BUS 441 Exam 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

give an example of a valid EUI-48 address

B2-CC-67-1D-5E-65

which of the following typically uses UDP? a. DNS b. ethernet c. wireless d. HTTP e. TCP

a. DNS

what is the well-known port number for HTTP traffic?

80

the business benefit of multiplexing is ______ a. higher speed b. lower cost c. avoiding the need to send many transmission links through narrow conduits d. security

b. lower cost

compared to priority, overprovisioning capacity can reduce _____ a. equipment loss b. mgmt labor c. neither A or B d. both A and B

b. management labor

ethernet has a Frame Check Sequence Field to check for errors. ethernet is ________ a. reliable b. unreliable c. both reliable and unreliable d. connection-oriented and reliable

b. unreliable

if you see a colleague's username and password on a Post-It note that anyone can see on a monitor, according to the definition, is it hacking if you use this information to log in? a. no b. yes c. we cannot say from the information

b. yes

in a coffee shop hot spot, the rated speed is 10 Mbps. throughput is about half the rated speed. there are 10 people using the hot spot. if you and three others are transmitting or receiving at the same time, what speed should you expect to get? a. 1 Mbps b. 3 Mbps c. 1.25 Mbps d. 10 Mbps

c. 1.25 Mbps

the transport layer on the destination host ______ a. reassembles the app message if it has been fragmented b. removes the transport header c. A and B d. none of these are correct

c. A and B

the mirai bots in the KrebsOnSecurity.com attack were _______ a. client hosts b. cisco routers c. server hosts d. IoT devices

d. IoT devices

Jitter is a problem for ________. a. voice over IP (VoIP) b. streaming media c. VoIP and streaming media d. e-mail

c. VoIP and streaming media

which layer(s) govern(s) transmission through a single network? a. data link b. physical c. data link AND physical d. neither data link or physical

c. data link AND physical

which is NOT in an IP packet? a. internet layer header b. transport layer header c. data link layer header

c. data link layer header

if a host cannot reach a DNS server, it ______ a. will need to use a DHCP server b. cannot have a host name c. is unlikely to be able to communicate with most server hosts d. will have to rely on host names

c. is unlikely to be able to communicate with most server hosts

if there are 10 routers between the source and destination hosts, how many internet layer processes will be involved on all devices? a. 10 b. 1 c. 2 d. 12

d. 12

how long is an IPv4 address?(bits)

32

my computer's physical address (MAC address) uses _____ bits

48

at what layer is the EUI-48 address added to an outgoing message? a. data link b. physical c. internet d. the EUI-48 is not added to a message, only the IP

a. data link

when using TCP, if a destination host does not receive a segment, it will ______ a. do nothing b. transmit an RSND segment c. transmit a NAC segment d. transmit an ACK segment

a. do nothing

in HTTP, which program may initiate communication? a. browser b. webserver program c. both A and B d. neither A or B

a. browser

the source socket is 60.171.18.22:2707. the source is a(n) ____________ a. client b. server c. well-known server d. ephemeral server

a. client

when a packet travels through a network, the time it takes to get from the sender to the receiver is called ______ a. latency b. jitter c. throughput d. output

a. latency

in general, what should an employer do whenever an employee leaves the firm? a. their accounts should be disabled instantly b. they should be given no prior notice that they are being released c. A and B d. their accounts should be disabled after a 30 day grace period

a. their accounts should be disabled instantly AND b. they should be given no prior notice that they are being released

what process adds a header in front of an application message or fragment a. transport b. internet c. application d. data link

a. transport

you accidentally discover that you can get into other e-mail accounts after you have logged in under your account and only spend a few minutes looking at another user's mail. according to the definition, is that hacking? a. yes b. we cannot say from the information given c. no

a. yes

Vulnerability-based attacks that occur before a patch is available are called ________ attacks a. zero-day b. stealth c. indefensible d. malware

a. zero-day

to handle momentary traffic peaks, which would you give higher priority to? a. e-mail b. VoIP c. both e-mail and VoIP d. the apps used most by the execs

b. VoIP (voice over IP)

flooding a host with traffic so that it cannot serve it legitimate users is a ________ attack a. malware b. virus c. DoS d. hacking

c. DoS

how does your computer get its EUI-48 address (MAC address) a. ARP b. DNS c. It is assigned by the manufacturer d. DHCP e. NAT

c. It is assigned by the manufacturer

source and destination port numbers are found in the header fields of __________ a. ethernet frames b. http GET requests c. IP packets d. TCP segments

d. TCP segments

T/F: HTTP is a reliable protocol

false

what process adds a header in front of a TCP segment? a. application b. transport c. data link d. internet

d. internet

which standards layer governs wires and cables? a. all layers govern this b. transport c. internet d. physical

d. physical

DDoS attacks attempt to ______ a. delete files on a computer b. steal info from a computer c. hack a computer d. reduce the availability of a computer

d. reduce the availability of a computer

a frame ends with a special bit called a Frame Check Sequence. what does it do? a. verifies the MAC address is correct b. cycles data across the network c. verifies the IP address is correct d. verifies the data arrived correctly

d. verifies the data arrived correctly

an attacker targets a victim host and learns the IP address of the victim. the attacker then creates an ICMP packet, but spoofs the source IP address to be the victim's. the packet is broadcast to every device on the network causing all devices to respond with a reply to the spoofed IP address. the victim/s computer is then flooded with too much traffic that becomes too slow or unresponsive. what is the name of this attack? a. master ping b. spoofing c. SYN flood d. broadcast e. smurf f. UDP flood

e. smurf

describe the DDoS attack known as a SYN flood

the attacker sends a series of SYN requests to the victim. the victim's system will set aside some memory for the connection, but the attacker will never respond. eventually the victim has no system memory left to answer legitimate requests.

based on HW1, what would you type into your command prompt application to learn about the route from your computer to www.whitehouse.gov?

tracert www.whitehouse.gov

T/F: the internet layer process checks for errors

true -IPv4 uses a header checksum that checks for errors in header -IPv6 does not do this *as written, this question can go either way*


Conjuntos de estudio relacionados

Corporate Governance and Social Responsibility

View Set

PUNCTUATION/MECHANICS: Quotation Marks in Direct Quotes

View Set

AP Euro Chapter 17 Multiple Choice

View Set

Microeconomics- Quiz 5 (Chapters 7 & 8)

View Set

Federal Securities Act Missed Questions

View Set

Finance CH. 12 Some Lessons from Capital Market History

View Set