CMIS 468 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is true?

"Handoff" means the same thing in cellular and 802.11 networks.

A router will discard a packet if the TTL value reaches ________.

0

The version number field in IPv6 has the value ________.

0101

If someone says that a 1-bit flag is set, this means that it is given the value ________.

1

In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches?

1

If the sending host does not do MTU discovery, the largest packet it can send is ________.

1,280 octets

Which of the following already runs to nearly all customer premises?

1-pair VG UTP

Which of the following is in Frame Relay's speed range?

10 Mps

Which of the following is a private IP address range?

10.x.x.x.

Which of the following is a fractional T1 line speed?

128 kbps

How many DNS root servers are there?

13

In the mask /14, how many 1s are there?

14

According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s).

2

E1 leased lines run at a speed of about ________.

2 Mbps

If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________.

2001:::00fe::cdef

In the mask 255.255.255.0, how many 1s are there?

24

T1 leased lines run at a speed of about ________.

250 kbps

Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /14 and the reliability metric 10. Which row will the router choose if both are matches?

2707

Row 2707 has the mask /16 and the speed metric 20. Row 4400 has the mask /16 and the speed metric 10. Which row will the router choose if both are matches?

2707

Deciding how to send the packet back out is Step ________ in the routing process.

3

A mask has ________ bits.

32

The total length of an IP address is ________ bits.

32

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?

32 bits

For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access?

3G

HSPA+ is a ________ service.

3G

A firm uses a PSDN. It has four sites. How many leased lines will it need?

4

For human reading, symbols in IPv6 addresses are written in groups of ________.

4

How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

4

The main version of Internet Protocol in use today is IP version ________.

4

The new version of Internet Protocol that is coming into use is IP version ________.

6

In an IPv6 global unicast address, the interface ID is ________ bits long.

64

Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have?

65,534

In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?

7

The network part of an IP address is ________ bits long.

8

For ADSL service, which of the following typically must be added to the telephone system?

A DSLAM

In ADSL, the residential customer needs a(n) ________.

ADSL modem

Which of the following is an attraction of cloud SaaS?

All of These

Which of the above is NOT an element in a network management system?

All of these ARE elements in network management systems

Which of the following is not an issue for cloud Software as a Service?

All of these are issues for cloud Software as a Service

Which of the following is not an issue for cloud utility computing?

All of these are issues for cloud utility computing

Which of the following offers more reliable antivirus protection?

Antivirus software on the mail server

Users are primarily concerned about the ________ layer.

Application

Leased lines standards are most different around the world at speeds ________.

Below about 50 Mbps

The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power.

BitTorrent

In the United States, to get a leased line of at least 2.5 Mbps. Your access line would be ________.

Bonded T1s

Which of the following is true?

Both A Web service is one way to implement a SOA and SOAP is one way to implement a Web service

To configure itself, a client PC running IPv6 can configure itself using ________.

Both DHCP and stateless autoconfiguration

Which of the following is a security risk associated with BitTorrent?

Both Danger caused by opening TCP ports on the firewall and Danger that an employee may download an infected file

Why is metro Ethernet popular?

Both Familiarity and Rapid reprovisioning

To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination host's ________ before the router can send the packet on to the destination host.

Both IP address and data link layer address

The encapsulating security protocol can be used in ________.

Both IPv4 and IPv6

Which of the following is true about NAT?

Both It can enhance security and It presents problems for some protocols

Why is metro Ethernet popular?

Both It uses a familiar technology and It has attractive prices

In SOA, what language can be used to create service objects?

Both Java and C++.

Which of the following go from one customer site to another customer site?

Both Leased lines and Access lines

Which of the following would be an SNMP object?

Both Number of rows in routing table and System uptime (since last reboot)

Which of the following can be used within a firm?

Both Private IP addresses and Public IP addresses

Which of the following steps in Skype is done P2P?

Both Signaling and Transport

________ operates at the transport layer.

Both TCP and UDP

Which of the following is a factor that has contributed to the popularity of cloud computing?

Both The Internet and Web services

Which of the following is contributing to the exhaustion of IPv4 addresses?

Both The growing number of hosts in Asia and The growing number of mobile devices

The default row ________.

Both always has the mask /32 and will always match the IP address of an incoming packet

Stateless autoconfiguration can be used to ________.

Both change all subnet IDs in a network and change all routing prefixes in a network

Speech codecs vary with respect to ________.

Both compression and voice quality

The encapsulating security protocol offers ________.

Both confidentiality and authentication

An MTSO ________.

Both controls cellsites in a cellular system and links mobile users to wired telephone customers

ARP is used to find the destination data link layer destination addresses of ________.

Both destination hosts and routers

The router advertisement protocol may ________.

Both give the client a routing prefix and give the client a subnet ID

SaaS software vendors may make an application available by ________.

Both hosting it on their own webservers and allowing the application to be downloaded to the consumer device

The domain name system ________.

Both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet

Leased line switched WANs typically use ________.

Both leased lines and a router at each site

Label-switching routers provide ________.

Both lower cost and the ability to do traffic engineering

If a company runs its own data center, it might face problems with ________.

Both overprovisioning and underprovisioning

IPsec is used for ________ VPNs.

Both remote-access and site-to-site

SOAs are attractive because of ________.

Both reuse and language independence

A media gateway translates ________ transmissions.

Both signaling and transport

In ADSL, the customer should have ________.

Both splitters and an ADSL modem

In TCP/IP, routing means ________.

Both the process that routers use to forward incoming packets and the process that routers use to exchange routing table information

Antivirus software checks e-mail attachments for ________.

Both viruses and Trojan horses

Which of the following DSL services tend to be symmetric in speed?

Business

Which of the following DSL services usually offers QoS guarantees?

Business

If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________.

CDMA

In cellular technology, a ________ is a small geographical area.

Cell

Which of the following are usually given dynamic IP addresses?

Clients

Which of the following does the carrier NOT own?

Customer premises equipment

Clients normally get their IP addresses from ________.

DHCP servers

________ servers provide ________ IP addresses to clients.

DHCP, dynamic

________ is a general naming system for the Internet.

DNS

Stateless autoconfiguration makes more sense for ________.

Dual-Stack Hosts

Which of the following can route non-IP packets?

EIGRP

The management information base (MIB) is a(n) ________.

Either schema or actual database

LANs are ________.

Either single networks or internets

WANs are ________.

Either single networks or internets

In ________, switching decisions are based on destination addresses.

Ethernet

There is a row for each address in a(n) ________.

Ethernet switch table

A(n) ________ must find the best-matching row in its ________ table by comparing several row matches.

Ethernet switch, switching

The IEEE calls 64-bit interface addresses ________.

Extended Unique Identifiers

A TCP ________ segment is a request to close a connection.

FIN

Four-way closes use ________ segments

FIN

Which of the following segments is not acknowledged?

FIN

A router has to go through the ARP process each time it needs to send a packet to a destination host or to a next-hop router.

False

A row in a routing table has the destination 10.8.0.0 and the mask /24. It is a match for 10.8.6.7.

False

An autonomous system can freely select the exterior dynamic routing protocol it will use.

False

Border router's main job is to connect different subnets in the same network.

False

ICMP error advisement messages add reliability to IP.

False

In a routing table, a row is a route for a single IP address.

False

Routers know the difference between network and subnet masks.

False

The default row will never be selected as the best match row.

False

UDP is reliable.

False

Compared to normal routing, decision caching is ________.

Faster

Which of the following is an attraction of cloud utility computing?

Flexibility

Which of the following offers speeds that match speed range of greatest corporate demand for WAN transmission?

Frame Relay

Skype offers ________.

Free calling among Skype customers

In SNMP, the manager can create ________.

GET commands

In SNMP, companies are often reluctant to use ________ commands because of security dangers.

Get

Which of the following is used in webpage bodies?

HTTP

Which of the following is used to retrieve Web pages?

HTTP

Which element of the Skype network is in charge of transport?

Host Nodes

Which is not one of the three parts of a public IPv6 unicast address?

Host part

An IPv4 packet's protocol field value is 1. The data field contains a(n) ________ message.

ICMP

________ is used for supervisory messages at the internet layer.

ICMP

Which of the following is connectionless?

IP

________ operates at the internet layer.

IP

Which has stronger security?

IPsec

Which of the following standards provides for central management?

IPsec

Which of the following allows routers to check for errors in the header when a packet arrives?

IPv4

Which of the following permits fragmentation by routers along a packet's route?

IPv4

The neighbor advertisement protocol message was created to give the ________ address of the host sending the message.

IPv6

What does a router do with ARP request messages?

It broadcasts them

A company has more control over its ________ technology.

LAN

A network that runs on the customer premises is a ________.

LAN

According to the ITU, which of the following can be advertised as 4G?

LTE

On what full 4G standard are carriers converging?

LTE Advanced

Which of the following offers true 4G speeds?

LTE Advanced

Which of the following usually offers higher speeds?

MANs

________ is a standard to describe a file's format type.

MIME

VoIP users have ________ in their phones or on their computers.

Media Gateways

________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm.

NAT

According to the ITU, which of the following offers true 4G speeds?

Neither LTE nor HSPA+

Login is done P2P (instead of using servers) in ________.

Neither Skype nor traditional VoIP

Transport is done using servers (not P2P) in ________.

Neither Skype nor traditional VoIP

TCP is ________.

Neither connectionless nor unreliable

IP is made reliable through ________.

Neither echo and echo reply messages nor error advisement messages

ATM ________.

Neither offers speeds in the range of greatest corporate demand nor is relatively inexpensive

In coaxial cable, the two conductors ________.

Neither run side-by-side nor are twisted around each other

In DNS servers, the IPv6 address of a host is contained in the ________ record.

None of These

How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

None of these

If your subnet part is 8 bits long, you can have ________ subnets.

None of these

In a network mask, the 1s correspond to the ________.

None of these

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?

None of these

Which interior dynamic routing protocol is good for large internets?

OSPF

What transmission medium do ALL DSL services use?

One-pair voice-grade UTP

Local loop access lines to business use which of the following transmission media?

Optical Fiber

Transient client presence tends to be a problem in ________.

P2P Applications

In a PSDN, companies connect to the network core at ________.

POPs

Which of the following is not one of the main elements of the Skype network?

Proxy server

Which TCP/IP interior dynamic routing protocol is good for small internets if security is not a serious concern?

RIP

________ is an interior dynamic routing protocol.

RIP

Codec data comes after the ________ header in VoIP transport frames.

RTP

Which of the following DSL services does not offer QoS guarantees?

Residential

For 100,000 addresses, which will have fewer rows?

Router table

Which of the following is a processor-sharing application?

SETI@home

Which of the following is likely to dominate in VoIP?

SIP

Mail servers communicate with each other by using ________.

SMTP

Which is less expensive to implement?

SSL/TLS

In cloud ________, the user accesses the software over the Internet, often with a browser.

SaaS

Corporations most wish to have ________ domain names.

Second-Level

Which of the following steps in Skype is done P2P?

Signaling

Which of the following is one of the three parts of an IP address?

Subnet Part

Which element of the Skype network is in charge of signaling?

Super Nodes

Fragmentation is ________.

Suspicious because it is often used by hackers

Which of the following are more widely used?

T1 lines

Which of the following can handle an application message that is one megabyte in size?

TCP

Which of the following is reliable?

TCP

In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at last when trying to find matches?

The default row

In BitTorrent, a(n) ________ is a server that coordinates the file transfer.

Tracker

Converting networks to support IPv6 is relatively simple and inexpensive.

True

If the ACK bit is set, the acknowledgment number field MUST have a value.

True

In IPv6, routers usually only have to consider the hop-by-hop options extension header.

True

TCP is reliable

True

The next-hop router in the default row is called the default router.

True

The time to live field in IPv4 has the same basic function as the hop limit field in IPv6.

True

To handle internetwork transmission control tasks that the IP protocol cannot handle, the IETF created TCP.

True

When a network mask is applied to any IP address on the network, the result is the IP address' network part followed by zeros.

True

When a packet arrives, the router should look for matches in ALL rows in the routing table.

True

Which mode of IPsec is more expensive?

Tunnel Mode

The purpose of ________ is to help someone to find an appropriate service object.

UDDI

For the transport layer, VoIP uses ________ for transport transmission.

UDP

Which header comes SECOND in a VoIP transport packet?

UDP

Which of the following is connectionless?

UDP

E-mail bodies that have non-English text use ________.

UNICODE

Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?

Underutilized processing capacity of client PCs

If most P2P applications use facilitating servers, why do we still call them peer-to-peer?

User computers do most of the work.

Which of the following is not an issue for cloud utility computing?

Very high costs

The Internet is a ________.

WAN

Which of the following has more diversity in technologies?

WANs

The purpose of ________ is to allow a calling program to understand how to use a service object.

WDSL

In the IPv4 address 1.2.3.4, what is the network part?

We cannot say.

Which of the following is true?

Web service is one way to implement a SOA

________ use ________ that provide services to customers using WWW interaction standards.

Web services, service objects

Which of the following allows you to read your e-mail easily on an Internet cafés computer?

Web-enabled email

In SOA, SOAP messages are encoded in ________.

XML

If you are using a Web-enabled e-mail system ________.

You access and send mail by using a Web Browser

SNMPv3 uses ________ for authentication.

a different password for each manager-agent pair

A company receives its domain name from ________.

a domain registrar

When a cellular customer moves from one cell in a city to another cell in the same city, this is ________.

a handoff

Service quality issues with the Internet can be addressed by using ________.

a single ISP

Combining multiple WAN technologies into a collectively managed system is called having ________.

a virtual WAN

In SNMP, the ________ creates responses.

agent

In SNMP, the ________ creates traps.

agent

In SNMP, the manager communicates directly with a(n) ________.

agent

The way in which application layer functions are spread among computers to deliver service to users is called ________.

an application architecture

IPsec protects ________ layer messages.

application

The PSDN transport core normally is drawn as a cloud ________.

because customers do not need to care about what is inside it

One-bit fields are called ________ fields.

binary

In HTTP response messages, the attached file is preceded by a ________.

blank line

In HTTP, fields normally are ended by a ________.

carriage return/line feed

VoIP uses ________ switching.

circuit

In ________ file retrieval, your computer downloads a file from a server.

client/server

For their transmission medium, cable television companies primarily use ________.

coaxial cable

In HTTP, keywords usually are followed by a ________.

colon (:)

SNMPv1 uses ________ for authentication.

community names

Companies use carriers for WAN transmission because ________.

companies lack rights of way

The first Step in the Routing process involves ________.

comparing the packet's destination IP address to all rows

UDP is ________.

connectionless

Two-way amplifiers are needed for cable ________ service.

data

The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________.

destination host

The Skype protocol is relatively ________ for corporate firewalls to filter.

difficult

In Skype, ________ is the process where a Skype application looks up the username and IP address of the party it wants to contact.

directory search

In DNS, a group of resources under the control of an organization is called a ________.

domain

In MPLS, the interface to send the packet back out will be decided ________.

during the router's routing process

Pinging sends ICMP ________ messages to the target host.

echo

To see if a target host can be reached, you normally would send it an ICMP ________ message.

echo

In IPv6, the payload length gives the number of octets in the ________.

entire packet minus the main header

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.

fffe

In NAT, the ________ creates new external source IP addresses and port numbers.

firewall

In MPLS, the ________ adds the label to the packet.

first label-switching router

The router advertisement protocol may ________.

forbid the use of stateless autoconfiguration

Access to a router is needed to create a ________.

global unicast IPv6 address

According to the IETF standards, if a router receives a series of packets from the same IP address to the same IP address, it should ________.

go through the entire process for each packet

If a host to be able to communicate via IPv4 and IPv6, it is said to ________.

have a dual stack

For human reading, IPv6 address are written in ________.

hexadecimal

The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.

higher cost

In packet fragmentation and reassembly, the ________ field is used.

identification

Metropolitan area Ethernet is used primarily ________.

in MANs

In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files.

index

The part of an IPv6 global unicast address that designates the host is called the ________.

interface ID

Routers send packets out ________.

interfaces

An autonomous system is free to select whatever ________ dynamic routing protocol it wishes.

interior

IPsec is a(n) ________ layer standard.

internet

Variability in time delays between successive packets in a transport stream is called ________.

jitter

RTP supports ________.

jitter control

Label-switching routers base their decisions on a packet's ________.

label number

In MPLS, the packet travels along the ________.

label-switched path

A WAN is a network that ________.

links different sites together

For human reading, in IPv6 addresses, letters should be written in ________.

lowercase

In SNMP, the ________ creates commands.

manager

Routers usually are connected in a ________ topology.

mesh

The routing prefix in IPv6 is like the ________ part in an IPv4 address.

network

In a network mask, the 1s correspond to the ________.

network part

Carrier access lines to residential buildings typically use ________.

one-pair voice-grade UTP

Today, it is problematic to have ________.

only a single IPv6 stack

In tunnel mode, IPsec provides protection ________.

only between the IPsec servers

SONET/SDH lines use ________.

optical fiber

RFC 822 and RFC 2822 standards govern ________.

plain text content of e-mail messages

Leased lines are ________.

point-to-point lines between two premises

The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________.

protection over only part of the route

In an IPv4 packet, the ________ field value tells the type of message contained in the IP packet's data field.

protocol

A LAN is a network that ________.

provides services within a site

The use of virtual circuits ________.

reduces costs

The code "200" may be found in HTTP ________ messages.

response

When a cellular customer moves from one city to another, this is ________.

roaming

Having all privileges on a computer is known as having ________.

root privileges

The highest-level DNS servers are called ________.

root servers

For a given volume of traffic, which are more expensive?

routers

Dynamic ________ protocols allow routers to transmit routing table information to one another.

routing

When a router forwards incoming packets closer to their destination hosts, this is ________.

routing

Fiber to the home service is normally created by ________.

running optical fiber to neighborhoods

DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve.

scopes

In IPsec, agreements about how security will be done are called ________.

security associations

TCP messages are called ________.

segments

Cells are used in cellular telephony to provide ________.

service for more customers

In SOA, calls are placed to ________.

service objects

SIP is a ________ protocol for VoIP.

signaling

NAT enhances security by preventing ________.

sniffers from learning internal IP addresses

Servers are normally given ________ IP addresses.

static

An internal router only connects different IP ________.

subnets

The use of options in IP is ________.

suspicious because they are often used by hackers

In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________.

swarm

LAN speeds are faster than WAN speeds. This is because of ________.

technological limitations

The advance that made the client/server application architecture possible was ________.

the Internet

Using the Internet as a WAN is attractive because of ________.

the Internet's low cost per bit

A traditional e-mail user sending messages to his or her mail server would most likely use ________.

the SMTP standard

The main benefit of IPv6 over IPv4 is ________.

the ability to support more possible hosts

".com" is a ________.

top-level domain

".edu" is a ________.

top-level domain

Signaling is done using servers (not P2P) in ________.

traditional VoIP

Client PCs must have digital certificates in ________.

transport mode

A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard.

trap

Low-speed leased lines use ________ transmission lines to the customer premises.

two-pair data-grade UTP

In stateless autoconfiguration, providing the address of DNS servers is ________.

unnecessary

In ________, a company offloads server processing work to another company at a remote site.

utility computing

Frame Relay frames contain ________.

virtual circuit numbers

In virtualization, the real computer's capacity is divided among a number of ________.

virtual machines

A router must use the ARP process ________.

whenever it forwards an IP packet to a host that is not in its ARP cache


Conjuntos de estudio relacionados

Chapter 5 The Circulatory System

View Set

BSC2085L - Appendicular Skeleton

View Set

115 PrepU Chapter 31: Assessment of Immune Function

View Set

Chapter 13 - Central Nervous System Stimulants and Related Drugs

View Set

(3) HIS: Philippine Health Policies and Initiatives

View Set

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPPA)

View Set