Type
Quiz
Book Title
Business Data Networks and Security 10th Edition
ISBN 13
978-0133544015

MPCS 44725

July 19, 2017
In what mode of 802.11i operation is a central authentication server used?
A) 802.1X mode
B) PSK mode
C) both A and B
D) neither A nor B
E-mail bodies that have non-English text use ________.
A) RFC 822 and RFC 2822
B) HTTP
C) MIME
D) UNICODE
Momentary traffic peaks can lead to ________.
A) latency
B) packet loss
C) both A and B
D) neither A nor B
Which of the following regulates telephony within individual states in the United
States?
A) FCC
B) PUCs
C) neither A nor B
What kind of address do hosts have on the Internet?
A) World Wide Web URLs
B) MAC addresses
C) EUI-48 addresses
D) IP addresses
Jitter is a problem for ________.
A) downloading a file attached to an e-mail
B) e-mail
C) both A and B
D) neither A nor B
SNMPv3 uses ________ for authentication.
A) community names
B) digital certificates and digital signatures
C) a different password for each manager-agent pair
D) all of the above
Convert decimal 8 to binary.
A) 100
B) 1000
C) 10000
D) 111
Users of an access point share the transmission capacity of the access point. The
throughput a user gets is called the ________.
A) rated speed
B) aggregate throughput
C) individual throughput
D) all of the above
Another term for authorization is ________.
A) authentication
B) token
C) establishing the creator of a file
D) permission
Dotted decimal notation is used by ________.
A) networks
B) computers
C) both A and B
D) neither A nor B
Users typically can eliminate a vulnerability in one of their programs by ________.
A) installing a patch
B) doing a zero-day installation
C) using an antivirus program
D) all of the above
With WATS calls, the ________ pays and pays ________ per minute than direct
distance dialing.
A) caller, more
B) caller, less
C) called party, more
D) called party, less
Flow control in TCP depends on the ________ field.
A) acknowledgement number
B) window size
C) both A and B
D) neither A nor B
________ look at ________, and ________ look at ________.
A) Antivirus programs, packets, firewalls, packets
B) Antivirus programs, files, firewalls, files
C) Antivirus programs, packets, firewalls, files
D) Antivirus programs, files, firewalls, packets
PPP is standardized at the ________ layer.
A) physical
B) data link
C) Internet
D) transport
Under the standard, Ethernet switches can provide enough power over UTP for
________.
A) wireless access points
B) voice over IP telephones
C) both A and B
D) neither A nor B
Which of the following is used to query a directory server to get someone's e-mail
address?
A) LDAP
B) IMAP
C) SNMP
D) HTTP
Typically, the most common way for an attacker to get extensive privileges on a
computer is to ________.
A) take over an application program
B) take over the operating system
C) take over a computer's hardware
D) privilege escalation after an initial takeover
The digital certificate provides the ________.
A) private key of the supplicant
B) private key of the true party
C) public key of the supplicant
D) none of the above
________ is an interior dynamic routing protocol.
A) OSPF
B) BGP
C) both A and B
D) neither A nor B
After the Internet layer process does encapsulation, it passes the IP packet to the
________ layer process.
A) transport
B) data link
C) physical
D) none of the above
Which is the correct formula for decibels?
A) 10 * P2/P1
B) 10 * (P2/P1)2
C) Log10(P2/P1)
D) none of the above
Wireless access points typically link wireless clients to ________.
A) wireless servers
B) servers on the wired network
C) both A and B
In a subnet mask, the 1s correspond to the ________.
A) network part
B) subnet part
C) host part
D) none of the above
Tor was created to improve ________.
A) anonymity
B) end-to-end encryption
C) file download speed
D) all of the above
When an e-mail user encrypts an outgoing messages with SSL/TLS, how far will this
encryption extend?
A) to the sender's e-mail server
B) to the receiver's e-mail server
C) to the receiver's client host
D) to an application program on the receiver's client host
A router's load-balancing process is determined by ________.
A) the SDN controller
B) an SDN application
C) the router
D) any of the above
MPLS is ________ the source and destination hosts.
A) transparent to
B) nontransparent to
C) apparent to
D) a burden on
When a firewall identifies an attack packet, it ________.
A) discards the packet
B) copies information about the packet into a log file
C) both A and B
D) neither A nor B
A traditional e-mail user sending messages to his or her mail server would most likely
use ________.
A) IMAP standard
B) POP standard
C) either IMAP or POP standard
D) SMTP standard
Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) the scanning unit