Chapter 11: Network Security, Chapter 11 homework, Chapter 11, MIS 4123 Chapter 11, ITN 100 CH 11, 2112

¡Supera tus tareas y exámenes ahora con Quizwiz!

Question: What's the percentage of time that Bipolar RZ encoding is transmitting data information?

50% 6-34

What is the transmission efficiency if you send 342 bytes data over Ethernet II (with 38 bytes of overhead)?

90%

If the highest frequency of a circuit is 10KHZ and the lowest frequency is 900 Hz, the bandwidth available for this circuit is:

9100 Hz

The probability of detecting an error, provided that one has occurred, using cyclic redundancy checking is about:

>99%

The application layer in the OSI model is the same as the application layer in the Internet model.

?

The network layer is responsible for routing messages from the source computer to the destination computer.

?

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. True False

True

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. True False

True

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall True False

True

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall.

True

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall. True False

True

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall. True False

True

A patch is a software solution to correct a security hole.

True

A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000. True False

True

A security hole is a bug that permits intrusion to a computer. True False

True

A software solution to correct a security hole is often referred to as a patch or update.

True

A switch can send and receive on all circuits simultaneously.

True

An 802.11g NIC can communicate with an 802.11n access point.

True

An access point (AP) is required to connect a WLAN to a wired network.

True

An access point ensures that all computers within range of the access point can communicate with each other,

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. True False

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. True False

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. True False

True

An example of an application layer address is www.indiana.edu True False

True

Directional antennas produce a stronger signal over longer distances than omnidirectional antennas.

True

Directional antennas signals are much stronger than omnidirectional antennas.

True

Disk mirroring writes duplicate copies of all data on at least two different disks.

True

Distributed Coordination Function is a media access control method used in wireless LANs where the sender waits for an ACK (acknowledgement) from the receiver before transmitting any more packets.

True

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.

True

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages. True False

True

Intrusion primarily refers to the loss of confidentiality of organizational data.

True

It takes 802.11a more access points to provide the same coverage as one 802.11b access point.

True

LDAP is an industry standard directory protocol.

True

Macro viruses can spread when an infected file is opened.

True

Macro viruses can spread when an infected file is opened. True False

True

Maintaining data integrity is one of the primary goals of security. True False

True

Many network hubs incorporate repeaters or amplifiers to regenerate signals so that attenuation of the signal does not occur.

True

Network profile refers to what resources on each server are available on the network for use by other computers and which devices or people are allowed access on the network.

True

The TCP portion of TCP/IP performs linking to the application layer. True False

True

The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network. True False

True

The data link layer protocols used by wireless LANs are similar to the ones used on Ethernet LANs

True

The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.

True

The frequency ranges of some access points are the same as some cordless telephones.

True

True or False: Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.

True

True or False: Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits.

True

True or False: The Internet was started by the U.S. Department of Defense in 1969 as a network of four computers called ARPANET

True

True or False: The four general functions of any application program are: data storage, data access logic, application logic and presentation logic.

True

True or False: The fundamental problem in client-based networks is that all data on the server must travel to the client for processing.

True

True or False: The medium is the physical matter or substance that carries the voice or data transmission.

True

True or False: The specification stage of the de juro standardization process consists of developing nomenclature and identifying the problems to be addressed.

True

1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable.

False

802.11b is a faster wireless standard than 802.11a.

False

Crackers are casual hackers with a limited knowledge of computer security. True False

False

Cut through switching has fewer errors than store and forward switching.

False

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.

False

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN. True False

False

Researchers estimate that only one or two new viruses are developed every week.

False

Researchers estimate that only one or two new viruses are developed every week. True False

False

Serial mode transmission is much faster than parallel mode transmission.

False

Social engineering refers to creating a team that solves virus problems True False

False

Social engineering refers to creating a team that solves virus problems.

False

Social engineering refers to creating a team that solves virus problems. True False

False

Store and forward switching cannot be used unless incoming and outgoing data circuit has the same data rate.

False

TCP/IP operates only as connection-oriented. True False

False

A(n) _________ is a LAN that uses the same technologies as the Internet but is provided to invited users outside the organization who access it over the Internet.

Extranet

The DCF function of Wi-Fi resolves the hidden node problem.

False

All three parts (request line, request header, request body) of an HTTP request from a web browser to a web server are required when a request is made.

F

Fiber optic cable carries signals in traditional electrical form.

F

Full-Duplex is always better than Simplex transmission.

F

IP is responsible for error-free delivery of packets on a TCP/IP network.

F

The Ethernet standard was developed first by the IEEE.

False

In SSL, the public key that the server sends to the client in the negotiation phase (Step 2) is used to encrypt the application data.

F

In data transmission, data errors are uniformly distributed in time.

F

In simplex transmission, the data flows in both directions at the same time.

F

The Simple Mail Transfer Protocol is the least commonly used e-mail standard.

F

The network layer address for IP is ten bytes long when using IPv4.

F

The network layer is responsible for end-to-end delivery of the message.

F

The standard protocol for communication between a Web browser and a Web server is the web protocol.

F

Transmission efficiency refers to the percentage of bits transmitted without errors.

F

Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer.

F

When using dynamic routing, routing decisions are always made by a central host or server.

F

Wireless media are more secure than guided media.

F

The following timeline is a correct reflection of the continuous ARQ on the left.

F 8-17

The NOS software for the server computer provides the physical, data link, and network layer functions.

False

The Network Interface Card (NIC) permits a computer to be physically connected to a network's cable, which provides the network layer connection among the computers in the network.

False

The latest version of IP is IPv7, which increases the address space from 128 bits to 256 bits. True False

False

The maximum data rate of 802.11b LANs is 12 Mbps.

False

The maximum transmission speed of 802.11a LANs is 11 Mbps.

False

The network layer address for IP is ten bytes long when using IPv4 True False

False

The network layer address for IP is ten bytes long when using IPv4. True False

False

The network layer provides guaranteed end-to-end delivery of the message. True False

False

The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to. True False

False

The three latest versions of Ethernet run at speeds of 1Gbps, 10Gbps, and 50 Gbps

False

The transport layer routes messages through the network selecting the best path from the source to the destination station. True False

False

There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing. True False

False

Triple DES uses a total of 512 bits as the key.

False

True and False: The application architecture called the distributed computing model uses the "thick" client approach.

False

True or False: A "thin client" approach places most of the application logic on the client.

False

True or False: A key advantage of digital transmission is it permits only low transmission rates.

False

True or False: A local area network (LAN) connects other LANs and BNs located in different areas to each other and to wide area networks in a span from 3 to 30 miles.

False

True or False: A server can only perform one function on a network.

False

True or False: An application architecture is the way in which the functions of the application layer are performed solely by the clients in the network.

False

True or False: As the demand for more and more network applications grow; host-based computing becomes the best solution.

False

True or False: Coaxial cable costs less and offers less shielding to electrical interference than twisted pair cable

False

True or False: De facto standards never evolve into de juro standards.

False

True or False: De juro standards are always developed before de facto standards.

False

True or False: Development of online batch systems is an important future trend in communication and networking.

False

True or False: Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.

False

True or False: Digital transmission produces more errors than analog transmission.

False

True or False: Error collision is a major function of Error Control.

False

True or False: Error detection techniques include bit checks.

False

True or False: Fiber optic cable carries signals in traditional electrical form.

False

True or False: Frequency division multiplexing divides the circuit into a set of different time slots.

False

True or False: HTTP is a data link layer standard.

False

True or False: Host-based and client-based networks are similar in that the client computer performs most of the work.

False

True or False: In a multipoint circuit configuration, each computer can use the circuit at the same time.

False

True or False: In simplex transmission, the data flows in both directions at the same time.

False

True or False: One major drawback to a client-server network lies in the fact that client-server networks enable software and hardware from different vendors to be used together.

False

True or False: One property of a WAN is that it connects a group of computers in a small geographic area such as room, floor, building or campus.

False

True or False: Point-to-point circuits reduce the amount of cable required and use the circuit more efficiently than multipoint circuits.

False

True or False: Polling is the process of permitting all clients to transmit or receive at any time.

False

True or False: Providing error-free transmission of data is a function of the physical layer.

False

True or False: Sparky is a component of a network.

False

True or False: Specifying the type of connection, and the electrical signals, radio waves, or light pulses that pass through it is a function of the data link layer.

False

True or False: T1 is an application layer standard.

False

True or False: The data link layer accepts messages from the network layer and controls the hardware that transmits them.

False

True or False: The earliest data communications networks were client-server networks.

False

True or False: The standard protocol for communication between a Web browser and a Web server is the web protocol.

False

True or False: To use the Web, each client computer requires a data link layer software package called a Web browser.

False

True or False: When polling in a controlled access environment, communication collisions can occur

False

True or False: With contention, a computer does not have to wait before it can transmit. A computer can successfully transmit at anytime.

False

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.

NAT firewall

Routing is the process of determining the path through the network that a particular message will follow from the sender to the recipient.

T

Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs.

T

Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet.

T

The data link layer accepts messages from the network layer and controls the hardware that transmits them.

T

The simplest method for error correction is retransmission

T

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. True False

True

With QoS routing different __________ are defined, each with different priorities.

class of service

A ________ is a group of computers linked together so that they act as one computer.

cluster

Inverse multiplexing means:

combining several low speed circuits to enable them to be transmitted across one high speed circuit

Calculating the actual throughput of a data communication network is:

complex because many factors affect throughput

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as:

computer forensics

With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors.

distance vector

With ________ routing, computers or routers count the number of hops along a route and periodically exchange information on the hop count with their neighbors. a. circuitous b. decentralized c. distance vector d. indirect e. link state

distance vector

Modern (1990s and beyond) data communication networks are characterized by:

distributed systems that rely heavily on networking

In 1984, a federal judge broke up a highly contested telephone service monopoly and:

divided AT&T into two parts: one part for long distance service, and a second part, comprised of seven regional operating companies, for local telephone service

Server name resolution is done using the:

domain name service

Which of the following is not a general function by any application program? a) data storage b) data access logic c) application logic d) presentation logic e) application access storage

e) application access storage

What technique is used by most videoconferencing applications to reduce the amount of data being transmitted? a) hashing b) encryption c) authentication d) identification e) compression

e) compression

IMAP (Internet Message Access Protocol): a) is a set of standards that define how email is to be processed between mail servers b) is exactly the same as SMTP c) copies an e-mail message from the client computer's hard disk, deletes it from the client, and stores it on the mail server d) is exactly the same as POP e) permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

e) permits an e-mail message to remain stored on the mail server even after they have been read by a client computer

Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.

false

Connections on a router, to the Internet and other routers for example, are called applications.

false

Host-based and client-based networks are similar in that the client computer performs most of the work. true false

false

IP is responsible for error-free delivery of packets on a TCP/IP network.

false

IPv4 addresses offer unlimited opportunity for expansion and growth on the Internet.

false

TCP/IP operates only as connection-oriented.

false

The Simple Mail Transfer Protocol is the least commonly used e-mail standard. true false

false

The application architecture called the distributed computing model uses the "thick" client approach. true false

false

The earliest data communications networks were client-server networks. true false

false

The network layer address for IP is ten bytes long when using IPv4.

false

The network layer is responsible for end-to-end delivery of the message.

false

The source port identifier in the TCP header tells the TCP software on the destination computer, which application on the destination it should pass the packet to.

false

The standard port number for Telnet is 53.

false

The transport layer routes messages thought the network selecting the best path from the source to the destination station.

false

There are four fundamental approaches to routing: centralized, static routing, dynamic routing, and monitor routing.

false

Using the POP standard for client to server e-mail communication, the e-mail messages remain on the server computer. true false

false

When using dynamic routing, routing decisions are always made by a central host or server.

false

Which of the following type of media is least susceptible to eavesdropping?

fiber optics

Which of the following type of media is least susceptible to eavesdropping? fiber optics twisted pair microwave infrared coaxial cable

fiber optics

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.

firewall

The ability to transmit in both directions, but only in one direction at a time is an example of _______________ transmission.

half-duplex

A client computer is assigned a data link layer address is by:

hardware manufacturers

A special type of message that is used when sending the same message to a specific group of computers is called a:

multicast message

IP addresses from 224 to 239 belong to Class D and are reserved for

multicasting

A(n) ___________ divides one high-speed communication circuit into several lower speed circuits for the primary reason of saving communication line costs.

multiplexer

One disadvantage of the ____________ architecture is that places a greater load on the network

n-tier

The _________ layer is responsible for routing of messages from the sender to the final destination.

network layer

Cross-talk:

occurs when one circuit picks up signals in another

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they

often have weaker security.

Frequency division multiplexing:

operates by dividing the signal into different frequencies

A ______________ is a browser add-in or app that stores website passwords.

password manager

In a ___________ architecture, computers are both client and server, thus sharing the work.

peer-to-peer

Networks that are designed to connect similar computers that share data and software with each other are called:

peer-to-peer networks

Which of the following is not a method for deterring intrusion?

performing social engineering

TCP/IP:

performs packetizing, as well as routing and addressing functions

TCP/IP: is the least commonly used network protocol for LANs because it cannot be combined with Ethernet a. performs packetizing, as well as routing and addressing functions b. is not very efficient and is prone to errors c. is compatible with only one type of data link protocol, SDLC d. refers to Telephone Control Procedures/Inter-exchange Procedures

performs packetizing, as well as routing and addressing functions

IP:

performs routing functions

Data is physically transmitted from one computer or terminal to another in the ________ layer.

physcial

A "thick client" architecture approach:

places all or almost all of the application logic on the client

A "thin client" architecture approach:

places all or almost all of the application logic on the server

________ is the process of sending a signal to a client that gives its permission to transmit or asks it to receive.

polling

Assume that more than one application program is using the same communications line on a particular computer. To be able to decide to which application program a message should be delivered on this computer, TCP/IP relies on the:

port address

In the three tier architecture the software on the client computer is responsible for____________.

presentation logic

________ is the presentation of information to the user and the acceptance of the user's commands.

presentation logic

We can calculate the relative ___________, by multiplying the impact score by the likelihood. rootkit authentication risk score risk assessment risk event

risk score

________ is not an important function of the transport layer.

routing

Domain Name Servers provide the equivalent of directory assistance for application layer addresses.

true

Enhanced Interior Gateway Routing Protocol is a dynamic link state interior routing protocol developed by Cisco.

true

In a client-server network, the presentation logic is the responsibility of the client computer. true false

true

Part of the function of address resolution is translating the application layer address of the destination into a network layer address.

true

Quality of Service routing is a special type of connection-oriented routing in which different connections are assigned different priorities.

true

Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient.

true

Scalability refers to the ability to increase or decrease the capacity of the computing infrastructure in response to changing capacity needs. true false

true

In general, controlled approaches:

work better than contention approaches for large networks that have high usage

A (n) ______ is a special type of virus that spreads itself without human intervention.

worm

A (n) ______ is a special type of virus that spreads itself without human intervention. - snake - worm - Trojan horse - boot sector virus - stealth virus

worm

A (n) ______ is a special type of virus that spreads itself without human intervention. Answers: snake worm Trojan horse boot sector virus stealth virus

worm

An application layer address using TCP/IPv4 looks like:

www.cba.uga.edu

An application layer address using TCP/IPv4 looks like: a. 128.192.78.5 b. www.cba.uga.edu c. [email protected] d. 00-0F-00-81-14-00 e. Building 4, Room 2, User 3

www.cba.uga.edu

Which of the following is not true a dumb terminal:

you can install your latest application software on it

What are the 3 primary goals of security?

Confidentiality Integrity Availability

Microsoft's Windows operating system meets A1 level security.

False

Microsoft's Windows operating system meets the US government's A1 level security.

False

Most access points (AP) deployed in wireless LANs use directional antennas.

False

Network cables are the easiest target for eavesdropping.

False

Network cables are the easiest target for eavesdropping. True False

False

IGMP refers to:

Internet Group Management Protocol

Only the same website who saves information to a cookie can access it.

T

Spyware, adware and DDOS agents are three types of:

Trojans

The TCP portion of TCP/IP performs linking to the application layer.

True

If an organization is assigned the IP address 128.192.1.0/27, how many bits can the organization allocate for hosts?

5

: a router with the following routing table receives a packet with destination 108.9.51.43. Which interface should the router forward the packet to?

0

The typical range of human hearing is:

0 to 4,000 Hz

With a checksum of 29, which of the following binary numbers is the correct checksum byte?

00011101

A coding scheme that uses 10 bits to represent each character is capable of representing _________ different characters.

1024

Which of the following is the decimal value of the hexadecimal number 74?

116

what is the broadcasting address of the subnet for IP address 128.196.40.16 and subnet mask 255.255.255.128?

128.196.40.127

what is the broadcasting address of the subnet for IP address 128.196.40.196 with subnet mask 255.255.255.128?

128.196.40.255

A typical TCP packet has a _______ header of control information.

192 bit

Which of the following is an invalid IP address?

192.168.0.512

In the following network, if my IP is 192.168.8.2, what is the path that I can reach 192.168.128.16?

192.168.8.2 => R2 => R1 => 192.168.128.16 12-16

R1 below receives a packet with destination address 192.168.16.120. Which row from the routing table will be invoked?

2 12-17

Which of the following is most likely to be a MAC address?

23.4F.17.8A.4C.10

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet.

255.255.0.0

A subnet mask of ___________ means that all computers with only the same first two bytes in their IPv4 addresses are on the same subnet. a. 11111111.0.0.0 b. 255.255.255.0 c. 255.0.0.0 d. 255.255.0.0 e. 255.255.255.255

255.255.0.0

A sender transmits a TCP packet with 200 bytes of data with sequence number 2400. The other side receives the packet and piggybacks an ACK in a data packet with sequence number 2800. Assume no other data packets have been sent. What is the ACK number in the packet?

2600

IPv4 uses ________ bytes per Internet address.

4

IPv4 provides ___________ IP addresses. a. 4.3 billion b. 144 million c. 64 billion d. 3.14 billion e. 1 million

4.3 billion

In DHCP, how does your computer choose an IP address?

Broadcast the request on the network

The ______ defines what type of packets should be routed and what types of packets should be discarded.

ACL

The ______ defines what type of packets should be routed and what types of packets should be discarded. a. ACL b. AFL c. TCP d. IOS e. OSI

ACL

_________ created a service that allows organizations to transfer IPv4 addresses they don't need to another organization.

ARIN

Transmission Control Protocol/Internet Protocol was developed for ________ in 1974.

ARPANET

If you have to send multimedia data over SMTP it has to be encoded into

ASCII

_____ is one of the most commonly used coding schemes used in data transmission.

ASCII

With respect to converting digital data into analog signals, AM stands for:

Amplitude Modulation

A fundamental technique to determine if an intrusion is in progress in a stable network is:

Anomaly detection

In which layer of the Internet Model would the HTTP standard be used?

Application

A(n) _________ develops a specific system and companies purchase the service without ever installing the system on their own computers.

Application Service Provider (ASP)

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks.

Application level firewall

A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats.

Application level firewall

Threat of intrusion comes from ____________.

Both inside and outside of the organization

A sender transmits a TCP packet with 200 bytes of data with sequence number 2400. The other side receives the packet and piggybacks an ACK in a data packet with sequence number 2800. Assume no other data packets have been sent. What is the ACK number in the packet? A. 2400 B. 2401 C. 2600 D. 2601 E. 2800

C. 2600 Acknowledgement number = sum of Sequence number and Length

The source port identifier tells the destination station ___________________. A. which computer send the TCP packet B. which application layer program that the packet should be send C. which application layer process the packet is from D. the IP address of the source computer E. the IP address of the destination computer

C. which application layer process the packet is from

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. Answers: disaster recovery firm DES company directory company certificate authority fingerprint advisory board

Certificate Authority

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication.

Certificate authority

A majority of routers use the following operating system:

Cisco Internetwork Operating System

A majority of routers use the following operating system: a. Windows 95 b. Red Hat Linux c. Windows Server 2008 d. Cisco Internetwork Operating System e. Linksys OSI System

Cisco Internetwork Operating System

A majority of routers use the following operating system: a. Windows 95 b. Red Hat Linux c. Windows Server 2008 d. Cisco Internetwork Operating System e. Linksys OSI System

Cisco Internetwork Operating System

A _____________ is the input-output hardware device at the user's end of a communication circuit.

Client

Hardware and software used to transform analog voice signals to digital signals and digital signals to analog signals.

Codec

A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers.

DMZ

A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. - intranet - DMZ - zone of authority - VLAN - smart hub

DMZ

A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. Answers: intranet DMZ zone of authority VLAN smart hub

DMZ

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? Delphi team member script kiddies crackers professional hackers organization employees

Delphi team member

Which of the following would be a standard used at the Data Link layer of the Internet or OSI model?

Ethernet

__________ provide authentication which can legally prove who sent a message over a network.

Digital signatures

__________ provide authentication which can legally prove who sent a message over a network. Digital signatures DES keys Directory keys Screen names User Ids

Digital signatures

Server name resolution is done using the: a. Address Resolution Protocol b. Border Gateway Protocol c. Internet Control Message Protocol d. Routing Information Protocol e. Domain Name Service

Domain Name Service

A way to prevent intrusion by disguising information through algorithms is:

Encryption

To snare intruders, many organizations now use _________ techniques.

Entrapment

A Network Operating System (NOS), such as Linux or Windows Server 2008, must be used in addition to the 'normal' operating system, such as Windows, on a server in a dedicated server LAN.

False

A multicast message can be used to send a message to a maximum of two other computers. True False

False

A site survey is not an important component of a WLAN design.

False

A switch always broadcasts all the packets it receives to all the computers that are connected to the switch.

False

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

False

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user. True False

False

An uninterruptible power supply utilizes a second redundant disk for every disk on the server.

False

As discussed in this textbook, three layers of a network model are the components required for a typical network, including local area networks.

False

Asymmetric encryption uses the same key to encrypt and decrypt a message.

False

Asymmetric encryption uses the same key to encrypt and decrypt a message. True False

False

Asymmetric encryption uses the same key to encrypt and decrypt an message.. True False

False

Compared to 802.11b, 802.11g provides fewer channels for stations to communicate with the access point.

False

Confidentiality is not a threat to business continuity. True False

False

Connections on a router, to the Internet and other routers for example, are called applications. True False

False

Corrective controls reveal or discover unwanted events.

False

Corrective controls reveal or discover unwanted events. True False

False

Corrective controls reveal or discover unwanted events. True False

False

Crackers are casual hackers with a limited knowledge of computer security.

False

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data.

False

Decryption is the process of converting plaintext into ciphertext.

False

Decryption is the process of converting plaintext into ciphertext. True False

False

Ethernet is a layer 3 protocol, which operates at the network layer.

False

Fault-intolerant servers contain many redundant components to prevent failure.

False

Fault-intolerant servers contain many redundant components to prevent failure. True False

False

In transport mode, IPSec encrypts the entire IP packet.

False

In transport mode, IPSec encrypts the entire IP packet. True False

False

Integrity is not a primary goal of security. True False

False

LANs that run on radio frequencies use a type of wired media.

False

Maintaining data integrity is not a primary goal of security.

False

Maintaining data integrity is not a primary goal of security. True False

False

True or False: With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer.

False

True or false: The sequence number and acknowledgement number from host A are both referring to data stream of host A.

False

When using dynamic routing, routing decisions are always made by a central host or server. True False

False

Wi-Fi Protected Access (WPA) uses the same key for every packet that is transmitted to the client.

False

Wireless LANs are never connected to a wire network.

False

Wireless LANs do not share the bandwidth capacity of the wireless network.

False

Wireless LANs use Carrier Sense Multiple Access with Collision Detection (CSMA/CD) for medic access control.

False

With application level firewalls, any access that has not been disabled is permitted. True False

False

With application level firewalls, any access that has not been explicitly denied is automatically permitted.

False

UDP is not commonly used for:

HTTP requests

Marc Andreessen led a team that developed the first graphical Web browser, which was called:

Mosaic

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called _____________________.

Hypertext Transfer Protocol

The network layer of the Internet model uses the _____________ protocol to route messages though the network.

IP

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

Increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

The ping command uses the most basic interior routing protocol on the Internet, which is the: a. Border Gateway Protocol b. Internet Control Message Protocol c. Routing Information Protocol d. Enhanced Interior Gateway Routing Protocol e. Open Shortest Path First

Internet Control Message Protocol

The ping command uses the most basic interior routing protocol on the Internet, which is the:

Internet Control Message protocol

IGMP refers to: a. Internet Giga Memory Parameters b. Interchange Group Management Parameters c. Internet Guided Meta Protocol d. Internet Group Management Protocol e. Interchange Guided Meta Protocol

Internet Group Management Protocol

Which of the following is true about roll call polling?

It can not be modified to increase priority of clients or terminals. It does not require a server or special device that performs the polling. It is also called token passing. It is a type of contention approach to media access control. 都不对

Which of the following is true with respect to the data link layer?

It is responsible for getting a message from one computer to another (one node to another) without errors.

Which of the following is not a virtue of the layered models?

It reduces overheads and increases efficiency

Which of the following statements about HTTPS is NOT correct:

It sends data in human readable text

which of the following is true about DNS resource record <mailgator.email.arizona.edu, 128.196.130.185, A>?

It shows the IP address of mailgator.email.arizona.edu

_______ is the most commonly used central authentication protocol.

Kerberos

_______________ is a type of dynamic routing. a. Static routing b. Circuitous routing c. Centralized routing d. Link state e. X.25 routing

Link state

The Big Responsibilities of the Data Link Layer include all but

Linking Hypertext data from one page to the next

A(n) ____________, is an information system that is critical to the survival of an organization.

Mission critical application

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. ANI system NAT firewall IP spoofing bridge packet level firewall smart hub

NAT firewall

A ______ uses an address table to translate the private IP addresses used inside the organization into proxy IP addresses used on the Internet.

NAT proxy server

__________ refers to the process of translating between one set of private IP addresses inside a network and a set of public addresses outside the network.

Network Address Translation

Which of the following is true?

POP3 can never keep a copy of email on the server. IMAP can not access the same email from different devices. POP3 keeps different clients synchronized. 都不对

SSL can be used to secure

POP3 traffic HTTP traffic SMTP traffic 都选

A(n) ____________ examines the source and destination address of every network packet that passes through it.

Packet level firewall

Which of the following is a characteristic of sound waves that can be modulated to convert digital data into analog signals?

Phase

From lowest level to the highest level, the correct order of layers for the Internet Model is:

Physical, Data Link, Network, Transport, Application

Data Communications combines

Physics, Electrical Engineering, and Mathematics to send information over a distance

The ____________ layer of the OSI model is responsible for data format translation.

Presentation

A(n) _____________ is a set of rules that determine what a layer would do and provides a clearly defined set of messages that software at the layer needs to understand.

Protocol

Which of the following is not an error detection method used in the data link layer?

Pulse code checking

The key principle in preventing disruption, destruction and disaster is ___________.

Redundancy

To learn a list of clients participating in a BitTorrent swarm, a BitTorrent client often

Requests them from a tracker

The motivation for computer networks was to enable _________________________.

Resource sharing

With which type of digital signaling does the signal always return to zero volts after each bit?

Return-to-zero signaling

__________ is not an important function of the transport layer.

Routing

HTTPS can encrypt your credit card information so that it is protected.

T

Which of the following are functions of the Internet protocol?

Selecting the best path to send the data

If a server has no clue about where to find the address for a hostname then

Server asks the root server

___________ is the translation of application layer addresses into IP addresses. a. Network interface card reversal b. IPv6 c. Server name resolution d. Subnet masking e. Name service codin

Server name resolution

IP Security Protocol:

Sits between IP at the network layer and TCP/UDP at the transport layer

Which of the following is not considered one of the five most common business impacts?

Social

Which of the following is not considered one of the five most common business impacts? - Financial - Productivity - Reputation - Social - Safety

Social

Which of the following is not considered one of the five most common business impacts? Financial Productivity Reputation Social Safety

Social

Which of the following is not considered one of the five most common business impacts? Financial Productivity Reputation Social Safety

Social

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing

Static routing

____________ refers to the type of routing in which the routing table is developed by the network manager and modifications are made only when computers are added to or removed from the network. a. Adaptive routing b. Dynamic routing c. Static routing d. Distance vector routing e. Link state routing

Static routing

Computers produce digital data whose values are binary: 0 or 1.

T

DHCP dynamically assign an IP address to a computer.

T

The negotiation by the transport layer at the sender with the transport layer at the receiver to determine what size packets should be set up is done via establishing a(n) ___________ between the sender and receiver. a. network layer address resolution b. one way handshake c. SNA message d. TCP connection e. DNS server request

TCP connection

: Here is a screenshot of HTTP request. Which of the following is NOT correct

The connection is closed after the first connection

What parts does the NAT change when it translates the network address?

The private IP address The port number of the client 选上面连个

One drawback to dynamic routing is:

The transmission of status information "wastes" network capacity that could be used to send user messages.

Which of the following is not true about one-time passwords?

They create a packet level firewall on the system.

Which of the following is not true about one-time passwords? - Users' pagers or smart phones (via text messaging) can receive them. - They can be used in conjunction with a token system. - The user must enter the one-time password to gain access or the connection is terminated. - This is a good security solution for users who travel frequently and who must have secure dial-in access. -They create a packet level firewall on the system.

They create a packet level firewall on the system.

Which of the following is not true about one-time passwords? Users' pagers can receive them. They can be used in conjunction with a token system. The user must enter the one-time password to gain access or the connection is terminated. This is a good security solution for users who travel frequently and who must have secure dial-in access. They create a packet level firewall on the system.

They create a packet level firewall on the system.

Which of the following is not true about one-time passwords? Answers: Users' pagers or smart phones (via text messaging) can receive them. They can be used in conjunction with a token system. The user must enter the one-time password to gain access or the connection is terminated. This is a good security solution for users who travel frequently and who must have secure dial-in access. They create a packet level firewall on the system.

They create a packet level firewall on the system.

_______________ describes how an asset can be compromised by one specific threat.

Threat scenarios

_______________ describes how an asset can be compromised by one specific threat. Threat scenarios Threat plans Threat hacks Threat contingencies Threat attacks

Threat scenarios

Spyware, adware and DDOS agents are three types of: IP spoofing attacks Denial-of-service attacks Trojans Physical security threats Intrusion prevention detection approaches

Trojans

802.11a LANs provide more channels than 802.11b LANs

True

802.11a provides for speeds of up to 54 Mbps under perfect conditions.

True

802.11b LANs operate at speeds up to 11 Mbps.

True

802.11b provides three separate channels for indoor use in the U.S. that can be used for communication between the access point and other wireless devices on the network.

True

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.

True

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet. True False

True

A Trojan horse may allow an unauthorized user to access a computer from a remote location.

True

A brute-force attack is a method of trying to guess the correct password by trying every possible key.

True

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.

True

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization. True False

True

A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.

True

A forwarding table tells a switch which port it should send out a packet to get to the destination computer

True

A hardware device that is not included in a network profile cannot be accessed by another computer on the network.

True

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.

True

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments True False

True

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller segments. True False

True

Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account.

True

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

True

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity. True False

True

By offloading printing tasks from the main LAN server, a print server increases network efficiency.

True

Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data. True False

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary date True False

True

Controls are mechanisms that reduce or eliminate threats to network security.

True

Controls are mechanisms that reduce or eliminate threats to network security. True False

True

One of the most important functions of Network Operating System (NOS) is a directory service.

True

Part of the function of address resolution is translating the application layer address of the destination into a network layer address. True False

True

Point Coordination Function requires that each station that wishes to transmit on the wireless network sends a request-to-transmit (RTS) packet to the access point and waits for a clear-to-send (CTS) packet from the AP before it can communicate with other nodes on the network.

True

Preventive controls mitigate or stop a person from acting or an event from occurring.

True

Quality of Service routing is a special type of routing in which different connections are assigned different priorities. True False

True

Routing is the process of determining the path or route through the network that a particular message will follow from the sender to the recipient. True Fals

True

Secure Sockets Layer is an encryption standard designed for use on the Web.

True

Secure Sockets Layer is an encryption standard designed for use on the Web. True False

True

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

True

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. True False

True

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. True False

True

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. True False

True

Social engineering refers to creating a team that solves virus problems.

True

Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. True False

True

Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet. True False

True

TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. True False

True

TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order. True False

True

The CERT was established at Carnegie Mellon University.

True

The Enhanced Interior Gateway Routing Protocol is an interior routing protocol originally developed by Cisco. True False

True

The Enhanced Interior Gateway Routing Protocol is an interior routing protocol originally developed by Cisco. True False

True

The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.

True

The most common access point used by attackers to gain access to an organization's network is the Internet connection.

True

The most common authentication protocol used today is Kerberos. True False

True

The most commonly used central authentication protocol used today is Kerberos.

True

The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer. True False

True

Topology refers to the geometric layout of the network and describes how the computers are interconnected.

True

Traditional Ethernet is also known as shared Ethernet.

True

True and False: The network layer is responsible for routing messages from the source computer to the destination computer.

True

True or False: A network computer is designed primarily to communicate using Internet based standards, but has no hard disk. It has only limited functionality.

True

True or False: A request line for an HTTP request starts with a command, such as GET, and ends with the HTTP version number that the browser understands.

True

True or False: A walkie-talkie is an example of half-duplex transmission.

True

True or False: According to John Chambers, CEO of Cisco (a leading networking technology company), the information age is the second Industrial Revolution.

True

True or False: An Application Service Provider (ASP) develops a specific system and companies purchase or rent the service without installing the system on their own computers.

True

True or False: Bandwidth is the difference between the highest and lowest frequencies in a band.

True

True or False: Coding schemes are groups of bits that translate into the "alphabet" of any given system.

True

True or False: Contention is commonly used with Ethernet local area networks.

True

True or False: Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.

True

True or False: Data compression can increase the throughput of a communication link.

True

True or False: Error Detection techniques generally perform some mathematical function on the message, and sending the result along with the message to the destination

True

True or False: Ethernet is a standard used at the Data Link layer of the Internet or OSI model.

True

True or False: Ethernet, a common LAN technology, uses Manchester encoding.

True

True or False: Frequency is the number of cycles per second and is expressed in Hertz.

True

True or False: Frequency modulation refers to the changing of the height of the sound wave.

True

True or False: In 1874, Alexander Graham Bell developed the concept for the telephone.

True

True or False: In a client-server network, the presentation logic is the responsibility of the client computer.

True

True or False: In the three-tier architecture, the software on the client computer is responsible for the presentation logic, an application server is responsible for the application logic and a separate database server is responsible for the data access logic and data storage.

True

True or False: Manchester encoding is a special type of bipolar signaling in which the signal is changed from high to low or from low to high in the middle of the signal using Phase Shift Keying

True

True or False: Media access controls refer to the need to control when computers transmit.

True

True or False: Middleware is the software that sits between the application software on the client and the application software on the server.

True

True or False: One way to reduce quantizing errors is to increase the sampling rate of the analog signal.

True

True or False: Radio data transmission requires that each device has a radio receiver/transmitter and uses a specific frequency.

True

A fundamental technique to determine if an intrusion is in progress in a stable network is:

anomaly detection

True or False: The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data.

True

True or False: Undesirable stray electrical voltage can cause data communication errors.

True

True or False: Web-based e-mail like Hotmail is an example of three-tier client-server architecture that provides access to e-mail messages.

True

True or False: When using contention access control, communication collisions can occur.

True

True or False: he predominant method of transferring information internally in a computer is via parallel mode.

True

True or false: TCP has a bigger communication overhead than UDP

True

True or false: TCP uses sequence numbers to detect missing data

True

True or false: TCP uses three-way handshake to establish a connection.

True

True or false: The TCP portion of TCP/IP performs linking to the application layer.

True

When a switch receives a packet with a destination address that is not in its forwarding table, the switch will broadcast the packet to all of its ports.

True

When someone external to your organization blocks access to your network and/or its resources, this is known as a denial-of-service attack.

True

When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.

True

When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key. True False

True

Wired Equivalent Privacy requires that each user have a preconfigured key in order to communicate with an access point.

True

Which of the following is not a protocol used at the application layer. a. HTTP b. SMTP c. FTP d. Telnet e. UDP

UDP

To get a page from the Web, a user must type in a URL, which stands for:

Uniform Resource Locator

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________.

WLANs

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. WLANs intranet extranet WAN none of the above

WLANs

A local area network is

a group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information.

A backbone network is

a high speed central network that connects other networks in a distance spanning up to several miles.

A metropolitan area network is

a network that spans a geographical area that usually encompasses a city or county area (3 to 30 miles) and that typically uses common carrier circuits.

A sniffer program is a:

a program that records all LAN messages received for later analysis

A sniffer program is a: - type of macro-virus - small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location - used in a call-back modem - a program that records all LAN messages received for later analysis - secure hub program

a program that records all LAN messages received for later analysis

A sniffer program is a: Answers: type of macro-virus small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location used in a call-back modem a program that records all LAN messages received for later analysis secure hub program

a program that records all LAN messages received for later analysis

ARQ means that:

a receiver that detects an error in a message simply asks the sender to retransmit the message until it is received without error

The internet provides:

a) General purpose platform b) All services are built on top c) Services are supplied by application programs d) New services are created without changing the platform

The protocol that makes it possible for a Macintosh web browser to be able to retrieve a Web page from a Microsoft Web server is called the _____________________. a) Hypertext Transfer Protocol b) File Transfer Protocol c) Simple Mail Transfer Protocol d) Internet Message Access Protocol e) Hyperlink Transfer Protocol.

a) Hypertext Transfer Protocol

Techniques used to protect circuits from noise include:

a) Insulation b) Shielding c) Twisting

The software that runs on the mail server is referred to as the ____________ a) Mail transfer agent b) Mail user agent c) Microsoft Outlook d) Web server e) SMTP

a) Mail transfer agent

What is true about net neutrality?

a) Net neutrality means that for a given type of content (i.e. email, web, video, etc), all content providers are treated the same. b) Net neutrality prevents ISP's from giving priority to some content providers, while slowing down others c) Currently Under Attack

The most commonly used e-mail standard is: a) Simple Mail Transfer Protocol b) X.400 c) CMC d) Post Office Protocol e) Telnet

a) Simple Mail Transfer Protocol

To interact with the World Wide Web, a client computer needs an application layer software package called a: a) Web browser b) Web server c) Telnet package d) Uniform Resource Locator package e) Router package

a) Web browser

Digital Subscriber Line:

a) is a fairly recent approach to provide higher data transmission rates across traditional voice circuits in the local loop b) combines analog transmission and frequency division multiplexing c) involves the use of a customer premises equipment (CPE) d) uses a combination of amplitude and phase modulation

Microwave Transmisson:

a) is a type of high frequency radio communication b) requires a clear line-of-sight path c) is typically used for long distance data transmission d) does not require the laying of any cable

An N-tiered architecture: a) is generally more "scalable" than a three-tiered architecture b) is generally less "scalable" than a three-tiered architecture c) uses only two sets of computers in which the clients are responsible for the application and presentation logic, and the servers are responsible for the data d) uses exactly three sets of computers in which the client is responsible for presentation, one set of servers is responsible for data access logic and data storage, and application logic is spread across two or more different sets of servers e) puts less load on a network than a two-tiered architecture because there tends to be less communication among the servers

a) is generally more "scalable" than a three-tiered architecture

Data communications and networking can be considered as a global area of study because:

a) new technologies and applications emerge from a variety of countries and spread around the world b) the technologies enable global communication

In the three tier architecture, the software on the client computer is responsible for the ____________. a) presentation logic b) application logic c) data access logic d) data storage e) application storage

a) presentation logic

The ________________ cloud deployment model provides the highest levels of control, privacy and security. a) private b) public c) community d) hybrid

a) private

A response status code of 404 means: a) the requested page was not found b) the server is currently unavailable c) the sever is currently busy d) your browser is incompatible with the Web server software. e) your browser needs to be updated to the latest version.

a) the requested page was not found

_____________ is the software that controls the network. a. Network Operating System b. Client Operating System c. Embedded Operating System d. Network Control System e. Network Software System

a. Network Operating System

Which of the following type of media is most commonly used in backbone networks because of its high capacity?

a. fiber

The server version of the Network Operating System does not: a. provide the software that performs the functions associated with the physical layer b. provide the software that performs the functions associated with the data link layer c. provide the software that performs the functions associated with the application layer d. provide the software that performs the functions associated with the network layer e. usually provide the software that performs the functions associated with the computer's own operating system

a. provide the software that performs the functions associated with the physical layer

Which of the following is not a purpose for using hubs in a network? a. to act as a communications server b. to connect network cables c. to prevent attenuation d. to act as a junction box e. none of the above

a. to act as a communications server

Hubs

a. usually incorporate repeaters or amplifiers

_________ is a specially formatted request used to perform IP address to data link address resolution.

address resolution protocol

A symmetric encryption system has two parts: the key and the ____________. algorithm spamming method IP spoofer clearance code smart card bits

algorithm

Symmetric encryption systems have two parts: the key and the ____________.

algorithm

Symmetric encryption systems have two parts: the key and the ____________. - algorithm - spamming method - IP spoofer - clearance code - smart card bits

algorithm

With a client-based network, one fundamental problem is that:

all data on the server must travel to the client for processing

The height of a wave is called its:

amplitude

____________ is not a function of a data link protocol.

amplitude shift keying.

A fundamental technique to determine if an intrusion is in progress in a stable network is: anomaly detection armoring cable RSA algorithm patching scanning a user's fingerprint

anomaly detection

Which of the following is not a general function by any application program?

application access storage

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network.

application architecture

Which of the following is not given to a client computer when it is first installed on a TCP/IP network so that it has the appropriate routing/addressing information?

application layer address

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. application level firewall bullion server ANI system IP spoofing systems packet level firewall

application level firewall

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application.

application logic

A(n) _________ is something of value and can be either hardware or software.

asset

Another term for the weakening of a signal over distance is:

attenuation

Which of the following is not an example of a mail user agent software package? a) Outlook Express b) Microsoft Word c) Eudora d) Microsoft Outlook e) All of these are mail user agent packages

b) Microsoft Word

Which of the following is not true about Telnet? a) Telnet requires an application layer program on the client computer and an application layer program on the server or host computer. b) Telnet poses no security threat. c) Telnet was designed in the early days of the Internet. d) Keystrokes are sent over the network in clear text. e) One program that conforms to the Telnet standard is PuTTY.

b) Telnet poses no security threat.

The standards H.320, H.323, and MPEG-2 are commonly used with a) Telnet b) Videoconferencing c) Email d) IM e) Microsoft Office

b) Videoconferencing

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated. a) client b) server c) middleware d) hardware e) software

b) server

One underlying problem with a host-based network is that: a) there are economies of scale because all computer resources are centralized b) the server can get overloaded since it must process all messages c) the architecture is relatively simple and works well d) the server is the one point of control which simplifies security e) clients (terminals) do not require sophisticated hardware/software because they do not perform most of the work in this type of architecture

b) the server can get overloaded since it must process all messages

IPv6 is based upon _________ -byte addresses. a. 32 b. 24 c. 4 d. 16 e. 8

b. 16

_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software. a. Network Services b. Directory Services c. Client Services d. Computing Services e. Remote Access Services

b. Directory Services

Which of the following is not a basic LAN component? a. client b. PAD c. server d. network interface card e. network operating system

b. PAD

A _________ is a group of related resources. a. workgroup b. domain c. server d. client e. sharepoint

b. domain

The term ______________ refers to high speed communication circuits such as DSL.

broadband communications

A special type of message that is used when sending the same message to all computers on a specific LAN or subnet is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message

broadcast message

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet.

broadcast message

When TCP/IP translates a network layer address into a data link layer address, it sends a special ____________ to all computers in the subnet. a. physical layer packet b. multicast message c. X.25 message d. broadcast message e. application layer packet

broadcast message

____________ is not an important middleware standard. a) CORBA (Common Object Request Broker Architecture b) Distributed Computed Environment (DCE) c) Asynchronous Transfer Mode (ATM) d) Open Database Connectivity (ODBC) e) none of the above is an appropriate answer

c) Asynchronous Transfer Mode (ATM)

The acronym, HTML, refers to: a) Header Markup Language b) Hypertext Markup Locator c) Hypertext Markup Language d) Hypertext Markup Library e) Hypertext Modulating Language

c) Hypertext Markup Language

A network switch failure is an example of a(n) ________ threat.

disruptive

______________, or the algorithms or business logic programmed into the application, can be simple or complex depending on the application. a) data storage b) data access logic c) application logic d) presentation logic e) application access storage

c) application logic

Client-server architectures: a) cannot connect computers that use different hardware b) are one of the least used network architectures today c) can use middleware to provide a standard way of communicating between software from more than one vendor d) assign the responsibility for the presentation logic to the server e) were the earliest type of network architectures

c) can use middleware to provide a standard way of communicating between software from more than one vendor

With the two-tier client-server architecture, the server is responsible for the ________ logic. a) application b) presentation c) data access d) session e) physical

c) data access

Another term for a mail user agent is: a) message transfer agent b) router agent c) e-mail client d) webcast package e) Web client

c) e-mail client

In a two-tier client-server architecture, a client computer needs to use an application layer software package called a ________________ to send e-mail: a) message transfer agent b) router agent c) mail user agent d) Webcast package e) gateway agent

c) mail user agent

In a client-server network, _________ gets software from different vendors to work together. a) a front-end processor b) serverware c) middleware d) centerware e) programmer

c) middleware

A "thick client" architecture approach: a) always is a two-tier network architecture b) always is an n-tiered architecture c) places all or almost all of the application logic on the client d) places all or almost all of the application logic on the server e) refers to the size of the cable connecting the clients to the network

c) places all or almost all of the application logic on the client

A "thin client" architecture approach: a) always is a two-tier network architecture b) always is an n-tiered architecture c) places all or almost all of the application logic on the client d) refers to the size of the cable connecting the clients to the network

c) places all or almost all of the application logic on the server

A ________ is a group of computers linked together so that they appear to act as one computer. a) workstation b) transaction terminal c) server farm d)network computer e) transaction terminal

c) server farm

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. - disaster recovery firm - DES company - directory company - certificate authority fingerprint advisory board

certificate authority

How are the application architecture functions split up in a client-server network? a) the presentation logic and data storage are on the client, while the data access logic is on the server b) the data storage, data access, and presentation logic are on the client c) the presentation logic is on the client, while the data storage and data access logic are on the server d) the data storage and data access logic are on the client, while the presentation logic are on the server e) the presentation logic and data access logic are on the client, and the data storage is on the server

c) the presentation logic is on the client, while the data storage and data access logic are on the server

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________. a) browser b) application web c) web server d) operating system e) none of the above

c) web server

_________ is a special type of one directional; videoconferencing in which content is sent from the server to the user. a) broadcasting b) instant messaging c) webcasting d) H.323 e) net Meeting

c) webcasting

A(n) ____________ allows many users to share the same set of files on a common, shared disk drive. a. print server b. database server c. file server d. piconet server e. remote access server

c. file server

A hierarchical tree of domains within one organization that is linked to other trees in the organization is called a ___________.

c. forest

Of the following, which is not true about fiber optic cable? a. it is thinner than unshielded twisted pair cable b. it is lighter than unshielded twisted pair cable c. it has a very low capacity d. it is more expensive than CAT5 unshielded twisted pair cable e. it is a type of guided media

c. it has a very low capacity

Client-Server architectures:

can use middleware to provide a standard way of communicating between software from more than one vendor

The three fundamental approaches to routing are:

centralized, static routing, and dynamic routing

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: - Trojan horse - sniffing - tunneling - computer forensics - misuse detection

computer forensics

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: Answers: Trojan horse sniffing tunneling computer forensics misuse detection

computer forensics

A TCP connection is established in the ___________ routing method.

connection-oriented

With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or a. frequency division b. connection-oriented c. PCMCIA d. connectionless e. application net

connectionless

With _____________ messaging, each UDP segment makes its own way through the network without the use of sequence numbers or acknowledgements. a. frequency division b. connection-oriented c. PCMCIA d. connectionless e. application net

connectionless

_____________ routing is a method of routing in which each packet makes its own way through the network.

connectionless

______________ routing is most commonly used when the application data or message can fit into one single packet.

connectionless

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?

controlled chaos

Developing _______ helps develop a secure network. rules controls network maps vendor documentation service level agreements

controls

The integration of voice, video, and data communications is also known as __________.

convergence

________ controls fix a trespass into the network.

corrective

________ controls fix a trespass into the network. corrective detective preventive mitigating backup

corrective

With ______________, the cloud provider manages the hardware including servers, storage, and networking components. The organization is responsible for all the software, including operating system (and virtualization software), database software, and its applications and data. a) private clouds b) hardware clouds c) storage services d) IaaS

d) IaaS

To get a page from the Web, a user must type in a URL, which stands for: a) Unknown Resource Locator b) Unknown Router Location c) Uniform Router Location d) Uniform Resource Locator e) Uniform Resource Library

d) Uniform Resource Locator

With a client-based network, one fundamental problem is that: a) the clients each must store all the data b) the server does not have any data storage capability c) the host or server must perform presentation logic, application logic, and data access logic at the same time d) all data on the server must travel to the client for processing e) the clients must perform the data storage logic

d) all data on the server must travel to the client for processing

A(n) __________ is the way in which the functions of the application layer software are spread among the clients and servers in the network. a) anonymous FTP b) data access logic c) fat client d) application architecture e) response status architecture

d) application architecture

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data. a) workstation b) transaction terminal c) cluster d) mainframe e) personal computer

d) mainframe

One disadvantage of the ____________ architecture is that places a greater load on the network. a) two-tier b) three tier c) one-tier d) n-tier e) layered

d) n-tier

A(n) _____________ is not a common type of dedicated server. a. file server b. print server c. database server d. collision server e. remote access server

d. collision server

An application program function is __________, or the processing required to access data.

data access logic

Which of the following is not a type of intrusion prevention system? network-based data link-based application-based host-based none of the above is an appropriate answer

data link-based

_________ is an application program function that deals with storing and retrieving data.

data storage

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks?

delphi team member

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed.

denial-of-service attack

An example of _____ of data would be if a computer virus eliminated files on that computer.

destruction

________ controls discover unwanted events.

detective

Transmission speeds

differ widely among media

Two fundamentally different types of data are:

digital and analog

A tornado that eliminates a network control center would be an example of a natural __________

disaster

A tornado that eliminates a network control center would be an example of a natural __________ disaster disruption controlled chaos destruction intrusion

disaster

Encryption is the process of:

disguising information by the use of mathematical rules, known as algorithms

RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____

disk mirroring

There are optional and required parts of an HTTP request. They are: a) request address, request body b) request address, request header, request body c) request line, request header d) request line, request body e) request line, request header, request body

e) request line, request header, request body

__________ is not true with respect to network hubs. a. Each port in a hub has a unique number. b. A good network plan includes hubs in areas, such as a telecommunications wiring closet, in which a network may expand c. Simple hubs are commonly available in 4-, 8-, 16-, and 24-port sizes d. Many hubs act as repeaters or amplifiers e. Hubs provide a complicated way to connect network cables

e. Hubs provide a complicated way to connect network cables

Which of the following is not an advantage of using Cat5 unshielded twisted pair for cabling LANs? a. cost (relative to fiber) b. thickness (relative to coax) c. weight (relative to coax) d. flexibility (relative to coax) e. security (relative to fiber)

e. security (relative to fiber)

A way to prevent intrusion by disguising information through algorithms is:

encryption

The primary reason for networking standards is to:

ensure that hardware and software produced by different vendors can work together

To snare intruders, many organizations now use _________ techniques. entrapment hacker Trojan horse cracker DES

entrapment

R1 below receives a packet with destination address 10.10.20.45. Which interface should it forward the packet to?

eth2 12-5

A "thin client" approach places most of the application logic on the client. true false

false

A hop in a routing calculation is defined as one link or circuit.

false

A multicast message can be used to send a message to a maximum of two other computers.

false

A routing protocol used inside an autonomous system is called an exterior routing protocol.

false

As the demand for more and more network applications grow; host-based computing becomes the best solution. true false

false

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. firewall token system ANI call-back modem firefighter

firewall

____________ refers to bits that have been changed, in error, from 1 to 0, or vice versa, in a data transmission.

flipped bits

IP spoofing means to:

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

IP spoofing means to: - fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network - clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation - illegally tape or listen in on telephone conversations - detect and prevent denial-of-service attacks - act as an intermediate host computer between the Internet and the rest of the organization's networks

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

IP spoofing means to: fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation illegally tape or listen in on telephone conversations detect and prevent denial-of-service attacks act as an intermediate host computer between the Internet and the rest of the organization's networks

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

Having a conversation with someone using a cellular phone is an example of _________ transmission.

full-duplex

________________ separate channels to reduce interference between channels in frequency division multiplexing.

guardbands

The two basic types of media are:

guided and unguided (radiated)

The use of hacking techniques to bring attention to a larger political or social goal is referred to as

hacktivism

The use of hacking techniques to bring attention to a larger political or social goal is referred to as - cracking - ethical politics - hacktivism - social engineering - brute force attacks

hacktivism

The use of hacking techniques to bring attention to a larger political or social goal is referred to as hacking ethical politics hacktivism social engineering brute force attacks

hacktivism

The use of hacking techniques to bring attention to a larger political or social goal is referred to as Answers: cracking ethical politics hacktivism social engineering brute force attacks

hacktivism

Stop-and-wait ARQ uses __________ type of data flow.

half duplex

The newer form of IP, version 6 (IPv6): a. Is running out of address space to support the growth of the Internet b. has a 20 byte header c. has an increased address size from 32 bits to 128 bits d. does not include version number in its header e. does not include hop limit in its header

has an increased address size from 32 bits to 128 bits

Which of the following is a type of intrusion prevention system?

host-based

Which of the following is a type of intrusion prevention system? - zoned-based - data link-based - host-based - transport-based -none of the above is an appropriate answer

host-based

Which of the following is a type of intrusion prevention system? Answers: zoned-based data link-based host-based transport-based none of the above is an appropriate answer

host-based

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: decreased because the new sophisticated technology is far more secure than the old manual methods remained the same because management was always deeply interest in control and security decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society increased because this commitment to data communications has changed the potential vulnerability of the organization's assets remained the same because there are very few threats to data communications

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

The __________________ is one of the most important developments in the history of both information systems and communication systems.

internet

A(n) _________ is a LAN that uses the same technologies as the Internet but is open to only those inside the organization.

intranet

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.

intrusion

Often, incidents of unauthorized access known as___________, involve employees of the organization, surprisingly enough.

intrusion

DES:

is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

DES: is maintained by ISO refers to Date Electronic Security is a commonly used symmetric encryption algorithm that was developed in the mid-1970s was developed by a joint effort that included Microsoft is an asymmetric algorithm

is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

Asynchronous transmission:

is also known as start-stop transmission

An N-tiered architecture

is generally more "scalable" than a three-tier architecture

An N-tiered architecture:

is generally more "scalable" than a three-tiered architecture

Media access control:

is not very important in point-to-point with full duplex configuration

In ARQ, a NAK:

is sent by the recipient if the message contains an error

Synchronous transmission:

is used to transmit a "frame" or "packet" of data at a time

IP: a. performs segmentation of the data b. does not have a header c. is currently in use with only one packet form or structure d. is utilized during routing functions e. performs error control functions

is utilized during routing functions

Which of the following is not a component of a router?

keyboard

Optical media:

less likely to suffer from noise than electrical media

_______________ is a type of dynamic routing.

link state

A ________ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.

mainframe

A security hole is a(n):

malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

_____________ is a line-of-sight type of wireless media.

microwave

In a client-server network, _________ gets software from different vendors to work together.

middleware

A(n) ____________, is an information system that is critical to the survival of an organization. - network plan - accounting system - IDS - mission critical application - firewall

mission critical application

A(n) ____________, is an information system that is critical to the survival of an organization. network plan accounting system IDS mission critical application firewall

mission critical application

A(n) ____________, is an information system that is critical to the survival of an organization. Answers: network plan accounting system IDS mission critical application firewall

mission critical application

The acronym, Modem, stands for _________________.

modulator/demodulator

With the two-tier client-server architecture, the client is responsible for the ________ logic and the server is responsible for the ________ logic, remember, choose the best answer.

presentation; data access

Which of the following is not an important factor to consider when selecting media to be used in a network?

prestige value of the type of media

_________ controls stop a person from acting.

preventive

_________ controls stop a person from acting. detective corrective mitigating preventive backup

preventive

____________ is a modulation technique that combines two different amplitude combinations with eight different phase combinations modulation to send four bits per symbol.

quadrature amplitude modulation

The key principle in preventing disruption, destruction and disaster is ___________. redundancy control spreadsheet IDS anti-virus software prevention controls

redundancy

The key principle in preventing disruption, destruction and disaster is ___________. = - redundancy - control spreadsheet - IDS - anti-virus software - prevention controls

redundancy

The key principle in preventing disruption, destruction and disaster is ___________. Answers: redundancy control spreadsheet IDS anti-virus software prevention controls

redundancy

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

risk assessment

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. - risk assessment - backplane - mitigating control factor analysis - control verification worksheet - control test plan

risk assessment

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. risk assessment backplane mitigating control factor analysis control verification worksheet control test plan

risk assessment

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. Answers: risk assessment backplane mitigating control factor analysis control verification worksheet control test plan

risk assessment

We can calculate the relative ___________, by multiplying the impact score by the likelihood.

risk score

__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller segments e. interfacing with the network layer

routing

__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller segments e. interfacing with the network layer

routing

__________ is not an important function of the transport layer. a. end-to-end delivery of the message b. taking messages from the application layer c. routing d. breaking long messages into smaller segments e. interfacing with the network layer

routing

In its simplest form, the __________ has two columns: the first column lists every computer and device in the network, while the second column lists the computer or device to which that computer should send messages, if they are destined for the computer in the first column.

routing table

The _____________ is used by a computer to determine how messages will travel through the network.

routing table

The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table

routing table

The _____________ is used by a computer to determine how messages will travel through the network. a. routing table b. configuration listing c. linking loader d. bus header assignment list e. file allocation table

routing table

For Ethernet networks, a _______ switch can make eavesdropping more difficult.

secure

The transport layer must break messages from the application layer into several _____ that can be sent to the network layer. a. bits b. bytes c. frames d. segments e. strings

segments

When all bits of a character are transferred one after another, the bits are transferred in ___________ mode.

serial

With the "thin client" architecture, when an application changes, only the _________ with the application logic needs to be updated.

server

___________ is the translation of application layer addresses into IP addresses.

server name resolution

In the Internet Model, the application layer corresponds to the _______________, layer(s) of the OSI model.

session, presentation, application

IP Security Protocol:

sits between IP at the network layer and TCP/UDP at the transport layer

IP Security Protocol: is focused on Web applications is primarily used to encrypt e-mail is a policy which makes public key encryption work on the Internet sits between IP at the network layer and TCP/UDP at the transport layer operates in entrapment mode

sits between IP at the network layer and TCP/UDP at the transport layer

The three stages of the de juro standardization process are ______________________.

specification, identification of choices, and acceptance

The function of the file server is to:

store data and software programs that can be used by client computers on the network.

A(n) ________ refers to a group of computers that are logically grouped together by IP number.

subnet

A(n) ________ refers to a group of computers that are logically grouped together by IP number. a. IPv6 group b. subnet c. data link group d. TCP group e. application net

subnet

_______ is the dominant network protocol today.

tcp/ip

As part of the five-layer network model used in our textbook, the data link layer sits directly between:

the physical and network layers

How are the application architecture functions split up in a client-server network?

the presentation logic is on the client, while the data storage and data access logic are on the server

An HTTP response status code of 404 means that:

the requested page was not found

One underlying problem with a host-based network is that:

the server can get overloaded since it must process all messages

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

threat

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. - asset - service level agreement - threat - security plan - network design

threat

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. asset service level agreement threat security plan network design

threat

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. Answers: asset service level agreement threat security plan network design

threat

_________________ is defined as the total number of information bits divided by the total number of bits in the transmission.

transmission efficiency

The fourth layer of the OSI model is called the __________ layer.

transport

Which layer of the OSI model is responsible for ensuring flow control so that the destination station does not receive more packets that it can process at any given time?

transport layer

Which layer of the OSI model is responsible for ensuring that all packets sent are received by the destination station by dealing with end-to-end issues?

transport layer

A brute force attack against an encryption system: - is called RC4 - tries to gain access by trying every possible key - is also known as 3DES - always uses the Rijndael algorithm - is part of the Advanced Encyrption Standard

tries to gain access by trying every possible key

A brute force attack against an encryption system: tries to gain access by trying every possible key is called RC4 is also known as 3DES always uses the Rijndael algorithm is part of the Advanced Encyrption Standard

tries to gain access by trying every possible key

An Address Resolution Protocol message is broadcast to all computers in a subnet to find the data link layer address.

true

An autonomous system is a network operated by one organization.

true

An example of an application layer address is www.indiana.edu.

true

Because there is a limit on the length of a frame that the data link layer can transmit from node to node, the transport layer breaks up the message from the application layer into several smaller packets.

true

Source port address is the logical address generated by the application layer on the source computer to identify the application, which is sending the data.

true

Subnet masks tell computers what part of an IP address is to be used to determine whether a destination is in the same subnet or in a different subnet.

true

TCP includes a sequence number so that the packets can be reassembled at the destination in the correct order.

true

TCP/IP is a data link protocol that is used on the Internet.

true

The TCP portion of TCP/IP performs linking to the application layer.

true

The data link layer address is generally encoded in a network card by the card's manufacturer.

true

The four general functions of any application program are: data storage, data access logic, application logic and presentation logic. true false

true

The fundamental problem in client-based networks is that all data on the server must travel to the client for processing. true false

true

The transport layer process running on the destination computer, reassembles the fragmented application message before passing it up to the application layer.

true

The two functions of middleware are to: 1) provide a standard way of communicating that can translate between software from different vendors, and 2) manage the message transfer between clients and servers so that clients do not need to 'know' which server contains the application's data. true false

true

To help determine to which application a transmission should be delivered on a particular computer, TCP uses the application layer port addresses to distinguish among many open applications on a computer.

true

Your typical web browsing scenario where a person using a web browser accesses a web page from a server on the Internet is a good example of a client-server application architecture. true false

true

Which of the following is a mode that is used by IPSec?

tunnel

Which of the following is a mode that is used by IPSec? - exchange - sniffer - tunnel - creeper - firefighter

tunnel

The type of media usually installed on homes and businesses by the telephone company is called ____________.

twisted pair

A(n) _________-tiered architecture uses only two sets of computers: one set of clients and one set of servers.

two

Which of the following is not a protocol used at the application layer.

udp

A type of message that is used when sending a message from one computer to another computer is called a: a. unicast message b. multicast message c. broadcast message d. guided message e. radiated message

unicast message

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

uninterruptible power supply

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

unlocked wiring closet for network devices

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? locks on network circuits after working hours passwords that disable the screen and keyboard of a computer secured network cabling behind walls and above ceilings use of armored cable unlocked wiring closet for network devices

unlocked wiring closet for network devices

Pervasive networking means that:

virtually all computers will be networked in some way to other computers and be able to transmit data at staggeringly fast rates

The type of multiplexer that divides the circuit horizontally into different light frequencies that are transmitted simultaneously across many channels is a:

wavelength division multiplexer

To interact with the World Wide Web, a client computer needs an application layer software package called a:

web browser

Each server on a network that needs to act as a web server needs an application layer software package called a (n) ______________.

web server

The source port identifier of the received TCP segment tells the destination station _____________. a. which computer sent the TCP packet. b. which application layer program that the packet should be sent c. which application layer process the packet is from. d. the IP address of the source computer. e. the IP address of the destination computer.

which application layer process the packet is from.

The source port identifier tells the destination station _____________.

which application layer process the packet is from.

Which of the following are usually the first choice for eavesdropping?

wireless LANs

Which of the following are usually the first choice for eavesdropping? unshielded twisted pair shielded twisted pair local cables owned by the organization wireless LANs fiber optics

wireless LANs


Conjuntos de estudio relacionados

Math solutions to two-equation systems

View Set

World Studies-Asia and the Pacific Ch. 1

View Set

Session 2: Business Model Canvas & Value Proposition Canvas

View Set

GBUS602 Financial Decision Making Test 1

View Set