Book Title
Business Data Networks and Security 10th Edition

CS 97168

July 19, 2017
What propagation problem becomes worse as there is a large and dense object between
sender and receiver?
A) multipath interference
B) shadow zones or dead zones
C) both A and B
D) neither A nor B
Which of the following can increase reliability considerably in an Ethernet LAN?
A) using a hierarchical topology
B) using a mesh topology
C) using a bus topology
D) using the Rapid Spanning Tree Protocol
What type of attacker can do the most damage?
A) criminal attackers
B) hackers driven by curiosity
C) employees and ex-employees
D) national governments
IPsec provides protection in two modes of operation; one of these two modes is
A) transport mode
B) data link mode
C) network mode
D) 802.1X mode
Egress filtering examines packets ________.
A) arriving from the outside
B) leaving to the outside
C) both A and B
D) neither A nor B
At the beginning of a telephone call placed through a Bluetooth headset with the
Hands-Free Profile, which device is initially the master?
A) the Bluetooth phone
B) the Bluetooth headset
C) Both are simultaneously masters and slaves.
At 10 meters, a signal has a strength of 100 mW. About how strong will it be at 40
A) about 0.5 mW
B) about 5 mW
C) about 25 mW
D) about 6 mW
Prepare2 can be cracked most quickly by a(n) ________.
A) authentication attack
B) brute-force attack
C) dictionary attack
D) hybrid dictionary attack
Which of the following is used to retrieve Web pages?
In CSMA/CD+ACK, when a wireless NIC wishes to transmit, it listens for traffic. If
there is traffic, it waits. When the traffic stops, it may transmit immediately.
A) always true
B) sometimes true
C) always false
Under the standard, Ethernet switches can provide enough power over UTP for
A) wireless access points
B) desktop computers
C) both A and B
D) neither A nor B
Which of the following is moving toward FTTH?
A) cable modem service companies
B) ADSL service companies
C) both A and B
D) neither A nor B
Data link layer standards govern ________.
A) connectors
B) frame organization
C) both A and B
D) neither A nor B
At which layer would you find standards for requesting videos from a video-sharing site
such as YouTube?
A) application
B) transport
C) Internet
D) none of the above
The purpose of LLC subheader is to ________.
A) permit error detection
B) divide the data field from the trailer
C) divide the header from the data field
D) designate the type of packet in the data field
A WAN is the network that ________.
A) links different sites together
B) provides service within about a mile
C) provides service within a site
D) all of the above
What type of attacker are most of attackers today?
A) disgruntled employees and ex-employees
B) career criminals
C) hackers motivated by a sense of power
D) cyberterrorists
Cloud customers are concerned that ________.
A) their data might be hacked
B) the government may access their data secretly
C) both A and B
D) neither A nor B
"Octet" is the same as ________.
A) "bit"
B) "byte"
C) either A or B, depending on the context
D) neither A nor B
Wi-Fi Standards come from the ________ Working Group.
A) 802.1
B) 802.3
C) 802.11
D) 802.1X
At what layer would you find routers?
A) 1
B) 2
C) 3
D) 4
If an 802.11n client tries to use an 802.11ac access point, ________.
A) they will not be able to communicate
B) they will communicate using 802.11n
C) they will communicate using 802.11ac
D) either B or C
The 5 GHz band usually supports about ________ non-overlapping 20 MHz channel(s).
A) 1
B) 3
C) 7
D) 12
Switches in an Ethernet LAN are organized in a ________ topology.
A) mesh
B) hierarchical
C) point-to-point
D) bus
Managed access points should ________.
A) identify rogue access points
B) be able to push updates out to access points
C) both A and B
D) neither A nor B
Which of the following does the carrier NOT own?
A) the network core
B) customer premises equipment
C) both A and B
D) neither A nor B
The most serious problem with wireless transmission in WLANs is ________.
A) inverse square law attenuation
B) absorptive attenuation
C) shadow zones
D) multipath interference
What transmission medium do ALL DSL services use?
A) one-pair data-grade UTP
B) two-pair data-grade UTP
C) one-pair voice-grade UTP
D) all of the above
OSI standards are dominant at the ________.
A) data link layer
B) physical layer
C) both A and B
D) neither A nor B
A TCP ________ segment is a request to close a connection.
C) Close
D) Disconnect
A router will discard a packet if the Time to Live (TTL) value in an arriving packet is
A) 0
B) 1
C) 254
D) 256
The PSTN core is organized as a ________.
A) mesh
B) hierarchy
C) modified hierarchy
D) loop
UDP is ________.
A) reliable
B) unreliable
C) It depends on the situation.
D) none of the above
Policies should drive ________.
A) implementation
B) oversight
C) both A and B
D) neither A nor B