CIS102B-Networking Fundamentals Part 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

The IPv6 address 6A3E:BA99:0:0:0:87BA:0123:FFEF can be abbreviated as: A. 6A3E:BA99::87BA:0123:FFEF B. 0:::87BA:0123:FFEF C. 6A3E:BA99:30:87BA:0123:FFEF D. 6A3E:BA99:0

A. 6A3E:BA99::87BA:0123:FFEF

____ takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network. A. Address Resolution Protocol (ARP) B. Network Address Translation (NAT) C. User Datagram Protocol (UDP) D. Transport Control Protocol (TCP)

A. Address Resolution Protocol (ARP)

The number of network bits of a class ____ IPv4 address is 16 bits. A. B B. D C. A D. C

A. B

A ____ risk assessment evaluates the impact of potential threats on business processes. A. Business B. Users C. Router D. Security

A. Business

When used by 3G phone networks, the code division multiplexing is called ____. A. CDMA B. GSM C. DWDM D. CWDM

A. CDMA

Many ____ conform to the X.509 standard created and supported by the ITU-T. A. Certificates B. Switches C. Firewalls D. Routers

A. Certificates

____ is designed for short-distance connections and has only a few lambdas, with greater space between lambdas. A. Coarse wavelength division multiplexing (CWDM) B. Fixed wavelength division multiplexing (FWDM) C. Dense wavelength division multiplexing (DWDM) D. Inverse wavelength division multiplexing (IWDM)

A. Coarse wavelength division multiplexing (CWDM)

The ____ is a large, distributed database of Internet addresses and domain names. A. Domain Name System (DNS) B. Uniform Resource Locator (URL) C. Hypertext Transfer Protocol (HTTP) D. Hypertext Markup Language (HTML)

A. Domain Name System (DNS)

Which protocol's information can NOT be encapsulated by an IP header? A. Ethernet B. TCP C. DNS D. UDP

A. Ethernet

____ is a set of protocols created to support the secure transfer of data at the network layer. A. IPsec (IP Security) B. Transport Layer Security (TLS) C. Advanced Encryption Standard (AES) D. Data Encryption Standard (DES)

A. IPsec (IP Security)

Imagine you are the IT strategist for a large city planning to implement a Metropolitan Area Network (MAN) to enhance connectivity between municipal offices and public facilities. As you contemplate the potential applications of the MAN, you consider various scenarios. In this context, which of the following is NOT an optimal application of a MAN? A. Long-haul connection across states B. Real-time transaction backup C. High-speed disaster recovery site D. Interconnection between corporate data center and ISP

A. Long-haul connection across states

____ is a common form of audio compression. A. MP3 B. GIF C. JPEG D. MPEG

A. MP3

The National Science Foundation funded the creation of a new high-speed, cross-country network backbone called the ____. A. NSFnet B. DoDNET C. MILNET D. CampusNET

A. NSFnet

As you arrive home one evening after work, you realize you forgot to download some presentation files to your laptop, and you leave for a business trip early in the morning. What tool can you use to access your desktop this evening from home so you can transfer the files to your laptop without having to go back to your office? A. RDP B. SIP C. VoIP D. IoT

A. RDP

You are managing the network infrastructure for a large financial institution where real-time communication and rapid data exchange are critical. The company is evaluating routing protocols to ensure timely updates and efficient routing table transmissions. In this scenario, which routing protocol requires that routers transmit their routing tables every 30 seconds? A. RIP B. EIGRP C. OSPF D. IS-IS

A. RIP

As you're designing your network across multiple, private WAN connections, you realize you need to choose a secure routing protocol as your AS. Which of the following would NOT be a reasonable choice to consider? A. RIPv2 B. IS-IS C. BGP D. EIGRP

A. RIPv2

You need a predictable route between your home office's network and a branch office's network. What kind of routing can you use to ensure the same route is always used for messages crossing this connection? A. Static routing B. Dynamic Routing C. Distance vector routing D. Link state routing

A. Static routing

The IPv4 ____ field enables the network to discard a datagram that has been traveling the Internet for too long. A. Time to Live B. Service Type C. IP Options D. Total Length

A. Time to Live

_____ is a no-frills transport protocol that does not establish connections, does not attempt to keep data packets in sequence, and does not watch for datagrams that have existed for too long. A. User Datagram Protocol (UDP) B. Transport Control Protocol (TCP) C. Internet Control Message Protocol (ICMP) D. Network Address Translation (NAT)

A. User Data Protocol (UDP)

You are an IT administrator tasked with enhancing the remote work capabilities of your company's employees. As the demand for flexibility grows, you are exploring tools that allow remote workers to seamlessly switch between different operating systems on the same device. You are considering a specific tool to meet this requirement. Which tool could provide remote workers with multiple OSs on the same device? A. VDI B. IIoT C. CRM D. BYOD

A. VDI

The practice of making telephone calls over the internet has had several different names, including packet voice, voice over-packer, voice over the internet, Internet telephony, and _________. A. VoIP B. ATT C. Telnet D. FTP

A. VoIP

____ division multiplexing is a good technique for transmitting multiple concurrent signals over a fiber-optic line. A. Wavelength B. Synchronous time C. Statistical time D. Frequency

A. Wavelength

Public key cryptography utilizes ____ encryption. A. asymmetric B. non copyrighted C. open software D. symmetric

A. asymmetric

To allow multiple users to share a single medium, FDM assigns each user a separate ____. A. channel B. amplitude C. transmission code D. time slot

A. channel

Perhaps the most common form of protection from unauthorized use of a computer system are the ____. A. password B. certificates C. digital signature D. PKI

A. password

The ____ protocol has a limit of 15 hops between routers. A. routing information B. IS-IS C. OSPF D. enhanced interior gateway routing

A. routing information

Given the IPv6 address 6A3E:BA91::877B:FFEF/104, how many bits identify the host ID? A. 104 B. 24 C. 128 D. none

B. 24

Given the IPv4 address 162.48.128.0/24, how many addresses are available for the hosts? A. 64 B. 256 C. 512 D. 128

B. 256

The number of hosts bits of a class C IPv4 address is ______. A. 4 B. 8 C. 12 D. 16

B. 8

The number of network bits of a class ____ IPv4 address is 8 bits. A. D B. A C. B D. C

B. A

____ is the only routing protocol used across the open Internet and can span multiple autonomous systems. A. IS-IS B. BGP C. RIP D. OSPF

B. BGP

______ uses hashing and it is a key part for the implementation of cryptocurrencies. A. WPA2 B. Blockchain C. IAM service D. WEP

B. Blockchain

The ____ is a regulation defined and enforced by credit card companies themselves, not by any government agency. A. GDPR B. CCPA C. HIPAA D. PCI DSS

B. CCPA

Which technology can ensure no two devices on the same network have the same IP address? A. URL B. DHCP C. NAT D. DNS

B. DHCP

____ is the assignment of nonoverlapping frequency ranges to each "user" of a medium. A. Amplitude Division Multiplexing (ADM) B. Frequency division multiplexing (FDM) C. Transmission code multiplexing (TCM) D. Time division multiplexing (TDM)

B. Frequency division multiplexing (FDM)

The ____ is a regulation deployed by the EU (European Union) in 2018 applicable to any company doing business with a European citizen, which encompasses nearly every sizable business in the world) A. CCPA B. GDPR C. PCI DSS

B. GDPR

A ____ area network is typically confined to a single building or a couple floors within one building. A. Metropolitan B. Local C. Wide D. Personal

B. Local

If your computer doesn't know the IP address for a new website you want to visit, which device does it ask first for this information? A. Top-level DNS server B. Local DNS server C. Web server D. The websites DNS server

B. Local DNS server

The concept of two keys, public and private, is called ____ cryptography. A. Private key B. Public key C. Key two D. Symmetric

B. Public key

Envision yourself as the network architect for a research facility situated in a sprawling complex with a multitude of interconnected routers. The facility is exploring routing protocols to ensure efficient communication. In this scenario, which routing protocol, due to its limitations, becomes a critical consideration for planning the network topology, as it is restricted to a maximum of 15 hops? A. OSPF B. RIPv2 C. EIGRP D. BGP

B. RIPv2

A company currently has a telephone system and a separate system of LANs. It is thinking about converting its telephone system to VoIP and running both voice and data over the same LANs. Which of the following protocols will the company need to begin supporting on its LANs to accomplish this goal? A. FTP B. SIP C. HTTP D. NAT

B. SIP

____ cloud services have a greater security responsibility on the cloud services provider. A. IaaS B. SaaS C. Paas D. On-prem

B. SaaS

RIP has a 15 hops limit, and for its newer version (RIPv2), the hops limit is ____. A. Increased B. The same C. Decreased D. Variable

B. The same

ICMP is used by routers and other nodes to perform ____ for IP. A. Translation of addresses B. error reporting C. Domain name resolution D. Conversion analog-to-digital

B. error reporting

Many people consider keylogger to be a kind of ____. A. VPN B. malware C. Protocol D. Firewall

B. malware

A network that expands beyond a metropolitan area is a ____ area network. A. local B. wide C. personal D. metropolitan

B. wide

What is the network ID of the IPv4 address 172.16.54.198/24? A. 172 B. 172.16.54.198 C. 172.16.54 D. 172.16

C. 172.16.54

As the network administrator for a multinational corporation, you oversee a complex network infrastructure that spans various locations. Your routers receive multiple possible routes for the same network connection from three different routing protocols. In this scenario, what information will the router prioritize to choose the route it adds to its routing table? A. Overhead B. Autonomous system C. Administrative distance D. Convergence time

C. Administrative distance

Cable television is still one of the more commonly found applications of ____ multiplex technique. A. GSM B. TDM C. FDM D. WDM

C. FDM

You are a telecommunications engineer tasked with designing a high-capacity network infrastructure to accommodate the growing data needs of a research facility. The project involves the implementation of Wavelength Division Multiplexing (WDM) for optimal data transmission. In this scenario, what type of medium is required to support WDM? A. Wi-Fi B. Cellular C. Fiber D. Cable TV

C. Fiber

MANs are almost exclusively ____ networks, and thus capable of supporting data rates into the tens of millions and hundreds of millions of bits per second. A . twisted-pair B. copper-wired C. Fiber-optic D. coaxial-cable

C. Fiber-optic

Unlike OSPF, ____ can adapt to IPv6. A. GMS B. RIP C. IS-IS D. CDM

C. IS-IS

____ cloud services have a smaller security responsibility on the cloud services provider. A. On-prem B. Paas C. Iaas D. aaS

C. Iaas

____ is a way to increase the security of authentication tasks. A. SSO B. SoD C. MFA D. VPN

C. MFA

You are a telecommunications specialist responsible for designing a communication network for a busy broadcasting station. Your goal is to optimize the use of available bandwidth by exploring various forms of Frequency Division Multiplexing (FDM). In this scenario, you evaluate different examples to identify which one is NOT an instance of some variation of FDM. A. 5G B. CWDM C. MIMO D. Cable television

C. MIMO

Envision yourself as the chief technology officer for a bustling tech hub, responsible for optimizing communication in a shared workspace where multiple teams collaborate on various projects. With the goal of enhancing connectivity, you explore cutting-edge technologies. In this scenario, which technology relies on spatial multiplexing to carry on simultaneous conversations with multiple devices at one time? A. MIMO B. CWDM C. MU-MIMO D. CDMA

C. MU-MIMO

You are working on designing a comprehensive layered security plan for your organization's network. One such layer of your "Defense-in-Depth" solution would include the technology used to conceal a server's IP address from Internet-based attackers. Which technology from the list below describes this feature? A. DNS B. DHCP C. NAT D. URL

C. NAT

You are a telecommunications engineer tasked with designing a communication system for a densely populated urban area, where optimizing bandwidth is crucial. In this scenario, you are exploring various multiplexing techniques to efficiently transmit data. Which form of multiplexing uses overlapping frequency ranges to accommodate multiple communication channels simultaneously? A. GSM B. FDM C. OFDM D. CDM

C. OFDM

What information in the TCP header allows multiple, simultaneous conversations over a single connection? A. MAC address B. IP address C. Port number D. Traffic priority value

C. Port number

Which of the following is a responsibility of IP? A. Establish multiplexing B. Create a connection C. Route data across networks D. Implement flow control

C. Route data across networks

With ____ routing, routing tables are created once, typically when the network is installed, and then never updated again. A. Dynamic B. Adaptive C. Static D. Mobile

C. Static

____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer. A. DNS B. ARP C. Telnet D. FTP

C. Telnet

To minimize latency and buffering for Internet applications such as Netflix, what is the best transport layer protocol to support such traffic on the network? A. IP B. ARP C. UDP D. TCP

C. UDP

A(n) ____ is an application of tunneling protocol. A. MFA B. SoD C. VPN D. SSO

C. VPN

You are the network architect for a city that spans two Metropolitan Area Networks (MANs), each serving a specific region. The need arises for these two MANs to communicate seamlessly, facilitating efficient data exchange between municipal offices. In this scenario, what network type can connect these two MANs? A. CAN B. LAN C. WAN D. MAN

C. WAN

RIP has a ____ hops limit, unlike OSPF. A. 31 B. 7 C. 63 D. 15

D. 15

During the late 1960s, a branch of the U.S. government titled the ____ created one of the country's first wide area packet-switched networks. A. Department of Defense B. IEEE C. IETF D. Advanced Research Projects Agency (ARPA)

D. Advanced Research Projects Agency (ARPA)

Imagine you are the lead network engineer for an Internet Service Provider (ISP) responsible for ensuring efficient and reliable communication across the vast expanse of the internet. Your team is evaluating routing protocols to determine the most suitable for directing messages across the Internet. In this scenario, which routing protocol directs messages across the Internet? A. EIGRP B. RIP C. OSPF D. BGP

D. BGP

The ____ is the main telecommunications line through the network, connecting the major router sites across the country. A. ARPANET B. mid-level network C. Star Topology D. Backbone

D. Backbone

Imagine you are an IT consultant advising a large multinational corporation on network infrastructure options for their headquarters. The organization is focused on maintaining full ownership and control over its network equipment. In this scenario, with which network type does a single organization most likely own all the equipment? A. MAN B. SD-WAN C. WAN D. CAN

D. CAN

The most popular protocol to assign an IP address dynamically is called ____. A. DNS B. NAT C. UDP D. DHCP

D. DHCP

A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key. A. Certificate B. PKI C. Certificate authority D. Digital Signature

D. Digital Signature

When routing tables adapt to network changes, the routing system is called ____. A. Statistic B. Mobile C. Adaptive D. Dynamic

D. Dynamic

Envision yourself as the network administrator for a high-frequency trading firm where split-second decisions and ultra-fast data transmission are paramount. Your company is in the process of selecting a routing protocol that ensures the quickest convergence time for optimal performance. In this scenario, which routing protocol is most suitable for meeting the demanding requirements of rapid convergence? A. IS-IS B. OSPF C. RIPv2 D. EIGRP

D. EIGRP

Envision yourself as a network architect tasked with designing a reliable communication system for a critical infrastructure project. The project involves transmitting important messages across a network where unexpected events, such as power outages, could occur. In this scenario, what technique will ensure a message arrives at its destination even if a router along the path loses power? A. Best path B. Backup C. Multiplexing D. Failover

D. Failover

The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site. A. Domain Name Service (DNS) B. Internet Message Access Protocol (IMAP) C. Hypertext Transfer Protocol (HTTP) D. File Transfer Protocol (FTP)

D. File Transfer Protocol (FTP)

____ spread spectrum transmission bounces the signal around on seemingly random frequencies rather than transmit it on one fixed frequency. A. Direct Sequence B. Amplitude Sequence C. Time Hoping D. Frequency hopping

D. Frequency hopping

___ is an encrypted form of HTTP. A. SSH B. SHTTP C. SHS D. HTTPS

D. HTTPS

Which of the following components together form a socket? A. MAC address and IP address B. MAC address and port number C. IP address and packer number D. IP address and port number

D. IP address and port number

You are testing Internet name resolution from within your local network. You conduct your test using Google's DNS server is located at 8.8.8.8, which is a(n) ________. A. URL B. IPv6 address C. MAC address D. IPv4 address

D. IPv4 address

As a city planner in charge of implementing a smart traffic system to enhance efficiency and reduce congestion across urban areas, you are faced with choosing the most appropriate network type. The system involves coordinating traffic signals, collecting data from sensors, and optimizing traffic flow throughout the city. In this scenario, what network type is best suited to support a city-wide smart traffic system? A. WAN B. LAN C. CAN D. MAN

D. MAN

In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____. A. DoDNET B. CampusNET C. NSFnet D. MILNET

D. MILNET

______ is a technique that is very commonly used to compress video images. A. AAA B. JPEG C. MP3 D. MPEG

D. MPEG

____ lets a router represent an entire local area network to the Internet as a single IP address. A. ICMP B. ARP C. UDP D. NAT

D. NAT

While troubleshooting a network connection problem, Wireshark reports a lost packet to the IP address 6A3E:BA91:7221:0000:01FC:922C:877B:FFEF. What OSI layer does this address correspond? A. Data Link B. Network Access C. Application D. Network

D. Network

All wide area networks infrastructure are collections of ____ and interconnecting communication links. A. Users B. Switches C. Servers D. Nodes

D. Nodes

Envision yourself as the chief network architect for a multinational corporation with offices across the globe. Your team is working on optimizing the company's internet connectivity and routing strategy. In this scenario, as you delve into the intricacies of internet routing protocols, what type of protocol is BGP (Border Gateway Protocol)? A. Hybrid B. Link State C. Distance vector D. Path vector

D. Path vector

____ is data before any encryption has been performed) A. Cryptotext B. Ciphertext C. Criptext D. Plaintext

D. Plaintext

Imagine you are a network engineer tasked with optimizing the routing protocol for a large-scale corporate network. During this process, you are considering various factors that influence the determination of the best path for message transmission. In this scenario, which of the following is NOT a factor that a routing protocol might use to determine a message's best path? A. Traffic type B. Available bandwidth C. Number of hops D. Router brand

D. Router brand

When you send an email to your friend, which protocol handles the transfer of the data between your email server and your friend's email server? A. MIME B. IMAP4 C. POP3 D. SMTP

D. SMTP

Which of the following is NOT an advantage offered by IPv6 over IPv4? A. Better Security B. More efficient C. Faster Transmission D. Smaller header

D. Smaller header

You are a multimedia specialist working on a project to optimize the storage and transmission of digital content for a media production company. Your goal is to understand the underlying principles of compression technologies used in formats like MP3, JPEG, and MPEG. In this scenario, what characteristic in the data do MP3, JPEG, and MPEG all rely on to perform compression? A. The original data consists predominately of one symbol B. The percentage of reduction is not significant C. Most users have limited available bandwidth D. Some loss of data will not be noticed by the end user.

D. Some loss of data will not be noticed by the end user.

____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth. A. 3DES B. PKI C. AES D. Spread spectrum

D. Spread spectrum

The Hop Limit field in IPv6 is 8 bits long (the same size as the equivalent Time to Live field in IPv4). Given that this hop count is reduced each time an IP packet enters a router, what are the implications of having such a small field size? A. The size of the packer is limited B. The size of the packet's payload is limited C. The packet's latency to its destination is limited D. The number of possible hops is limited

D. The number of possible hops is limited

SSL's successor is ____, which is based upon SSL version 3 and contains a few technical improvements over SSL. A. Advanced Encryption Standard (AES) B. Data Encryption Standard (DES) C. IPsec D. Transport Layer Security (TLS)

D. Transport Layer Security (TLS)

A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet. A. IP address version 6 (IPv6) B. IP address version 4 (IPv4) C. Domain Name Service (DNS) D. Uniform Resource Locator (URL)

D. Uniform Resource Locator (URL)

When something on the network changes, such as a failure or a configuration change, routers must identify the change and adjust their routes, the time it takes for this to happen is called ____ time. A. rerouting B. reconfiguration C. overhead D. convergence

D. convergence

Considering the hypothetical URL (https://www.cengage.com/student/pages/web)htm), which part is the scheme? A. www.cengage.com B. web)htm C. /student/pages D. https://

D. https://

Imagine you are the lead network engineer for a large-scale enterprise, and your company is adopting OSPF (Open Shortest Path First) as the preferred routing protocol for its intricate network architecture. In this scenario, as you explain OSPF to your team, how does OSPF advertise its routing information? A. it measures the delay or cost to each neighboring router B. It floods other routers with its entire routing table every 30 seconds C. it listens for update requests from each of its neighbors D. it floods other routers with link state packers when something changes

D. it floods other routers with link state packers when something changes

A social engineering attack is a common way to compromise ____. A. Software B. accounts C. availability D. users

D. users


Conjuntos de estudio relacionados

Unit 5: Civil War/Reconstruction

View Set

De + definite article and family members

View Set

SIE: Options (Equity/Stock Options)

View Set

Nationalism & Economic Development (1816-1848)

View Set

JROTC thinking and learning skills

View Set

The People and the Australian Constitution - Unit 4 AOS 1B

View Set

VARSITY TUTOR MCAT SOCIAL AND BEHAVIORAL SCIENCES PRACTICE TEST

View Set