CS 31994

subject Type Homework Help
subject Pages 9
subject Words 1126
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
Which of the following is NOT one of the four major security planning principles?
A) perimeter defense
B) risk analysis
C) comprehensive security
D) defense in depth
The router selects a row in which the next-hop router is labeled local. The router will
send the packet to the ________.
A) default router
B) local next-hop router
C) local host
D) destination host
Which of the following was set up primarily to provide long-distance telephone service
after the breakup of the Bell System in the early 1980s?
A) AT&T
B) RBOCs
page-pf2
C) both A and B
D) neither A nor B
What layer number is the transport layer?
A) 1
B) 2
C) 3
D) 4
The 802.11 standard for mesh networking is ________.
A) 802.11m
B) 802.11r
C) 802.11ac
D) 802.11s
page-pf3
Using SSL/TLS for Web applications is attractive because SSL/TLS ________.
A) is essentially free to use
B) offers the strongest possible cryptographic protections
C) both A and B
D) neither A nor B
In a routing table, Rows 47 and 3497 both match the destination IP address of an
arriving packet's IP address. Which row will the router look at first when trying to find
matches?
A) 1
B) 47
C) 3497
D) the default row
page-pf4
How long are IPv4 addresses?
A) 4 bits
B) 32 bits
C) 48 bits
D) 128 bits
In digital certificate authentication, the verifier gets the key it needs directly from the
________.
A) supplicant
B) verifier
C) true party
D) certificate authority
If a host wishes to transmit packets to another host, it must find the other host's
________.
A) IP address
page-pf5
B) host name
C) both A and B
D) neither A nor B
A man in the middle attack ________.
A) reads traffic traveling between one host to another
B) creates a denial service attack on both parties
C) creates a denial of service attack against the client
D) none of the above
Which type of firewall filtering collects streams of packets to analyze them as a group?
A) static packet filtering
B) stateful packet inspection
C) next-generation
D) none of the above
page-pf6
A channel has more bandwidth than is necessary given data transmission speeds
requirements in ________ transmission.
A) normal radio
B) reliable commercial
C) spread spectrum
D) licensed
Physical layer standards govern ________.
A) frame structure
B) signaling
C) both A and B
D) neither A nor B
page-pf7
Mesh networking in 802.11 is likely to use ________.
A) only wireless devices
B) wireless devices and the site's wired LAN
C) both A and B
In digital signaling there is (are) ________ state(s).
A) one
B) two
C) a small number of
D) an infinite number of
Converting application messages into bits is called ________.
A) encapsulation
B) encryption
C) encoding
page-pf8
D) exchange
Firewall log files should be read ________.
A) every month
B) every day
C) every week
D) usually only when a serious attack is suspected
What speed does the LTE Advanced standard require downstream?
A) 3 Mbps
B) 30 Mbps
C) 3 Gbps
D) 30 Gbps
page-pf9
ICCs provide telephone transmission service ________.
A) within LATAs
B) between LATAs
C) between different countries
D) all of the above
An IaaS provides ________.
A) servers
B) application programs
C) both A and B
D) neither A nor B
page-pfa
How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP
segment which is an acknowledgement?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
The creation of routing tables for a router is an example of ________.
A) forwarding
B) control
C) both A and B
D) neither A nor B
What is the almost universal standard for end-to-end encryption?
A) SSL/TLS
B) IPsec
page-pfb
C) PGP
D) There is no almost universal standard for end-to-end encryption.
What type of switch connects switches to other switches?
A) trunk switches
B) core switches
C) workgroup switches
D) none of the above
Antivirus software checks e-mail attachments for ________.
A) viruses
B) Trojan horses
C) both A and B
D) neither A nor B
page-pfc
In a ________ topology, there is only one possible path between any two hosts.
A) mesh
B) hierarchical
C) both A and B
D) neither A nor B
If a transmission link has a relatively high error rate, ________.
A) fragmentation is likely to reduce delivery time for the entire application message
B) fragmentation is likely to increase delivery time for the entire application message
C) either A or B
D) neither A nor B
page-pfd
If a frame passes through seven switches between the source and destination hosts, how
many physical links will there be? (Careful!)
A) 1
B) 6
C) 7
D) 8
Trojan horses can spread by ________.
A) e-mailing themselves to victim computers
B) directly propagating to victim computers
C) both A and B
D) neither A nor B
SIP is a ________ protocol for VoIP.
A) signaling
B) transport
page-pfe
C) both A and B
D) neither A nor B
Ethernet becomes the dominant of LAN technology primarily because of its ________.
A) high speed, compared with competing technologies
B) use of multiple switches
C) low cost, compared with competing technologies
D) sophistication, compared with competing technologies
Four-pair UTP uses ________ connectors.
A) universal
B) binary
C) ST or SC
D) none of the above
page-pff
Which of the following would receive the highest priority?
A) video packets
B) e-mail packets
C) World Wide Web packets
D) network management packets

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.