CIS 321 Multiple Choice Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

In a point-to-point network, how many physical links will there be when a packet is transmitted?

1

Which of the following is a private IP address range?

10.x.x.x

If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices?

12

ASCII has a 7-bit code. How many keyboard characters can it represent?

128

How long is an IPv6 address?

128 bits

In the mask 255.255.255.0, how many 1s are there?

24

If your subnet part is 8 bits long, you can have ________ subnets.

254

A mask has how many bits?

32

IPv4 addresses are how long?

32 bits

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?

32 bits

If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host?

5

What is the bandwidth of a channel that extends from 55 MHz to 60 MHz?

5 Mhz

Wi-FI standards come from what Working Group?

802.11

________ is among the most widely used 802.11 transmission standards used today and dominates Wi-Fi sales.

802.11ac

To prevent an unauthorized user from sending supervisory commands to switches, companies use ________.

802.1AE

To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use ________.

802.1X

What 802 Working Group creates Ethernet standards?

802.3

Which light wavelength dominates in LANs?

850 nm

Which of the following is used most often in LANs for fiber transmission links?

850 nm multimode fiber

A company has a domain name. What else must it have before it can make a website available to the public?

A DNS server to host its domain name and the website itself

ARP cache poisoning is what kind of attack?

A man-in-the-middle attack

The DNS ____ record is for the host name's _____ address.

A; IPv4.

What propagation problem is especially bad in moist air?

Absorptive attentuation

What are Zigbee and Z-Wave?

Ad-hoc networking protocols

Which of the following is not one of the three general parts of messages? Header, trailer, address field or data field?

Address field

NAT does what?

Allows a firm to have more internal IP addresses and provides some security

The strength of a wave is its what?

Amplitude

"Octet" is the same as _________.

Byte

The 802.11 standard has two mechanisms for media access control. One of the two, _________ is reliable, mandatory, and more efficient and faster.

CSMA/CA+ACK

To use a leased line, the customer must have a(n) ________ at each site.

CSU/DSU

For their transmission medium, cable television companies primarily use ________.

Coaxial cable

Trunk links connect switches to _______ switches.

Core

What type of switch connects switches to other switches?

Core switches

The KrebsOnSecurity attack was a ____ attack that used ____.

DDoS; IoT Devices.

Two-way amplifiers are needed for cable _____ service.

Data

At what layer will you find standards for EUI-48 addresses?

Data link (2)

Network standards _________.

Decrease equipment prices

Flooding a host with traffic from multiple computers and internet connections so that it cannot serve its legitimate users is a ________ attack.

Distributed Denial of Service (DDoS)

Which of the following is more widely used; ESP or AH?

ESP

Ethernet uses ______ addresses.

EUI-48

Four-way closes use _____ segments.

Fin

Ethernet messages are called what?

Frames

Wireless radio transmission speed is usually measured in terms of what, which is measured in what unit?

Frequency, hertz

In Ethernet, switches are organized in a ______.

Hierarchy

________ have DHCP servers.

Home access routers

When Host A wishes to communicate with Host B, a DNS server provides the IP address of ______.

Host B

Which is NOT one of the three parts of a public IPv6 unicast address? Subnet ID, routing prefix or host part?

Host part

Which standards agency is especially important for Internet supervisory processes?

IETF

Routing is based on an ______.

IP Address

SA protections are applied in the ______.

IPSec protection

Which of the following is a standards agency; OSI, TCP/IP, or ITU-T?

ITU-T

MIMO does what?

Increase transmission distance and increase transmission speed

Router ports are called ______.

Interfaces

At what layer will you find standards for routers?

Internet (3)

Internet communication that does not involve a human is referred to with the term __________.

Internet of Things (IoT)

How does carrier Ethernet differ from traditional Ethernet?

It is offered by carriers instead of being installed and managed by the company using it. and it is for MAN and WAN services.

Spread spectrum transmission is used in WLANs because __________ and _________.

It is required by regulators, it is a more reliable transmission

Ping tells you ________, while traceroute tells you the cumulative round-trip latency to each router along the route to the host.

Latency in the connection to the host and that the host is reachable

An MTSO ________.

Links mobile users to wired telephone customers

The business benefit of multiplexing is what?

Lower cost

Which of the following is the most expensive to use? Traditional routing, MPLS, or carrier ethernet?

MPLS

________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time.

Media Access Control

Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band.

More bandwidth

The most serious problem with wireless transmission in WLANs is what?

Multipath interference

________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.

NAT

Compared to the Internet, carrier WANs ________.

Offer higher-quality service

What transmission medium do all DSL services use?

One-pain voice-grade UTP

4-pair TP terminates in a(n) ______ connector

RJ-45

______ have access points and DHCP servers.

Residential Access Routers

The _______ is the packet's entire path between the source host and the destination host.

Route

______ can reduce router cost and permit routing rules to be changed rapidly.

SDN

Guarantees for quality of service are called ________. They specify the worst case, minimum speed, minimum availability, maximum latency, and maximum jitter.

SLAs

To manage their Ethernet networks, companies rely on what?

SNMP

Which is less expensive to implement, IPsec or SSL/TLS?

SSL/TLS

Corporations wish to have _____ domain names.

Second-level

Wireless access points typically link wireless clients to what?

Servers on the wired network

In Wi-Fi, 2.4 GHz and 5 GHz refer to what?

Service bands

IPsec is used for ________ VPNs.

Site-to-Site and Remote Access.

Routers and switches must support?

Southbound APIs

In ADSL, the customer should have what?

Splitters and an ADSL modem

Ping is for what kind of messages?

Supervisory

Ethernet forwarding devices are called what?

Switches

Which of the following protocols is reliable; IP, TCP, UDP or HTTP?

TCP

In HTTP, which program may initiate communication?

The browser (client)

An advantage of using DHCP to configure clients is that ________.

The configuration information will be up-to-date.

What process adds a header in front of a short application message or fragment?

Transport

________ have SSIDs.

Wireless Access Points

In SNMP, the manager communicates directly with a(n) ________.

agent

If a destination host receives a correct segment, it will transmit ______; however, if a destination host receives an incorrect segment, it will transmit ______.

an ACK segment, nothing

On a server, well-known port numbers indicate ________.

applications

WAN optimization devices are deployed ________.

at the end of leased lines

RSTP ______

can increase reliability and was created to break accidental loops.

The source socket is 60.171.18.22:2707. The source is a(n) ________.

client

On the Internet, a __________host usually gets a dynamic IP address and a __________ host gets a static IP address.

client, server

The first step in the routing process involves ________.

comparing the packet's destination IP address to all rows

Creating switching tables and routing tables are examples of ________.

control

The IETF primarily ________

creates Internet standards

DSL offers?

data & voice transmission

The transmission paths of an IP packet between two routers are called _________.

data links

The third step of the routing process is _____.

deciding what interface and to what device to send the packet back out to.

SNMP network management ________.

decreases total cost

Converting application messages into bits is called _______.

encoding

In IPv6 addresses, ________ are separated by ________.

fields; colons

One-bit fields are called ________ fields and if it is not set, this means its value is ______.

flag, 0

The ability to transmit in two directions simultaneously i

full-duplex communication

If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________.

go through all three steps for each

A message always has a ________.

header

We call any device connected to the Internet a ________.

host

Network standards provide ________.

interoperability

Variability in delay is called?

jitter

If no other row matches, the router will select the ________ row as its best match.

last

When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________ and is usually measured in _______.

latency, milliseconds

The PSTN core is organized as?

modified hierarchy

The 60 GHz unlicensed service band offers ________ compared to lower-frequency service bands.

more speed per channel

A border router connects different IP ________ and an internal router connects different IP ________.

networks, subnets

Communication between SDN applications and SDN controllers is governed by ________.

northbound APIs

Wi-Fi normally uses a(n) ________.

omnidirectional antenna

Which layer governs wires?

physical

Traffic shaping reduces traffic by ________.

preventing and limiting certain undesirable traffic from entering the network

UTP categories rate the ___________ of UTP cabling

quality

Dynamic ________ protocols allow routers to transmit routing table information to one another.

routing

In a routing table, a ________ represents a route for a group of IP addresses.

row

The second step in the routing process involves ________.

selecting the best-match row

What propagation problem becomes worse when there is a large, and dense, object between sender and receiver?

shadow/dead zones

Fiber that has a core diameter of 83 microns is ________.

single-mode fiber.

Communication between SDN controllers and routers is governed by ________.

southbound APIs

In general, the fewer the channels, ________.

the greater the likelihood of interference between access points

In a telephone system, the lines that connect customers to the nearest switch are called ________.

the local loop

For analysis, network administrators usually interact primarily with ________.

the network visualization program

Standards layers provide services directly to ________.

the next-higher layer

IETF standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer.

transport

TCP/IP standards are set at the __________.

transport layer

SNMP agents can initiate ________.

traps

WLANS normally use ______ because they allow greater flexibility.

unlicensed bands

In the IPv4 address 1.2.3.4, what is the network part?

we cannot say


Conjuntos de estudio relacionados

OH Real Estate Law Course - Practice Exam

View Set

Chapter 19 Avian anatomy & physiology

View Set

ECON 210 Midterm 3 SG (Quizzes 6-7, hw 8-9)

View Set

Market Research Exam 2 (Chapter 3: Test)

View Set

Packaged Products Overview Review Questions

View Set

Chapter 10: Childhood Obesity Causes

View Set