Term
Circuits are reasonably efficient for |
|
Definition
|
|
Term
If a packet passes thru seven switches between the source and destination host there will be _____ physical links |
|
Definition
|
|
Term
2 hosts are separated by 7 networks, there will be ____ packets along the way when a host transmits a packet to another host? |
|
Definition
|
|
Term
Different ISPs interconnect at |
|
Definition
|
|
Term
|
Definition
|
|
Term
What are well known port number(s) for SMTP? |
|
Definition
|
|
Term
a 7-bit field can represent ______ alternatives |
|
Definition
|
|
Term
After the internet layer process does encapsulation, it passes the IP packet to the ________ layer process. |
|
Definition
|
|
Term
The OSI ________ layer is designed to handle compression and encryption for applications. |
|
Definition
|
|
Term
If two hosts are separated by seven networks, how many frames will there be along the way when a host transmits a packet to another host? |
|
Definition
|
|
Term
TCP messages are called ________. |
|
Definition
|
|
Term
Hosts on the Internet have ________ address(es) |
|
Definition
|
|
Term
In internets, different networks are connected by ________. |
|
Definition
|
|
Term
If you did not need error correction or could not use error correction at the transport layer, you would choose ________. |
|
Definition
|
|
Term
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________. |
|
Definition
|
|
Term
Hackers send probe packets to identify ________. |
|
Definition
Both IP addresses with active hosts and hosts running certain applications |
|
|
Term
In distributed DoS attacks, the attacker sends messages directly to ________. |
|
Definition
|
|
Term
PERIMETER DEFENSE is NOT one of the four major security planning principles |
|
Definition
|
|
Term
The digital certificate provides the ________. a.private key of the supplicant b.private key of the true party c.public key of the supplicant d.public key of the true party |
|
Definition
d.public key of the true party |
|
|
Term
Which is less expensive to implement? a. SSL/TLS. b. IPsec. |
|
Definition
|
|
Term
________ the physical arrangement of a network's computers, switches, routers, and transmission lines. a.Network architecture is b.Network topology is c.Network layout is d.Physical layer standards are |
|
Definition
|
|
Term
Priority is assigning high priority to ________ applications while giving low priority to ________ applications. a.latency-tolerant, latency-intolerant b.latency-intolerant, latency-tolerant |
|
Definition
b.latency-intolerant, latency-tolerant |
|
|
Term
A packet will definitely get through if it has ________. a.QoS reserved capacity b.high priority c.Both A and B |
|
Definition
|
|
Term
he acronym OAM&P stands for ________. a.organization, authorization, management, and planning b.operations, administration, maintenance, and provisioning c.operations, administration, management, and provisioning d.organization, administration, maintenance, and planning |
|
Definition
A organization, authorization, management, and planning |
|
|
Term
A high signal-to-noise ratio reduces ________ errors. a.signal b.noise c.interference d.attenuation |
|
Definition
|
|
Term
In Ethernet, limiting UTP cord runs to 100 meters normally limits ________ to an acceptable level. a.attenuation b.noise errors c.Both A and B |
|
Definition
|
|
Term
Untwisting wire pairs no more than 1.25 cm (a half inch. at their ends reduces ________. a.interference b.crosstalk interference c.terminal crosstalk interference d.None of the above. |
|
Definition
C - terminal crosstalk interfernce |
|
|
Term
Cat 5e and Cat 6 wiring can carry Ethernet traffic 100 meters up to ________. a.1 Mbps b.10 Mbps c.100 Mbps d.1 Gbps e.10 Gbps |
|
Definition
|
|
Term
Which light wavelength propagates farthest in optical fiber? a.50 nm. b.850 nm. c.1550 nm. |
|
Definition
|
|
Term
Modal dispersion limits transmission distance in ________. a.multimode fiber b.single-mode fiber c.Both A and B d.Neither A nor B |
|
Definition
|
|
Term
The lowest-speed leased lines (under about 2 Mbps) use ________. a.one-pair voice-grade UTP b.two-pair voice-grade UTP c.one-pair data-grade UTP d.two-pair data-grade UTP |
|
Definition
D - two-pair data grade UTP |
|
|
Term
Which layer process does NOT do encapsulation when an application layer process transmits a message? a.Physical. b.Transport. c.Data link. d.Internet. |
|
Definition
|
|
Term
Which of the following is NOT an OSI layer? a.Data link. b.Internet. c.Session. d.Presentation. |
|
Definition
|
|
Term
What is (are) the well-known port number(s) for FTP? a.20 and 21. b.25. c.80. |
|
Definition
|
|
Term
What type of interference is the most frequently encountered? a.Electromagnetic interference. b.Crosstalk interference. c.Terminal crosstalk interference. d.Noise interference. |
|
Definition
C - terminal crosstalk interference |
|
|
Term
What 802 Working Group creates Ethernet standards? a.802.1. b.802.2. c.802.3. d.802.5. |
|
Definition
|
|
Term
The most widely used Ethernet standard for connecting switches to other switches is ________. a.100BASE-TX b.1000BASE-LX c.Both A and B d.Neither A nor B |
|
Definition
|
|
Term
LANs that span distances of several kilometers by using multimode fiber are made possible by ________. a.multimode optical fiber b.high modal dispersion c.high modal bandwidth d.regeneration |
|
Definition
|
|
Term
Ethernet addresses are called ________ addresses. a.MAC b.physical c.Both A and B d.Neither A nor B |
|
Definition
|
|
Term
H2-BC-66-0D-5E-BA is a valid MAC address. a.True. b.False. |
|
Definition
|
|
Term
An Ethernet switch knows ________. a.the IP address for each MAC address b.a single port number for each MAC address c.multiple port numbers for each MAC address d.the entire path from the source host to the destination host |
|
Definition
B - a single port number for each MAC address |
|
|
Term
Which of the following can be used to increase reliability considerably in an Ethernet LAN? a.Using a hierarchical topology. b.Using a mesh topology. c.Using a ring topology. d.Using the Rapid Spanning Tree Protocol. |
|
Definition
D - Rapid Spanning Tree Protocol |
|
|
Term
Which of the following is a layer within the data link layer? a. LLC layer. b.MAC layer. c.Both A and B |
|
Definition
|
|
Term
An Ethernet switch knows ________. a.the IP address for each MAC address b.a single port number for each MAC address c.multiple port numbers for each MAC address d.the entire path from the source host to the destination host |
|
Definition
B - a single port number for each MAC address |
|
|
Term
The signal strength at 20 meters is 90 mW; the signal strength at 60 meters would be ________ mW. |
|
Definition
|
|
Term
The most serious problem with wireless transmission in WLANs is ________. a.inverse square law attenuation b.absorptive attenuation c.shadow zones d.multipath interference |
|
Definition
|
|
Term
Wireless LAN standards are created by the ________ Working Group. a.802.1 b.802.3 c.802.11 |
|
Definition
|
|
Term
The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes ________. a.a frequency spectrum b.a broadband c.a channel d.a service band |
|
Definition
|
|
Term
802.11 standards are being developed to work in the ________ unlicensed band. a.2.4 GHz b.5 GHz c.Both A and B |
|
Definition
|
|
Term
The 2.4 GHz band supports ________ nonoverlapping channels. a.1 b.3 c.7 d.11 |
|
Definition
|
|
Term
What aspect of 802.11 standards affects interference between nearby access points? a.The number of possible nonoverlapping channels. b.The standard's minimum spacing parameter. c.RTS/CTS. d.All of the above. |
|
Definition
A.The number of possible nonoverlapping channels. |
|
|
Term
Spread spectrum transmission is used in WLANs for ________. a.higher transmission speed b.more reliable transmission c.greater security d.All of the above. |
|
Definition
B - more reliable transmission |
|
|
Term
A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission? a.1. b.2. c.3. d.4. e.There will be one frame for each switch along the way. |
|
Definition
|
|
Term
There is an access point that serves eight wireless hosts. On how many channels will these devices transmit during the course of an hour or two? a.1. b.2 (one in each direction). c.7. d.8. e.9. |
|
Definition
|
|
Term
802.11n is designed to operate in the ________ unlicensed band. a.2.4 GHz b.5 GHz c.Both A and B |
|
Definition
|
|
Term
What is the strongest security protocol for 802.11 today? a.802.11i. b.802.11s. c.802.11X. d.WPA. e.WEP. |
|
Definition
|
|
Term
In what mode of 802.11i operation is a central authentication server used? a.802.1X mode. b.PSK mode. c.Both A and B d.Neither A nor B |
|
Definition
|
|
Term
What damage can an evil twin access point do? a.Eavesdrop on communication. b.Steal important keys or other information transmitted by the client. c.Launch attacks against corporate servers. d.All of the above |
|
Definition
|
|
Term
An MTSO ________. a.controls cellsites in a cellular system b.links mobile users to wired telephone customers c.Both A and B |
|
Definition
|
|
Term
Which 4G technology do most carriers intend to use? a.LTE. b.WiMAX. c.Both A and B d.Neither A nor B |
|
Definition
|
|
Term
Which transmission medium is dominant for the wired access line between a host and the switch that serves the host? a.4-pair UTP. b.Optical fiber. c.Both are used about equally. d.Neither A nor B |
|
Definition
|
|
Term
In 802.11i ________, hosts must know a shared key. a.802.1X mode b.PSK mode c.Both A and B d.Neither A nor B |
|
Definition
|
|
Term
Which of the following can be used to centrally manage remote access points? a.Smart access points. b.WLAN switches. c.Both A and B d.Neither A nor B |
|
Definition
|
|