
For Netflix, Google is a(n) ________.
A) IaaS
B) SaaS
C) both A and B
D) neither A nor B
Communication between SDN applications and SDN controllers is governed by
A) northbound APIs
B) southbound APIs
C) both A and B
D) neither A nor B
In 802.11i ________, hosts must know a shared initial key.
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B
Application message fragmentation is done on the ________.
A) source host
B) destination host
C) both A and B
D) neither A nor B
For every conversation, a client randomly generates an ephemeral port number for
A) applications
B) conversations
C) both A and B
D) neither A nor B
Which of the following is an integer?
A) 4,307
B) 45.7
C) both A and B
D) neither A nor B
If a packet is highly suspicious but not a provable attack packet, a(n) ________ may
drop it.
A) SPI firewall
D) all of the above
Implementation guidance is less specific than ________.
A) policy
B) implementation
C) standards
D) none of the above
Optical fiber's main advantage over UTP is ________.
A) lower cost
B) lower fragility
C) higher speed
D) greater distance span
An attack aimed at a single person or a small group of individuals is a(n) ________
attack. (Choose the most specific answer.)
A) phishing
B) spear phishing
C) highly targeted
D) customized
Which form of Bluetooth has a typical transmission speed of less than 3 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) personal Bluetooth
D) none of the above
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
A) 16 bits
B) 32 bits
C) 64 bits
D) none of the above
The source socket is The source host is a(n) ________.
A) client
B) server
C) well-known server
D) ephemeral server
The meaning of a message is referred to as the message's ________.
A) protocol
B) order
C) syntax
D) semantics