CIS 321 Multiple Choice Exam
In a point-to-point network, how many physical links will there be when a packet is transmitted?
1
Which of the following is a private IP address range?
10.x.x.x
If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices?
12
ASCII has a 7-bit code. How many keyboard characters can it represent?
128
How long is an IPv6 address?
128 bits
In the mask 255.255.255.0, how many 1s are there?
24
If your subnet part is 8 bits long, you can have ________ subnets.
254
A mask has how many bits?
32
IPv4 addresses are how long?
32 bits
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
32 bits
If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host?
5
What is the bandwidth of a channel that extends from 55 MHz to 60 MHz?
5 Mhz
Wi-FI standards come from what Working Group?
802.11
________ is among the most widely used 802.11 transmission standards used today and dominates Wi-Fi sales.
802.11ac
To prevent an unauthorized user from sending supervisory commands to switches, companies use ________.
802.1AE
To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use ________.
802.1X
What 802 Working Group creates Ethernet standards?
802.3
Which light wavelength dominates in LANs?
850 nm
Which of the following is used most often in LANs for fiber transmission links?
850 nm multimode fiber
A company has a domain name. What else must it have before it can make a website available to the public?
A DNS server to host its domain name and the website itself
ARP cache poisoning is what kind of attack?
A man-in-the-middle attack
The DNS ____ record is for the host name's _____ address.
A; IPv4.
What propagation problem is especially bad in moist air?
Absorptive attentuation
What are Zigbee and Z-Wave?
Ad-hoc networking protocols
Which of the following is not one of the three general parts of messages? Header, trailer, address field or data field?
Address field
NAT does what?
Allows a firm to have more internal IP addresses and provides some security
The strength of a wave is its what?
Amplitude
"Octet" is the same as _________.
Byte
The 802.11 standard has two mechanisms for media access control. One of the two, _________ is reliable, mandatory, and more efficient and faster.
CSMA/CA+ACK
To use a leased line, the customer must have a(n) ________ at each site.
CSU/DSU
For their transmission medium, cable television companies primarily use ________.
Coaxial cable
Trunk links connect switches to _______ switches.
Core
What type of switch connects switches to other switches?
Core switches
The KrebsOnSecurity attack was a ____ attack that used ____.
DDoS; IoT Devices.
Two-way amplifiers are needed for cable _____ service.
Data
At what layer will you find standards for EUI-48 addresses?
Data link (2)
Network standards _________.
Decrease equipment prices
Flooding a host with traffic from multiple computers and internet connections so that it cannot serve its legitimate users is a ________ attack.
Distributed Denial of Service (DDoS)
Which of the following is more widely used; ESP or AH?
ESP
Ethernet uses ______ addresses.
EUI-48
Four-way closes use _____ segments.
Fin
Ethernet messages are called what?
Frames
Wireless radio transmission speed is usually measured in terms of what, which is measured in what unit?
Frequency, hertz
In Ethernet, switches are organized in a ______.
Hierarchy
________ have DHCP servers.
Home access routers
When Host A wishes to communicate with Host B, a DNS server provides the IP address of ______.
Host B
Which is NOT one of the three parts of a public IPv6 unicast address? Subnet ID, routing prefix or host part?
Host part
Which standards agency is especially important for Internet supervisory processes?
IETF
Routing is based on an ______.
IP Address
SA protections are applied in the ______.
IPSec protection
Which of the following is a standards agency; OSI, TCP/IP, or ITU-T?
ITU-T
MIMO does what?
Increase transmission distance and increase transmission speed
Router ports are called ______.
Interfaces
At what layer will you find standards for routers?
Internet (3)
Internet communication that does not involve a human is referred to with the term __________.
Internet of Things (IoT)
How does carrier Ethernet differ from traditional Ethernet?
It is offered by carriers instead of being installed and managed by the company using it. and it is for MAN and WAN services.
Spread spectrum transmission is used in WLANs because __________ and _________.
It is required by regulators, it is a more reliable transmission
Ping tells you ________, while traceroute tells you the cumulative round-trip latency to each router along the route to the host.
Latency in the connection to the host and that the host is reachable
An MTSO ________.
Links mobile users to wired telephone customers
The business benefit of multiplexing is what?
Lower cost
Which of the following is the most expensive to use? Traditional routing, MPLS, or carrier ethernet?
MPLS
________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time.
Media Access Control
Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band.
More bandwidth
The most serious problem with wireless transmission in WLANs is what?
Multipath interference
________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.
NAT
Compared to the Internet, carrier WANs ________.
Offer higher-quality service
What transmission medium do all DSL services use?
One-pain voice-grade UTP
4-pair TP terminates in a(n) ______ connector
RJ-45
______ have access points and DHCP servers.
Residential Access Routers
The _______ is the packet's entire path between the source host and the destination host.
Route
______ can reduce router cost and permit routing rules to be changed rapidly.
SDN
Guarantees for quality of service are called ________. They specify the worst case, minimum speed, minimum availability, maximum latency, and maximum jitter.
SLAs
To manage their Ethernet networks, companies rely on what?
SNMP
Which is less expensive to implement, IPsec or SSL/TLS?
SSL/TLS
Corporations wish to have _____ domain names.
Second-level
Wireless access points typically link wireless clients to what?
Servers on the wired network
In Wi-Fi, 2.4 GHz and 5 GHz refer to what?
Service bands
IPsec is used for ________ VPNs.
Site-to-Site and Remote Access.
Routers and switches must support?
Southbound APIs
In ADSL, the customer should have what?
Splitters and an ADSL modem
Ping is for what kind of messages?
Supervisory
Ethernet forwarding devices are called what?
Switches
Which of the following protocols is reliable; IP, TCP, UDP or HTTP?
TCP
In HTTP, which program may initiate communication?
The browser (client)
An advantage of using DHCP to configure clients is that ________.
The configuration information will be up-to-date.
What process adds a header in front of a short application message or fragment?
Transport
________ have SSIDs.
Wireless Access Points
In SNMP, the manager communicates directly with a(n) ________.
agent
If a destination host receives a correct segment, it will transmit ______; however, if a destination host receives an incorrect segment, it will transmit ______.
an ACK segment, nothing
On a server, well-known port numbers indicate ________.
applications
WAN optimization devices are deployed ________.
at the end of leased lines
RSTP ______
can increase reliability and was created to break accidental loops.
The source socket is 60.171.18.22:2707. The source is a(n) ________.
client
On the Internet, a __________host usually gets a dynamic IP address and a __________ host gets a static IP address.
client, server
The first step in the routing process involves ________.
comparing the packet's destination IP address to all rows
Creating switching tables and routing tables are examples of ________.
control
The IETF primarily ________
creates Internet standards
DSL offers?
data & voice transmission
The transmission paths of an IP packet between two routers are called _________.
data links
The third step of the routing process is _____.
deciding what interface and to what device to send the packet back out to.
SNMP network management ________.
decreases total cost
Converting application messages into bits is called _______.
encoding
In IPv6 addresses, ________ are separated by ________.
fields; colons
One-bit fields are called ________ fields and if it is not set, this means its value is ______.
flag, 0
The ability to transmit in two directions simultaneously i
full-duplex communication
If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________.
go through all three steps for each
A message always has a ________.
header
We call any device connected to the Internet a ________.
host
Network standards provide ________.
interoperability
Variability in delay is called?
jitter
If no other row matches, the router will select the ________ row as its best match.
last
When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________ and is usually measured in _______.
latency, milliseconds
The PSTN core is organized as?
modified hierarchy
The 60 GHz unlicensed service band offers ________ compared to lower-frequency service bands.
more speed per channel
A border router connects different IP ________ and an internal router connects different IP ________.
networks, subnets
Communication between SDN applications and SDN controllers is governed by ________.
northbound APIs
Wi-Fi normally uses a(n) ________.
omnidirectional antenna
Which layer governs wires?
physical
Traffic shaping reduces traffic by ________.
preventing and limiting certain undesirable traffic from entering the network
UTP categories rate the ___________ of UTP cabling
quality
Dynamic ________ protocols allow routers to transmit routing table information to one another.
routing
In a routing table, a ________ represents a route for a group of IP addresses.
row
The second step in the routing process involves ________.
selecting the best-match row
What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?
shadow/dead zones
Fiber that has a core diameter of 83 microns is ________.
single-mode fiber.
Communication between SDN controllers and routers is governed by ________.
southbound APIs
In general, the fewer the channels, ________.
the greater the likelihood of interference between access points
In a telephone system, the lines that connect customers to the nearest switch are called ________.
the local loop
For analysis, network administrators usually interact primarily with ________.
the network visualization program
Standards layers provide services directly to ________.
the next-higher layer
IETF standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer.
transport
TCP/IP standards are set at the __________.
transport layer
SNMP agents can initiate ________.
traps
WLANS normally use ______ because they allow greater flexibility.
unlicensed bands
In the IPv4 address 1.2.3.4, what is the network part?
we cannot say