Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

COP 18595

July 19, 2017
For ADSL service, which of the following typically must be added to the telephone
system?
A) a DSLAM
B) a transmission line to the customer premises
C) both A and B
D) neither A nor B
The path that a frame takes across a single network is a ________.
A) physical link
B) data link
C) route
D) all of the above
Priority is assigning high priority to ________ applications while giving low priority to
________ applications.
A) latency-tolerant, latency-intolerant
B) latency-intolerant, latency-tolerant
4-pair UTP terminates in a(n) ________ connector.
A) USB
B) RJ-45
C) SC
D) standard telephone
In QAM, if you have eight possible amplitudes, how many bits can you send per clock
cycle?
A) 3
B) 6
C) 8
D) 16
The SIP invite is transmitted to the ________.
A) called party's SIP proxy server
B) called party's VoIP phone or computer
C) both A and B
D) neither A nor B
Ethernet does ________.
A) error detection
B) error correction
C) both A and B
D) neither A nor B
For PBXs, camp-on is ________.
A) a user service
B) an attendant service
C) a management service
An Ethernet switch knows ________.
A) an IP address for each EUI-48 address
B) a single port number for each EUI-48 address
C) multiple port numbers for each EUI-48 address
D) the entire path from the source host to the destination host
Untwisting wire pairs no more than 1.25 cm (a half inch) at their ends reduces
________.
A) interference
B) crosstalk interference
C) terminal crosstalk interference
D) none of the above
The source host and destination host are separated by seven networks. There will be
seven ________.
A) packets
B) frames
C) physical links
D) none of the above
Which layer's standards govern signaling?
A) 1
B) 2
C) 3
D) 4
Link aggregation can increase trunk speed by a factor of ________.
A) two
B) three
C) both A and B
D) neither A nor B
________ is placing a message in the data field of another message.
A) Encoding
B) Vertical communication
C) Layering
D) Encapsulation
Express the mask /24 in dotted decimal notation.
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) none of the above
An HTTP response message usually has a ________.
A) trailer
B) data field
C) both A and B
D) neither A nor B
Managed access points should ________.
A) allow access point power to be adjusted remotely
B) provide constant transmission quality monitoring
C) both A and B
D) neither A nor B
SNMP ________ commands can change how managed devices operate.
A) Get
B) Set
C) both A and B
D) neither A nor B
A single access point and the set of hosts it serves is called a(n) ________.
A) BSS
B) BSSID
C) ESS
D) none of the above
What does a router do with Address Resolution Protocol request messages?
A) It broadcasts them.
B) It sends them directly to the destination host.
C) It sends them to a next-hop router.
D) It sends them to the default next-hop router.
Which working group is likely to develop security standards to be used by multiple
LAN/WAN technologies?
A) 802.1
B) 802.e
C) 802.3
D) 802.11
SONET/SDH uses a ________ topology.
A) point-to-point
B) hierarchy
C) mesh
D) ring
Cells are used in cellular telephony to provide ________.
A) service for more customers
B) greater reliability
C) greater transmission speed
D) all of the above
If a company has multiple authentication servers, which devices are likely to hold the
authentication data?
A) authenticators
B) authentication servers individually
C) authentication servers doing replication
D) directory servers
What type of copper wiring is widely used in Ethernet?
A) optical fiber
B) 4-pair UTP
C) both A and B
D) neither A nor B
In an extended service set, each access point ________.
A) must have the same SSID
B) must have different SSIDs
C) must have coordinated SSIDs
D) none of the above
MPLS ________ the work that each router must do to deliver a packet during a traffic
exchange.
A) reduces
B) increases
C) does not affect
D) occasionally reduces
In unlicensed bands, ________.
A) you can use radios wherever you please
B) you can prevent nearby businesses from setting up access points in the same channel
C) both A and B
D) neither A nor B
Which of the following is a private IP address range?
A) 10.x.x.x
B) 128.171.x.x
C) both A and B
D) neither A nor B
In an IPv4 packet, the ________ field value tells the type of message contained in the
IP packet's data field.
A) data
B) next-hop
C) next-header
D) protocol
CSMA/CD+ACK is ________.
A) unreliable
B) reliable
C) semireliable
Ethernet is inexpensive thanks to ________.
A) its hierarchical topology
B) its use of multiple switches
C) its use of regeneration
D) its use of the Rapid Spanning Tree Protocol
Attacking your own firm occurs in ________.
A) vulnerability testing
B) auditing
C) both A and B
D) neither A nor B
For human reading, symbols in IPv6 addresses are written in fields of ________
symbols.
A) 1
B) 2
C) 4
D) 16
________ have SSIDs.
A) Wireless clients
B) Wireless access points
C) both A and B
D) neither A nor B