MGMT 68330

subject Type Homework Help
subject Pages 10
subject Words 1392
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
__________ capture keystrokes on a compromised system.
A. Worms
B. Zombies
C. Keyloggers
D. All of the above
_________ images are the most common type of image being transmitted over today's
enterprise networks.
A. Color
B. Black and white
C. Pixilated
D. Grayscale
Analog signals are:
A. continuous
B. discrete
page-pf2
C. discontinuous
D. all of the above
Which of the following is NOT one of the stated trends in technology identified as
contributing to increasing traffic and services in networks?
A. The emergence of the Internet
B. More and more people are discovering the World Wide Web as a valuable resource
C. The ever-increasing use of mobile devices and applications
D. Increasing quality and variety of services in both voice and data networks
Which of the following are WAN protocols?
A. Frame Relay
B. T-1
C. SONET
D. all of the above
page-pf3
Which of the following is a true statement regarding SMTP processing of messages?
A. messages typically are sent through multiple SMTP systems while going from the
sender to the recipient
B. the SMTP sender remains responsible for a message until it has been delivered to the
recipient
C. SMTP does not guarantee that all messages are delivered
D. SMTP attempts to send messages until the recipients become available
Network topology refers to the way individual end stations access the network prior to
transmission of user data.
The fact that signal strength falls off with distance is called ________________.
A. bandwidth
page-pf4
B. attenuation
C. resistance
D. propagation
Which of the following is NOT one of the four types of information found on
networks?
A. data
B. control
C. video
D. voice
All Frame Relay nodes contain which of the following protocols?
A. LAPB
B. LAPD
C. LAPF Core
D. LAPF Control
page-pf5
At the ________ level the manager deals with the information network in terms of the
services that must be available to ensure that users can take full advantage of the
applications that they use.
A. enterprise services
B. communications infrastructure
C. network infrastructure
D. application
The ATM connections are identified by:
A. virtual paths within data link identifiers
B. virtual channels within virtual paths
C. virtual circuits within virtual paths
D. virtual circuits within data link identifiers
page-pf6
Given a frequency of 60 Hz ( cycles per second ), the period of the signal is:
A. 0.166667 sec.
B. 0.166667 Hz.
C. one second
D. 60 seconds
Most organizations agree that __________ become their worst security problem.
A. their own users
B. viruses
B. intrusions
D. managers
A public telecommunications network can be described using four generic components:
page-pf7
A. senders, receivers, lines, and nodes
B. subscribers, local loops, exchanges, and trunks
C. subscribers, trunks, nodes, and loops
D. local loops, subscriber lines, exchanges, and trunks
Today, _________ is the most widely accepted QoS mechanism in enterprise networks.
A. AS
B. SLA
C. DS
D. SSL
A multiplexing technique where multiple users use distinct carrier frequencies separated
such that the modulated signals do not overlap is called ___________.
A. frequency division multiplexing
B. time division multiplexing
C. separate channel multiplexing
page-pf8
D. common channel multiplexing
This option supports 1-Gbps links among devices located within a single room or
equipment rack, using copper jumpers (specialized STP cable that spans no more than
25 m). Each link is composed of a separate STP running in each direction.
A. 1000BASE-SX
B. 1000BASE-T
C. 1000BASE-LX
D. 1000BASE-CX
Which of the following is a commonly used set of standards for computer
communications?
A. SLA
B. ISO
C. POP
D. TCP/IP
page-pf9
The _________ in an internet are responsible for receiving and forwarding
packets through the interconnected set of networks, making routing decisions based on
knowledge of the topology and traffic/delay conditions of the internet.
A. gateways
B. routers
C. channels
D. links
A _________ is a database in which information access is limited to the selection of
rows that satisfy all search criteria.
Which of the following is NOT one of the stated advantages of packet switching over
circuit switching?
page-pfa
A. there is less network delay
B. data rate conversion can be provided
C. priorities can be used
D. connections are never rejected
Which of the following detailed performance parameters might be included in an SLA?
A. service performance parameters, such as expected throughput, drop probability, and
latency
B. constraints on the ingress and egress points at which the service is provided,
indicating the scope of the service
C. traffic profiles that must be adhered to for the requested service to be provided
D. all of the above
A ________ is a site that has a collection of telecommunications equipment and usually
refers to ISP or telephone company sites.
A. POP
B. NSP
page-pfb
C. CPE
D. IXP
All applications operate over a uniform _________.
A. SQL
B. API
C. SaaS
D. IaaS
An encrypted virus can only be triggered after an external software program is triggered
to decrypt the virus.
page-pfc
The process of error control involves two elements: error detection and _________.
A __________ frame is a recognizable frame that arrives, but some of the bits have
been altered during transmission.
Middleware is used to overcome lack of standardization.
A loss of __________ is the disruption of access to or use of information or
an information system.
page-pfd
_________ is the physical propagation of the signal along a communication medium.
Three functional procedures are involved in the Border Gateway Protocol (BGP):
neighbor acquisition, neighbor reachability, and __________.
A cloud broker evaluates the services provided by a cloud provider in terms of security
controls, privacy impact, performance, and so on.
OSI is another standardized architecture that is often used to describe communications
page-pfe
functions but is now rarely implemented.
A representation of images that uses an array of pixels is called ______.
In 1995 the Internet Engineering Task Force issued a specification for a next-generation
IP; this specification was turned into a standard in 1996 known as _________.
The capacity of optical fiber cable is more than 1000 times greater than coaxial cables.
page-pff
A ________ is an intermediary program that acts as both a server and a client for the
purpose of making requests on behalf of other clients.
Also known as a zombie or drone, a __________ is a program that secretly takes over
another Internet-attached computer and then uses that computer to launch attacks that
are difficult to trace to the creator.
A security policy should be established and careful consideration given to the personnel
allowed external access to internal systems.
page-pf10
__________ services are deployed in several ways, including conventional Ethernet,
Ethernet over SDH (Synchronous Digital Hierarchy), and Ethernet over MPLS.
___________ refers to programs (e.g., script, macro, or other portable instruction) that
can be shipped unchanged to a heterogeneous collection of platforms and execute with
identical semantics.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.