COSC 40262

subject Type Homework Help
subject Pages 9
subject Words 988
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
In IPv6, the payload length gives the number of octets in the ________.
A) entire packet
B) entire packet minus the main header
C) entire packet minus the main and extension headers
D) entire packet minus the extension headers
A ________ provides telephone service to customers.
A) PTT
B) Ministry of Telecommunications
C) both A and B
D) neither A nor B
Error rates can soar when the network traffic level ________.
A) is at a high level
B) is at an average level
C) is at a low level
page-pf2
D) none of the above
If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________.
A) 2001:::fe::::cdef
B) 2001::fe::::cdef
C) 2001:::fe::cdef
D) 2001::00fe:::cdef
VoIP ________ uses the Internet Protocol for transmission.
A) always
B) usually
C) seldom
D) never
page-pf3
The Target attackers probably first broke into Target using the credentials of a(n)
________.
A) low-level Target employee
B) Target IT employee
C) Target security employee
D) employee in a firm outside Target
Compared to wired transmission, propagation problems in radio transmission are
________.
A) worse
B) about as bad
C) better
page-pf4
Authentication should generally be ________.
A) as strong as possible
B) appropriate for a specific resource
C) the same for all resources, for consistency
D) all of the above
If the destination host finds an error in an Ethernet frame, it ________.
A) sends back a NAK
B) sends back a ACK
C) both A and B
D) neither A nor B
Wider channel bandwidth ________.
A) increases transmission speed
B) allows more channels to be used in a service band
C) both A and B
page-pf5
D) neither A nor B
If a firm has many access points, it should use ________ mode in 802.11i.
A) PSK
B) 802.1X
C) IPsec
D) PEAP
In the United States, telephone customers can connect to a(n) ________ carrier to
receive telephone service.
A) ILEC
B) CLEC
C) either A or B
D) neither A nor B
page-pf6
Which of the following steps are done in order during a call with Skype?
A) login, signaling, transport
B) signaling, transport, end a call
C) login, signaling, end a call
D) none of the above
Ethernet has only a single standard at the ________ layer.
A) physical
B) MAC
C) data link
D) Internet
page-pf7
Network speeds usually are measured in ________.
A) bits per second
B) bytes per second
C) both A and B
D) neither A nor B
An HTTP request message usually has a ________.
A) header
B) data field
C) both A and B
D) neither A nor B
In ADSL, the residential customer needs a(n) ________.
A) DSLAM
B) ADSL modem
C) both A and B
page-pf8
D) neither A nor B
Unsolicited commercial e-mail is better known as ________.
A) spam
B) adware
C) social engineering
D) identity theft
MIMO ________.
A) increases throughput
B) lowers propagation distance
C) both A and B
D) neither A nor B
page-pf9
Codec data comes after the ________ header in VoIP transport frames.
A) IP
B) TCP
C) UDP
D) RTP
Ethernet's hierarchical topology makes it ________.
A) expensive
B) reliable
C) both A and B
D) neither A nor B
page-pfa
For post-authentication communication with an access point, the client in 802.11i PSK
mode will ________ for subsequent communication.
A) always use the same preshared key each time it is connected
B) always use the same session key each time it is connected
C) both A and B
D) neither A nor B
The attack on GHOSTNET began with ________.
A) a wireless vulnerability
B) a social engineering attack
C) malicious mobile code
D) an insider attack
A(n) ________ must find the best-matching row in its ________ table by comparing
multiple row matches.
A) Ethernet switch, switching
B) router, routing
page-pfb
C) both A and B
D) neither A nor B
Who controls the Internet?
A) the U.S. government
B) the United Nations
C) the IETF
D) no one
Credit card number thieves are called ________. (Pick the most precise answer.)
A) numbers racketeers
B) fraudsters
C) identity thieves
D) carders
page-pfc
In hybrid Ethernet802.11 networks, wireless clients use the Ethernet network to gain
access to ________.
A) internal servers
B) their access point
C) both A and B
D) neither A nor B
Your firm has an 8-bit network part. If you need at least 250 subnets, what must your
subnet part size be?
A) 5
B) 6
C) 7
D) 8
page-pfd
The default row ________.
A) always has the mask /32
B) will always match the destination IP address of an incoming packet
C) both A and B
D) neither A nor B
Access points take ________ from wireless devices and send them on to devices on the
wired LAN. They also do the converse.
A) packets
B) frames
C) both A and B
D) neither A nor B

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.