Book Title
Business Data Networks and Security 10th Edition

CS 31994

July 19, 2017
Which of the following is NOT one of the four major security planning principles?
A) perimeter defense
B) risk analysis
C) comprehensive security
D) defense in depth
The router selects a row in which the next-hop router is labeled local. The router will
send the packet to the ________.
A) default router
B) local next-hop router
C) local host
D) destination host
Which of the following was set up primarily to provide long-distance telephone service
after the breakup of the Bell System in the early 1980s?
C) both A and B
D) neither A nor B
What layer number is the transport layer?
A) 1
B) 2
C) 3
D) 4
The 802.11 standard for mesh networking is ________.
A) 802.11m
B) 802.11r
C) 802.11ac
D) 802.11s
Using SSL/TLS for Web applications is attractive because SSL/TLS ________.
A) is essentially free to use
B) offers the strongest possible cryptographic protections
C) both A and B
D) neither A nor B
In a routing table, Rows 47 and 3497 both match the destination IP address of an
arriving packet's IP address. Which row will the router look at first when trying to find
A) 1
B) 47
C) 3497
D) the default row
How long are IPv4 addresses?
A) 4 bits
B) 32 bits
C) 48 bits
D) 128 bits
In digital certificate authentication, the verifier gets the key it needs directly from the
A) supplicant
B) verifier
C) true party
D) certificate authority
If a host wishes to transmit packets to another host, it must find the other host's
A) IP address
B) host name
C) both A and B
D) neither A nor B
A man in the middle attack ________.
A) reads traffic traveling between one host to another
B) creates a denial service attack on both parties
C) creates a denial of service attack against the client
D) none of the above
Which type of firewall filtering collects streams of packets to analyze them as a group?
A) static packet filtering
B) stateful packet inspection
C) next-generation
D) none of the above
A channel has more bandwidth than is necessary given data transmission speeds
requirements in ________ transmission.
A) normal radio
B) reliable commercial
C) spread spectrum
D) licensed
Physical layer standards govern ________.
A) frame structure
B) signaling
C) both A and B
D) neither A nor B
Mesh networking in 802.11 is likely to use ________.
A) only wireless devices
B) wireless devices and the site's wired LAN
C) both A and B
In digital signaling there is (are) ________ state(s).
A) one
B) two
C) a small number of
D) an infinite number of
Converting application messages into bits is called ________.
A) encapsulation
B) encryption
C) encoding
D) exchange
Firewall log files should be read ________.
A) every month
B) every day
C) every week
D) usually only when a serious attack is suspected
What speed does the LTE Advanced standard require downstream?
A) 3 Mbps
B) 30 Mbps
C) 3 Gbps
D) 30 Gbps
ICCs provide telephone transmission service ________.
A) within LATAs
B) between LATAs
C) between different countries
D) all of the above
An IaaS provides ________.
A) servers
B) application programs
C) both A and B
D) neither A nor B
How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP
segment which is an acknowledgement?
A) process it through the Access Control List (ACL)
B) pass it if it is part of an approved connection
C) both A and B
D) neither A nor B
The creation of routing tables for a router is an example of ________.
A) forwarding
B) control
C) both A and B
D) neither A nor B
What is the almost universal standard for end-to-end encryption?
B) IPsec
D) There is no almost universal standard for end-to-end encryption.
What type of switch connects switches to other switches?
A) trunk switches
B) core switches
C) workgroup switches
D) none of the above
Antivirus software checks e-mail attachments for ________.
A) viruses
B) Trojan horses
C) both A and B
D) neither A nor B
In a ________ topology, there is only one possible path between any two hosts.
A) mesh
B) hierarchical
C) both A and B
D) neither A nor B
If a transmission link has a relatively high error rate, ________.
A) fragmentation is likely to reduce delivery time for the entire application message
B) fragmentation is likely to increase delivery time for the entire application message
C) either A or B
D) neither A nor B
If a frame passes through seven switches between the source and destination hosts, how
many physical links will there be? (Careful!)
A) 1
B) 6
C) 7
D) 8
Trojan horses can spread by ________.
A) e-mailing themselves to victim computers
B) directly propagating to victim computers
C) both A and B
D) neither A nor B
SIP is a ________ protocol for VoIP.
A) signaling
B) transport
C) both A and B
D) neither A nor B
Ethernet becomes the dominant of LAN technology primarily because of its ________.
A) high speed, compared with competing technologies
B) use of multiple switches
C) low cost, compared with competing technologies
D) sophistication, compared with competing technologies
Four-pair UTP uses ________ connectors.
A) universal
B) binary
C) ST or SC
D) none of the above
Which of the following would receive the highest priority?
A) video packets
B) e-mail packets
C) World Wide Web packets
D) network management packets