CS 97168

subject Type Homework Help
subject Pages 9
subject Words 1121
subject Authors Julia L. Panko, Raymond R. Panko

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
What propagation problem becomes worse as there is a large and dense object between
sender and receiver?
A) multipath interference
B) shadow zones or dead zones
C) both A and B
D) neither A nor B
Which of the following can increase reliability considerably in an Ethernet LAN?
A) using a hierarchical topology
B) using a mesh topology
C) using a bus topology
D) using the Rapid Spanning Tree Protocol
What type of attacker can do the most damage?
A) criminal attackers
B) hackers driven by curiosity
page-pf2
C) employees and ex-employees
D) national governments
IPsec provides protection in two modes of operation; one of these two modes is
________.
A) transport mode
B) data link mode
C) network mode
D) 802.1X mode
Egress filtering examines packets ________.
A) arriving from the outside
B) leaving to the outside
C) both A and B
D) neither A nor B
page-pf3
At the beginning of a telephone call placed through a Bluetooth headset with the
Hands-Free Profile, which device is initially the master?
A) the Bluetooth phone
B) the Bluetooth headset
C) Both are simultaneously masters and slaves.
At 10 meters, a signal has a strength of 100 mW. About how strong will it be at 40
meters?
A) about 0.5 mW
B) about 5 mW
C) about 25 mW
D) about 6 mW
page-pf4
Prepare2 can be cracked most quickly by a(n) ________.
A) authentication attack
B) brute-force attack
C) dictionary attack
D) hybrid dictionary attack
Which of the following is used to retrieve Web pages?
A) HTTP
B) HTML
C) RTP
D) SQL
In CSMA/CD+ACK, when a wireless NIC wishes to transmit, it listens for traffic. If
page-pf5
there is traffic, it waits. When the traffic stops, it may transmit immediately.
A) always true
B) sometimes true
C) always false
Under the standard, Ethernet switches can provide enough power over UTP for
________.
A) wireless access points
B) desktop computers
C) both A and B
D) neither A nor B
Which of the following is moving toward FTTH?
A) cable modem service companies
B) ADSL service companies
C) both A and B
page-pf6
D) neither A nor B
Data link layer standards govern ________.
A) connectors
B) frame organization
C) both A and B
D) neither A nor B
At which layer would you find standards for requesting videos from a video-sharing site
such as YouTube?
A) application
B) transport
C) Internet
D) none of the above
page-pf7
The purpose of LLC subheader is to ________.
A) permit error detection
B) divide the data field from the trailer
C) divide the header from the data field
D) designate the type of packet in the data field
A WAN is the network that ________.
A) links different sites together
B) provides service within about a mile
C) provides service within a site
D) all of the above
page-pf8
What type of attacker are most of attackers today?
A) disgruntled employees and ex-employees
B) career criminals
C) hackers motivated by a sense of power
D) cyberterrorists
Cloud customers are concerned that ________.
A) their data might be hacked
B) the government may access their data secretly
C) both A and B
D) neither A nor B
"Octet" is the same as ________.
A) "bit"
B) "byte"
C) either A or B, depending on the context
page-pf9
D) neither A nor B
Wi-Fi Standards come from the ________ Working Group.
A) 802.1
B) 802.3
C) 802.11
D) 802.1X
At what layer would you find routers?
A) 1
B) 2
C) 3
D) 4
page-pfa
If an 802.11n client tries to use an 802.11ac access point, ________.
A) they will not be able to communicate
B) they will communicate using 802.11n
C) they will communicate using 802.11ac
D) either B or C
The 5 GHz band usually supports about ________ non-overlapping 20 MHz channel(s).
A) 1
B) 3
C) 7
D) 12
page-pfb
Switches in an Ethernet LAN are organized in a ________ topology.
A) mesh
B) hierarchical
C) point-to-point
D) bus
Managed access points should ________.
A) identify rogue access points
B) be able to push updates out to access points
C) both A and B
D) neither A nor B
Which of the following does the carrier NOT own?
A) the network core
B) customer premises equipment
C) both A and B
page-pfc
D) neither A nor B
The most serious problem with wireless transmission in WLANs is ________.
A) inverse square law attenuation
B) absorptive attenuation
C) shadow zones
D) multipath interference
What transmission medium do ALL DSL services use?
A) one-pair data-grade UTP
B) two-pair data-grade UTP
C) one-pair voice-grade UTP
D) all of the above
page-pfd
OSI standards are dominant at the ________.
A) data link layer
B) physical layer
C) both A and B
D) neither A nor B
A TCP ________ segment is a request to close a connection.
A) FIN
B) ACK
C) Close
D) Disconnect
page-pfe
A router will discard a packet if the Time to Live (TTL) value in an arriving packet is
________.
A) 0
B) 1
C) 254
D) 256
The PSTN core is organized as a ________.
A) mesh
B) hierarchy
C) modified hierarchy
D) loop
UDP is ________.
A) reliable
B) unreliable
page-pff
C) It depends on the situation.
D) none of the above
Policies should drive ________.
A) implementation
B) oversight
C) both A and B
D) neither A nor B

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.