MGMT 82643

subject Type Homework Help
subject Pages 15
subject Words 1689
subject Authors Tom Case, William Stallings

Unlock document.

This document is partially blurred.
Unlock all pages and 1 million more documents.
Get Access
page-pf1
________ are the branches between exchanges.
A. Subscribers
B. Subscriber line
C. Exchanges
D. Trunks
Of the three classes of intruders into computer systems and networks, the clandestine
user is typically:
A. an insider to the organization
B. an outsider to the organization
C. either an insider or an outsider to the organization
D. none of the above
__________ is telecommunications equipment that is located on the customer's physical
location rather than on the provider's premises or in between.
A. CPE
B. ISP
page-pf2
C. CO
D. IXP
Which of the following does distributed processing typically not support?
A. applications
B. device controllers
C. data
D. mainframes
The WAP Programming Model uses a ________ that acts as a proxy server for
the wireless domain.
A. translator
B. WAP server
C. gateway
D. decoder
page-pf3
This option makes use of four pairs of Category 5 UTP to support devices over a range
of up to 100 m.
A. 1000BASE-SX
B. 1000BASE-T
C. 1000BASE-LX
D. 1000BASE-CX
In a ________ processing configuration, the application processing is performed in an
optimized fashion, taking advantage of the strengths of both client and server machines
and of the distribution of data.
A. host-based
B. server-based
C. client-based
D. cooperative
page-pf4
The Internet evolved from the _________, which was developed in 1969 by the
Advanced Research Projects Agency (ARPA) of the U.S. Department of Defense.
The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds
B. its high overhead
C. the extensive use of in-band signaling
D. the increasing reliability of networks
Analog information sources include:
A. sounds
B. music
C. video
D. all of the above
page-pf5
Which of the following is common in today's data centers?
A. redundant/backup power supplies
B. environmental controls
C. data communication connections
D. all of the above
An encoding scheme is used:
A. in digital transmission to map binary digits to signal elements
B. in analog transmission to clean up the quality of the transmission
C. to help minimize errors
D. all of the above
page-pf6
The ________ is one of a number of major Internet interconnection points that serve to
tie all the ISPs together.
A. CPE
B. POP
C. IXP
D. NSP
The time interval between when a user presses a key and when the result of that action
arrives at his or her workstation is called the:
A. response time
B. turn-around time
C. think time
D. delay time
If a carrier wave is modulated with 4 amplitudes and 4 phase changes, how
many possible signal combinations are there?
A. 4
page-pf7
B. 8
C. 16
D. 32
A(n) __________ looks for user behavior that differs from that expected from
a legitimate user.
A. ACK
B. IDS
C. SSL
D. TLS
A person or organization that maintains a business relationship with, and uses service
from, cloud providers is a __________.
A. cloud carrier
B. cloud broker
C. cloud consumer
D. cloud auditor
page-pf8
This long-wavelength option supports duplex links of up to 550 m of 62.5-μm or 50-μm
multimode fiber or up to 5 km of 10-μm single mode
fiber. Wavelengths are in the range of 1270"1355 nm.
A. 1000BASE-SX
B. 1000BASE-T
C. 1000BASE-LX
D. 1000BASE-CX
The ________ supports a basic electronic mail facility by providing a mechanism for
transferring messages among separate hosts.
A. SNMP
B. SSH
C. HTTP
D. SMTP
page-pf9
IEEE 802.11 defines _______ services that need to be provided by the WLAN
to achieve functionality equivalent to that which is inherent to wired LANs.
A. ten
B. nine
C. eight
D. seven
Which of the following are LAN protocols?
A. X.25
B. ATM
C. Token Ring
D. all of the above
page-pfa
_______ is the most heavily used multiplexing technique and is familiar to anyone who
has ever used a radio or television set.
A. FDM
B. TDM
C. RTM
D. TRMT
The data contained within the Frame Relay address field is the _________.
A. MAC address
B. virtual circuit identifier
C. IP number
D. data link connection identifier
Which of the following statements is generally true regarding the original class of email
viruses?
A. it sends itself to selected names on the user's email mailing list
B. arrive in email attachments
page-pfb
C. usually do no local damage on the infected machine
D. all of the above
The first two important applications developed for the ARPANET were:
A. Telnet and FTP
B. Telnet and email
C. FTP and email
D. email and world-wide-web
Peak download rate for a 4G network is __________.
A. 1 Gbps
B. 100 Mbps
C. 500 Mbps
D. 384 kbps
page-pfc
The ________ layer contains the logic needed to support the various user applications.
A. network access
B. physical
C. application
D. transport
IEEE 802.11 defines a number of services that need to be provided by wireless LAN to
provide functionality. Which of the following is not one of these services?
A. Association
B. Reassociation
C. Authentication
D. Coordination
page-pfd
The ________ layer is concerned with the exchange of data between a computer and
the network to which it is attached.
A. transport
B. application
C. network access
D. physical
An autonomous system (AS) exhibits which of the following characteristics?
A. is a set of routers and networks managed by a single organization
B. consists of a group of routers exchanging information via a common routing protocol
C. except in times of failure is connected
D. all of the above
__________ is a monitored behavior.
A. Attempts to open, view, delete, and/or modify files
B. Attempts to format disk drives and other unrecoverable disk operations
page-pfe
C. Modification to the logic of executable files or macros
D. All of the above
The ideal solution to the threat of viruses is:
A. detection
B. prevention
C. identification
D. removal
The network vehicle used for worm propagation is ___________.
A. electronic mail facility
B. remote execution capability
C. remote login capability
D. all of the above
page-pff
Which of the following is NOT one of the distinguishing characteristics for optical fiber
cables compared with twisted pair or coaxial cables?
A. greater capacity
B. lower attenuation
C. electromagnetic isolation
D. heavier weight
Which of the following is a disadvantage of circuit switching?
A. delay
B. complex routing and control
C. requires subscriber compatibility
D. all of the above
page-pf10
First generation mobile telephone systems used analog voice communication based on
amplitude modulation.
Typically, an IP address refers to an individual host on a particular network.
_________ are specialized computers that provide services for clients such as database
services, printing services, and communication services.
The two frequency bands typically used by IEEE 802.11 wireless networks are located
approximately at 900 MHz and 2.4 GHz.
page-pf11
A typical use of circuit-level gateways is a situation in which the system administrator
trusts the internal users.
WLAN standards have been designed to replace Ethernet.
__________ systems provide a common repository for messages from multiple sources.
page-pf12
IP addresses are usually written in what is called ___________ notation , with a
decimal number representing each of the octets of the 32-bit address.
Having multiple paths from one station to another through a network contributes to
reliability.
Congestion _________ procedures are used at the onset of congestion to minimize the
effect on the network.
Frames whose discard eligibility is set due to committed information rates are less
likely to be removed from the network.
page-pf13
Client-server computing is fundamentally based on networking.
__________ products are typically based on one of three underlying mechanisms:
message passing, remote procedure calls, and object-oriented mechanisms.
The networks connected at an IXP are owned and operated by _________.
page-pf14
Twisted pair wires are immune from all interference due to electromagnetic coupling
because of the twisting of the wires.
The ________ service carries sequences of pictures in time, in essence, making use of a
sequence of raster-scan images.
Most WAE implementations use __________to interconnect network endpoints.
_________ refers to the altering or replacing of valid data or the introduction of false
data into a file or database.
page-pf15
Presence information is associated with every presentity in the system and is
maintained by the presence service.

Trusted by Thousands of
Students

Here are what students say about us.

Copyright ©2022 All rights reserved. | CoursePaper is not sponsored or endorsed by any college or university.