Management 10052

subject Type Homework Help
subject Pages 14
subject Words 1673
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
A key logical component of an IDS is:
A. sensors
B. analyzers
C. user interface
D. all of the above
The ________ is a company that provides backbone service to an ISP.
A. NSP
B. CO
C. IXP
D. CPE
Most cordless digital telephone systems used in homes employ ________ or time
division duplexing along with FDM.
A. TDMA
B. GSM
page-pf2
C. ITU-T
D. SDH
Which of the following is NOT one of the main application areas that serve as one of
the drivers in determining the design and makeup of enterprise networks?
A. Transaction processing
B. IP telephony
C. Multimedia messaging
D. E-business
Which of the following is NOT one of the four layers in the model of business-driven
convergence?
A. Networks
B. Infrastructure
C. Management
D. Services
page-pf3
The TCP/IP architecture contains ________ layers.
A. two
B. three
C. four
D. five
SONET/SDH signal payload speeds range:
A. from 902 Mbps to 1.53 Gbps
B. from 1.8 Mbps to 2.4 Gbps
C. from 50 Mbps to 1.53 Gbps
D. from 1.80 Mbps to 153 Gbps
page-pf4
The physical layer for IEEE 802.11 has been issued in _______ stages.
A. 3
B. 5
C. 7
D. 9
A primary multiple access scheme used in cellular telephony is __________.
A. FDMA
B. TDMA
C. CDMA
D. all of the above
A practical application for multicasting is:
A. teleconferencing
B. multimedia
C. database
page-pf5
D. all of the above
A station of this type either is stationary or moves only within the direct communication
range of the communicating stations of a single BSS.
A. ISS transition
B. no transition
C. BSS transition
D. ESS transition
The ideal design for cells in a cellular network is a hexagonal shape because _____.
A. this makes enforcement of shapes easier
B. this is the easiest to implement
C. this makes all frequencies available to all cells
D. this makes the distance to all adjacent cells the same
page-pf6
_________ is the unwanted coupling between signal paths.
A. Thermal noise
B. Intermodulation noise
C. Crosstalk
D. Impulse noise
Which of the following is NOT a reason for network jitter when using packet switching
networks?
A. packets may vary in length
B. packets may take different paths through the network
C. packets may encounter network congestion
D. data rates will vary from one trunk line to the next
page-pf7
A stateful inspection firewall ________.
A. applies a set of rules to each incoming and outgoing IP packet and then forwards or
discards the packet
B. controls TCP traffic by creating a directory of outbound TCP connections
C. acts as a relay of application-level traffic
D. sets up two TCP connections, one between itself and a TCP user on an inner host and
one between itself and a TCP user on an outside host
Among the application services lists given below, which lists the services in order such
that the desired throughput rates are increasing?
A. Still image transfers, large file transfers, transaction processing, and voice
B. Voice, transaction processing, still image transfers, and large file transfers
C. Large file transfers, voice, transaction processing, and still image transfers
D. Transaction processing, voice, still image transfers, and large file transfers
The logical function that determines when a station operating within a BSS is permitted
to transmit and may be able to receive PDUs.
A. access point
page-pf8
B. basic service set
C. extended service set
D. coordination function
The concept that describes the merger of previously distinct telephony and information
technologies and markets is called ___________.
A. unification
B. outsourcing
C. merger
D. convergence
Which of the following is a category of ASP business?
A. functional/specialist
B. vertical market
C. enterprise
D. all of the above
page-pf9
The bandwidth of a signal is:
A. the width of the spectrum
B. the average of the frequencies
C. the range of frequencies in the signal
D. the minimum amplitude of the signal
________ is a set of function and call programs that allow clients and servers to
intercommunicate.
A. IaaS
B. SQL
C. API
D. Middleware
page-pfa
A stereo compact disc typically requires the bandwidth for each channel to be:
A. 300 Hz
B. 3,400 Hz
C. 8,000 Hz
D. 20,000 Hz
Which of the following is NOT a requirement for the Corporate Computing Function?
A. provide computing services in a reliable, professional, and technically competent
manner
B. deploying technology in ways that make the work productive and not be concerned
about whether or not the technology makes work enjoyable for employees
C. provide computing capabilities to all organizational units that need them
D. assist in satisfying the special computing needs of user departments
_________ virtualization disguises the complexity of the underlying communications
network.
page-pfb
A. Server
B. Network
C. Storage
D. Operating system
__________ allows users in two or more locations to interact simultaneously
via two-way video and audio transmission.
A. Web conferencing
B. Unified messaging
C. Videoconferencing
D. Audio conferencing
A worm that can attack a variety of OSs rather than a single OS such as Windows is
______________.
A. multiplatform
B. multi-exploit
C. polymorphic
page-pfc
D. metamorphic
The _________ field indicates the type of information in the information field.
A. PT
B. VPI
C. GFC
D. CRC
A widely used extension to the RFC 822 framework that expands what can be sent via
email is called _________.
A. MIME
B. ASCII
C. VoIP
D. SMTP
page-pfd
Which of the following is NOT one of the example applications of T-1
leased transmission facilities?
A. cable television systems
B. private data networks
C. video teleconferencing
D. high-speed digital facsimile
A ________ is the smallest single component of a digital image.
A. RGB
B. megapixel
C. pixel
D. none of the above
page-pfe
A secret entry point into a program that allows intruders aware of the breached area to
gain access and bypass the usual security access procedures is called a:
A. logic bomb
B. Trojan horse
C. virus
D. none of the above
_________ is a 16-bit code that is backward compatible with IRA/ASCII.
The data transmitted by a synchronous TDM system are organized into ________, each
of which contains a cycle of time slots.
page-pff
SMTP is the standard protocol in the TCP/IP protocol suite for transferring email
between hosts.
A station must maintain an association with the AP within its current BSS.
Three services relate to this requirement: association, reassociation, and ___________.
One simple approach to improving efficiency is to physically partition the LAN into
separate broadcast domains.
As mobile units move, they pass from cell to cell, which requires transferring of the call
from one base transceiver to another; this process is
called a __________ .
page-pf10
_________ standards provide a means by which a stream of data can be transmitted,
either synchronously or asynchronously, onto a transmission medium.
Standards can be developed simultaneously for protocols at each layer of the
architecture.
The _________ service enables transfer of data between a station on an IEEE 11 LAN
and a station on an integrated IEEE 802.x LAN.
page-pf11
A loss of _________ is the unauthorized modification or destruction of information.
The organization sacrifices efficiency when it wastes money on communication lines
with capacities that are much higher than it needs.
Due to the fixed cell size, the processing of ATM cells is faster than protocols
employing a variable length cell.
A __________ is a facility that houses computer systems and their associated
components including storage and telecommunication systems.
page-pf12
The requirement for networking capability within the individual building is just as
strong as the requirement for wide area networking.
Because of the high speeds involved and the small amount of overhead, when compared
to Frame Relay, congestion control in ATM networks is more complex.
Atmospheric absorption occurs because of:
A. the distance traversed in atmospheric transmission
B. the water and oxygen content
C. pollution and carbon content
D. nitrogen content
page-pf13
An IDS comprises three logical components: sensors, user interface, and _______.
The basic building block of any communications facility is the transmission line.
Digital signaling usually means that the information being conveyed is binary.
page-pf14
A _________ is a logical subgroup within a LAN that is created by software rather than
by physically moving and separating devices.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.