Term
WMAN
A) can operate as fast as 100 Mbps.
B) is a high-data-rate broadband system that can operate over substantial distances.
C) is also called WiMAN.
D) can range more than 50 miles. |
|
Definition
B) is a high-data-rate broadband system that can operate over substantial distances. |
|
|
Term
Industrial, scientific, medical (ISM) bands
A) are not licensed in the United States. B) are not defined within the NII. C) are licensed in most other countries. D) are not utilized by private communications networks.
|
|
Definition
A) are not licensed in the United States. |
|
|
Term
Bluetooth
A) cannot be used with camera or mp3 players. B) is the predominant WPAN technology of today. C) is not readily able to be used by individuals. D) cannot connect laptops to printers and other peripherals.
|
|
Definition
B) is the predominant WPAN technology of today. |
|
|
Term
A basic service set (BSS)
A) has a minimum of four stations. B) computers may not be mobile stations. C) is the fundamental structure of WLANs. D) cannot be an independent standalone LAN.
|
|
Definition
C) is the fundamental structure of WLANs. |
|
|
Term
A voice coder (vocoder)
A) transform digital data into spoken voice. B) are cell phones with PDA features. C) are not similar to codecs used for analog to digital conversion in wired networks. D) are built into the cell phones to transform spoken voice (analog) into digital data.
|
|
Definition
D) are built into the cell phones to transform spoken voice (analog) into digital data. |
|
|
Term
Wireless security
A) is not presently a primary consideration. B) does not put emphasis on ways to make transmissions unreadable to inceptors. C) does not place emphasis that delivery is to the intended recipient without interception. D) bears the additional burden of its transmissions being more easily captured.
|
|
Definition
D) bears the additional burden of its transmissions being more easily captured. |
|
|
Term
An access point (AP)
A) permits its stations to communicate with stations outside the BSS. B) cannot be connected by wire to the organization's wired networks. C) is a node connected wirelessly to the BSS stations. D) cannot be a node connected via of a backbone.
|
|
Definition
C) is a node connected wirelessly to the BSS stations. |
|
|
Term
Mobile switching centers (MSC)
A) do not provide links to the wired telephone network and the Internet. B) connect and control the base stations. C) cannot maintain calling and billing records. D) do not provide base station coordination.
|
|
Definition
B) connect and control the base stations. |
|
|
Term
A wireless local area network (WLAN)
A) uses radio wave carriers to transmit signals among its nodes. B) .do not provide flexibility and mobility for connecting users to wired networks. C) do not share the networking burden with their wired counterparts. D) operate between 5 GHz and 8 GHz bands.
|
|
Definition
A) uses radio wave carriers to transmit signals among its nodes. |
|
|
Term
An independent basic service set (IBSS)
A) needs a dedicated server.
B) is also called an ad hoc network. C) cannot operate as a peer-to-peer LAN.
D) can not have more than one server. |
|
Definition
B) is also called an ad hoc network. |
|
|
Term
FDMA
A) provided security against fraudulent use. B) multiplexed the analog systems of voice channels of the first-generation cell phones. C) were free of analog-based communication problems. D) provided extensive coverage.
|
|
Definition
B) multiplexed the analog systems of voice channels of the first-generation cell phones. |
|
|
Term
Frequency bands
A) are not based on the needs of various services that use them. B) are a number of subgroups partitioned by the FCC from the available wireless frequency spectrum. C) are allocated very freely by the FCC. D) .are not in demand by users.
|
|
Definition
B) are a number of subgroups partitioned by the FCC from the available wireless frequency |
|
|
Term
Downlink refers to
A) signals sent from one location on earth to an orbiting satellite. B) retransmission of signals to another earthbound station in a different location. C) retransmission of signals to another station that is not in line of sight with the satellite. D) the use of satellites relay stations.
|
|
Definition
B) retransmission of signals to another earthbound station in a different location. |
|
|
Term
The cell phone
A) was first demonstrated in 1983 by Motorola. B) is a low-power transmitter/receiver (transceiver) for voice and data. C) communicates wirelessly through a collection of satellites. D) cannot be used as the sole phone that people have.
|
|
Definition
B) is a low-power transmitter/receiver (transceiver) for voice and data. |
|
|
Term
Satellites in geosynchronous earth orbits (GEOs)
A) are not in as high an orbit as almost all other communications satellites. B) appear to be in motion to an observer on the ground. C) are not always in the line of sight. D) match the rotation of the earth.
|
|
Definition
D) match the rotation of the earth. |
|
|
Term
A detection system (IDS)
A) does not refuse access to certain sites.
B) isolates and quarantines suspected files. C) does not protect network data or host activity.
D) does not refuse to download or certain files. |
|
Definition
B) isolates and quarantines suspected files. |
|
|
Term
Social engineering
A) is a form of packet sniffing. B) is tricking people or systems into providing confidential or sensitive information. C) does not use e-mail on a regular basis. D) can be avoided if you are on guard.
|
|
Definition
B) is tricking people or systems into providing confidential or sensitive information. |
|
|
Term
Circuit level firewalls
A) are also called multilayer firewalls. B) delve into the transport headers, monitoring connection-oriented session (circuit) establishment attempts by TCP. C) are the principal corporate firewalls. D) is the same as an application firewall.
|
|
Definition
B) delve into the transport headers, monitoring connection-oriented session (circuit) establishment attempts |
|
|
Term
A packet sniffer
A) is a device used to eavesdrop on network traffic. B) is immune to all forms of encryption. C) does not include any software to discover the protocols being used. D) cannot interpret the overheard bit stream.
|
|
Definition
A) is a device used to eavesdrop on network traffic. |
|
|
Term
Worms
A) have to attach themselves to other programs to reproduce. B) are not designed to travel along with transmissions. C) cannot propagate on their own. D) are self-replicating.
|
|
Definition
|
|
Term
Encryption
A) requires very simple algorithms. B) does not use keys to convert plaintext to ciphertext. C) obfuscates the data so that it will not be intelligible to anyone but the intended recipient. D) when used in a document is called plaintext.
|
|
Definition
C) obfuscates the data so that it will not be intelligible to anyone but the intended recipient. |
|
|
Term
Spam
A) may be used to trick users to open a malware attachment. B) is never solicited. C) is not a form of social engineering when it is solicited. D) is bulk e-mail
|
|
Definition
|
|
Term
A virtual private network (VPN)
A) does not simulate a dedicated private network. B) do not discard packets with checksum failures. C) rarely make use of IPsec. D) is a way to transmit secure data over a network that may not be secure.
|
|
Definition
D) is a way to transmit secure data over a network that may not be secure. |
|
|
Term
Spoofing
A) may be used to trick users to open a malware attachment. B) is not as dangerous as spam. C) is unsolicited spam. D) refers to falsifying source addresses to lure you to reveal confidential information.
|
|
Definition
D) refers to falsifying source addresses to lure you to reveal confidential information. |
|
|
Term
Malware
A) does not affect executable program code. B) is software aimed at a network or computer-related disruption of one sort or another. C) is poorly written software. D) is not similar to a Trojan horse.
|
|
Definition
B) is software aimed at a network or computer-related disruption of one sort or another. |
|
|
Term
Denial-of-service (DoS) attacks
A) are also designed to destroy files and steal data. B) are used by hackers to shut down particular resources by overloading them. C) are triggered by an IDS-based flood. D) are never a problem for newer systems.
|
|
Definition
B) are used by hackers to shut down particular resources by overloading them. |
|
|
Term
Spyware
A) watches your activity on the computer without your knowledge or consent. B) cannot transfer captured information to other parties over the Internet. C) is not similar to adware. D) cannot capture keystrokes.
|
|
Definition
A) watches your activity on the computer without your knowledge or consent. |
|
|
Term
A backdoor
A) is a purposely created route to one or more corporate networks that bypasses IDSs. B) is rarely discovered by hackers. C) does not allow IT personnel to work with the network. D) should be open at all times.
|
|
Definition
A) is a purposely created route to one or more corporate networks that bypasses IDSs. |
|
|
Term
Host based intrusion detection systems
A) monitor download attempts.
B) inspect layer headers. C) check for valid security certificates.
D) does not guard against access to certain sites. |
|
Definition
A) monitor download attempts. |
|
|
Term
Packet filtering firewalls
A) routs all traffic from the Internet by IP (datalink layer) addresses. B) checks all packets coming from Layer 2 headers. C) will not allow unchecked packets to reach any higher than the network layer. D) run on corporate border routers.
|
|
Definition
D) run on corporate border routers. |
|
|
Term
Fiber-optic systems
A) are an inexpensive solution.
B) cannot bb split off to multimode fiber. C) do not utilize single-mode fiber.
D) can handle the full variety of current services. |
|
Definition
D) can handle the full variety of current services. |
|
|
Term
Higher Speed Study Group (HSSG)
A) expect to create a standard that will operate at distances greater than 19.2 kilometers. B) focuses on 100 gigabit Ethernet. C) operates on multi-mode fiber. D) focuses on 40 gigabit Ethernet.
|
|
Definition
B) focuses on 100 gigabit Ethernet. |
|
|
Term
Legacy copper networks
A) cannot handle HDTV. B) can transmit bundled services — voice, Internet access, music, and video. C) are capable of real-time full motion conferencing. D) were designed as double-service systems.
|
|
Definition
|
|
Term
Next generation Internet (NGI)
A) was officially launched in 1997 with the publication of an implementation plan. B) was designed as a ten year project to supplement the other projects taking place — vBNS, Internet2, and Abilene. C) did not aim at developing a replacement for the current Internet. D) began with a 1996 announcement by President Bush.
|
|
Definition
A) was officially launched in 1997 with the publication of an implementation plan. |
|
|
Term
Cable TV companies
A) have completely converted from analog to digital transmission. B) have not converted to high-speed, symmetric, and wide-bandwidth systems. C) are moving toward fiber-optic cables like the telephone companies. D) are beginning to face competition from telephone companies.
|
|
Definition
D) are beginning to face competition from telephone companies. |
|
|
Term
Optical switch development
A) is the key to creating optical networks. B) are not capable of supporting an all optical network. C) was the work of a group of engineers at Cal Poly. D) are not capable of very high data rates between interconnected devices.
|
|
Definition
A) is the key to creating optical networks. |
|
|
Term
Single-mode fiber
A) cannot be utilized as a link to high-demand business. B) cannot be considered for the last mile. C) is the medium of choice for long haul. D) is a less expensive solution.
|
|
Definition
C) is the medium of choice for long haul. |
|
|
Term
The European Telecommunications Standards Institute (ETSI)
A) deals with broadband systems. B) develops specifications to submit as proposals to standard bodies. C) has an agreed-on standard. D) promotes interoperability standards between in-house and external power line networks.
|
|
Definition
D) promotes interoperability standards between in-house and external power line networks. |
|
|
Term
Power over Ethernet (POE)
A) sends data over power lines. B) requires the location of devices near electrical outlets. C) does not curtail the amount of power available to any one device. D) provides up to 48 volts of electrical power over standard unshielded twisted pair (UTP) LAN cables to network-attached devices.
|
|
Definition
D) provides up to 48 volts of electrical power over standard unshielded twisted pair (UTP) LAN cables to network-attached devices. |
|
|
Term
Light—electric conversion
A) is the same as optical-switch development.
B) cannot be used with light-based computers. C) increases overall speed.
D) increases complexity and cost. |
|
Definition
D) increases complexity and cost. |
|
|
Term
All optical networking (AON)
A) are not practical as long-haul networks. B) consists of all optical transport, switching, and bandwidth management. C) require electrical/optical conversions. D) use DWDM.
|
|
Definition
B) consists of all optical transport, switching, and bandwidth management. |
|
|
Term
Power-line communications (PLC)
A) is a narrowband system. B) cannot be used for digitally encoded analog signals. C) is the process of delivering data over power lines. D) do not require an addressing mechanism.
|
|
Definition
C) is the process of delivering data over power lines. |
|
|
Term
Internet2
A) is not considered to be an eventual Internet replacement. B) is an alliance of over 200 U.S. universities that are involved with learning and research projects. C) does not provide appropriate infrastructure to support the work. D) is an expensive hybrid optical and packet network.
|
|
Definition
B) is an alliance of over 200 U.S. universities that are involved with learning and research projects. |
|
|
Term
Abilene
A) was intended to be a vBNS competitor. B) began with an OC-96 SONET backbone and an IPv6 as an overlay network. C) was to provide a test bed for Internet2 researchers similar to vBNS. D) was a high-performance backbone first implemented in 1999.
|
|
Definition
D) was a high-performance backbone first implemented in 1999. |
|
|
Term
An optical-electrical-optical (O-E-O) switch
A) make the most sense for optical networks, particularly at the network edges. B) is coded in such a way that the outer letter refers to the switch itself. C) are not capable of multiplexing. D) is coded in such a way that the middle letter.refers to input and output.
|
|
Definition
A) make the most sense for optical networks, particularly at the network edges. |
|
|