Book Title
Business Data Networks and Security 10th Edition

MPCS 44725

July 19, 2017
In what mode of 802.11i operation is a central authentication server used?
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B
E-mail bodies that have non-English text use ________.
A) RFC 822 and RFC 2822
Momentary traffic peaks can lead to ________.
A) latency
B) packet loss
C) both A and B
D) neither A nor B
Which of the following regulates telephony within individual states in the United
C) neither A nor B
What kind of address do hosts have on the Internet?
A) World Wide Web URLs
B) MAC addresses
C) EUI-48 addresses
D) IP addresses
Jitter is a problem for ________.
A) downloading a file attached to an e-mail
B) e-mail
C) both A and B
D) neither A nor B
SNMPv3 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) all of the above
Convert decimal 8 to binary.
A) 100
B) 1000
C) 10000
D) 111
Users of an access point share the transmission capacity of the access point. The
throughput a user gets is called the ________.
A) rated speed
B) aggregate throughput
C) individual throughput
D) all of the above
Another term for authorization is ________.
A) authentication
B) token
C) establishing the creator of a file
D) permission
Dotted decimal notation is used by ________.
A) networks
B) computers
C) both A and B
D) neither A nor B
Users typically can eliminate a vulnerability in one of their programs by ________.
A) installing a patch
B) doing a zero-day installation
C) using an antivirus program
D) all of the above
With WATS calls, the ________ pays and pays ________ per minute than direct
distance dialing.
A) caller, more
B) caller, less
C) called party, more
D) called party, less
Flow control in TCP depends on the ________ field.
A) acknowledgement number
B) window size
C) both A and B
D) neither A nor B
________ look at ________, and ________ look at ________.
A) Antivirus programs, packets, firewalls, packets
B) Antivirus programs, files, firewalls, files
C) Antivirus programs, packets, firewalls, files
D) Antivirus programs, files, firewalls, packets
PPP is standardized at the ________ layer.
A) physical
B) data link
C) Internet
D) transport
Under the standard, Ethernet switches can provide enough power over UTP for
A) wireless access points
B) voice over IP telephones
C) both A and B
D) neither A nor B
Which of the following is used to query a directory server to get someone's e-mail
Typically, the most common way for an attacker to get extensive privileges on a
computer is to ________.
A) take over an application program
B) take over the operating system
C) take over a computer's hardware
D) privilege escalation after an initial takeover
The digital certificate provides the ________.
A) private key of the supplicant
B) private key of the true party
C) public key of the supplicant
D) none of the above
________ is an interior dynamic routing protocol.
C) both A and B
D) neither A nor B
After the Internet layer process does encapsulation, it passes the IP packet to the
________ layer process.
A) transport
B) data link
C) physical
D) none of the above
Which is the correct formula for decibels?
A) 10 * P2/P1
B) 10 * (P2/P1)2
C) Log10(P2/P1)
D) none of the above
Wireless access points typically link wireless clients to ________.
A) wireless servers
B) servers on the wired network
C) both A and B
In a subnet mask, the 1s correspond to the ________.
A) network part
B) subnet part
C) host part
D) none of the above
Tor was created to improve ________.
A) anonymity
B) end-to-end encryption
C) file download speed
D) all of the above
When an e-mail user encrypts an outgoing messages with SSL/TLS, how far will this
encryption extend?
A) to the sender's e-mail server
B) to the receiver's e-mail server
C) to the receiver's client host
D) to an application program on the receiver's client host
A router's load-balancing process is determined by ________.
A) the SDN controller
B) an SDN application
C) the router
D) any of the above
MPLS is ________ the source and destination hosts.
A) transparent to
B) nontransparent to
C) apparent to
D) a burden on
When a firewall identifies an attack packet, it ________.
A) discards the packet
B) copies information about the packet into a log file
C) both A and B
D) neither A nor B
A traditional e-mail user sending messages to his or her mail server would most likely
use ________.
A) IMAP standard
B) POP standard
C) either IMAP or POP standard
D) SMTP standard
Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) the scanning unit