IS 435 FINAL

¡Supera tus tareas y exámenes ahora con Quizwiz!

In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packets IP address. Which row will the router look at first when trying to find matches? 1 47 3497 the default row

1

T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps

1 Mbps

Which of the following already runs to nearly all customer premises? A) 4-pair UTP B) 1-pair VG UTP C) 1-pair DG UTP D) none of the above

1 pair VG UTP

Many "T1" lines that carriers provide today use ________ in the local loop. A) 1-pair voice-grade UTP B) 2-pair voice-grade UTP C) 1-pair data-grade UTP D) 2-pair data-grade UTP

1 pair voice grade UTP

If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef 2001:::fe::::cdef 2001::fe::::cdef

2001:::fe::::cdef

In the Mask 255.255.255.0 how many 1s are there? 8 16 24 Cant say

24

Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. Which row will the router choose if both are matches? 2707 4400 either The default row

2707

According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s). A) 1 B) 2 C) 3 D) 4

3

What speed does the LTE Advanced standard require downstream? A) 3 Mbps B) 30 Mbps C) 3 Gbps D) 30 Gbps

3 GBPS

A firm uses a PSDN. It has four sites. How many leased lines will it need? A) 0 B) 1 C) 4 D) none of the above

4

How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A) 3 B) 4 C) 88 D) 91

4

Most end-office switches are Class ________ switches. A) 1 B) 2 C) 3 D) 5

5

The new version of the internet protocol that is coming into use is IP version _____ 1 2 4 6

6

Your firm has an 8 bit network part. If you need at least 250 subnets, what must your subnet part size be? 5 6 7 8

8

In what ode of 802.11i operation is a central authentication server used? 802.1X mode PSK mode Both Neither

802.1X

In caching, ________. A) a message may not have to be transmitted B) messages are cached at the transmitting end of the line C) both A and B D) neither A nor B

A message may not have to be transmitted

In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B

ADSL modem

The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture

AN application architecture

Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) quality of service D) all of the above

All of the above

Which of the following is a risk in 802.11i PSK mode? WPS can easily be cracked if its used Unauthorized sharing of the preshared key A weak passphrase may be selected All of the above

All of the above

A router's load-balancing process is determined by ________. A) the SDN controller B) an SDN application C) the router D) any of the above

An SDN application

In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above

Before the packet arrives

The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power. A) BitTorrent B) client/server C) both A and B D) neither A nor B

BitTorrent

Which of the following was created for PANs? 802.11 Bluetooth Both neither

Bluetooth

To connect two sites at 2.8 Mbps, I would use ________. A) a T1 line B) bonded T1 lines C) a T2 line D) a T3 line

Bonded T1 lines

802.11i provides _______ confidentiality message integrity both neither

Both

A media gateway translates ________ transmissions. A) signaling B) transport C) both A and B D) neither A nor B

Both

An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B

Both

Antivirus software checks e-mail attachments for ________. A) viruses B) Trojan horses C) both A and B D) neither A nor B

Both

DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B

Both

Forwarding functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

Both

In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) both A and B D) neither A nor B

Both

SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B

Both

Speech codecs vary with respect to ________. A) compression B) voice quality C) both A and B D) neither A nor B

Both

The SIP invite is transmitted to the ________. A) called party's SIP proxy server B) called party's VoIP phone or computer C) both A and B D) neither A nor B

Both

The domain name system ________ a way to find a host IP addresses if your computer only knows the hosts host name general naming system for the internet both neither

Both

Traffic shaping ________. A) limits the amount of some types of traffic B) does not admit some types of traffic C) both A and B D) neither A nor B

Both

WAN optimization provides ________. A) network protocol acceleration B) caching C) both A and B D) neither A nor B

Both

Which of the following affects what throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B

Both

Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B

Both

Which of the following is a security risk associated with BitTorrent? A) danger caused by opening ports on the firewall B) danger that an employee may download an infected file that cannot be rejected by filtering C) both A and B D) neither A nor B

Both

Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B

Both

Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B

Both

Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B

Business

Which of the following DSL services usually offers QoS guarantees? A) residential B) business C) both A and B D) neither A nor B

Business

Two-way amplifiers are needed for cable ________ service. A) television B) data C) both A and B D) neither A nor B

Data

After two wireless clients authenticate themselves via PSK to an access point, they will use _______ to communicate with the access point. preshared key 802.1X key WPS keys different session keys

Different session keys

In Skype, ________ is the process where a Skype application looks up the username and IP address of the party it wants to contact. A) login B) directory search C) transport D) signaling

Directory search

In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B

E-Line

LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons

Economic reasons

LANs are ________. A) single networks B) local internets C) either A or B D) neither A nor B

Either A or B

WANs are ________. A) single networks B) internets C) either A or B D) neither A nor B

Either A or B

A traditional e-mail user retrieving messages from his or her mail server could use ________. A) IMAP standard B) POP standard C) either IMAP or POP standard D) SMTP standard

Either IMAP or POP standard

A media gateway connects a client computer or VoIP phone to the VoIP network. TRUE/FALSE

FALSE

If companies place antivirus software on all of their client PCs, this will stop almost all virus infections. TRUE/FALSE

FALSE

Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software. TRUE/FALSE

FALSE

A TCP _______ segment is a request to close a connection. FIN ACK Close Disconnect

FIN

Leased lines offer ________ service. A) fast B) any-to-any C) rapid-connection D) none of the above

Fast

Compared to ADSL service, cable modem service typically is ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive

Faster and more expensive

In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B

First label switching

Skype offers ________. A) free calling among Skype customers B) free calling to and from Public Switched Telephone Network customers C) both A and B D) neither A nor B

Free calling among skype customers

Which of the following is used to define webpage bodies? A) HTTP B) HTML C) both A and B D) neither A nor B

HTML

Which of the following is used to retrieve Web pages? A) HTTP B) HTML C) RTP D) SQL

HTTP

The network part of a n IPv4 address is ______ bits long. 8 16 32 Hard to say

Hard to say

The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B

Higher speed

In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files. A) swarm B) index C) tracker D) none of the above

Index

BitTorrent's .torrent files are stored on the ________. A) swarm B) index server C) tracker D) individual peers

Index server

The part of an IPv6 global unicast address that designates the host is called the _______ Host part interface ID routing prefix None

Interface ID

Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B

Internet

RTP supports ________. A) faster transmission speed B) jitter control C) both A and B D) neither A nor B

Jitter control

A company has more control over its ________ technology. A) LAN B) WAN

LAN

A network that runs on the customer premises is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

LAN

Which of the following usually offers higher speeds? A) LANs B) WANs C) Both A and B are about equal in typical speeds.

LANs

Today's dominant cellular technology is ________. A) LTE B) 3G C) HSPA+ D) MTSO

LTE

MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B

Label number

In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path

Label switch path

Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B

Leased lines

A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above

Links different sites together

In the telephone system, the lines that connect customers to the nearest switch are called the ________. A) access lines B) local lines C) access loop D) local loop

Local loop

Which of the following steps are done in order during a call with Skype? A) login, signaling, transport B) signaling, transport, end a call C) login, signaling, end a call D) none of the above

Login, signaling, transport

The PSN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop

Modified hierarchy

In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) both A and B D) neither A nor B

Neither

In a network mask, the 1s correspond to the ______. network part subnet part host part None

Network part

In the mask /14, how many 1s are there? 8 16 24 None

None

Which is the correct formula for decibels? 10*PS/P1 10*(P2/P1)2 Log10(P2/P1) None

None

How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A) 1 B) 2 C) 3 D) none of the above

None of the above

Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

Northbound API's

Wireless LAN standards come from ______ OSI TCP/IP Both Neither

OSI

______ is an interior dynamic routing protocol. OSPF BGP Both Neither

OSPF

Which of the following provides end-to-end encryption? A) SSL/TLS B) PGP C) both A and B D) neither A nor B

PGP

A customer's leased line to its ISP connects to the ISP's ________. A) POP B) NAP C) CSU/DSU D) interface

POP

In a PSDN, customers connect to the network core at ________. A) NAPs B) public/private access points C) POPs D) DSLAMs

POP's

In 802.11i ______ hosts must know a shared initial key. 802.1X mode PSK mode Both Neither

PSK

Transient client presence tends to be a problem in ________. A) P2P applications B) client/server applications C) both A and B D) neither A nor B

PSP applications

A LAN is the network that ________. A) links different sites together B) provides service within a company C) provides service within a site D) all of the above

Provides service within a company.

Which of the following is NOT one of the main elements of the Skype network? A) login server B) proxy server C) host node D) super node

Proxy server

Which of the following segments is not acknowledged? FIN RST Both Neither

RST

Codec data comes after the ________ header in VoIP transport frames. A) IP B) TCP C) UDP D) RTP

RTP

MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces

Reduces

SDN ________. A) reduces CapEx B) increases OPEx C) both A and B D) neither A nor B

Reduces CapEx

An unauthorized internal access point is an _________ access point. Evil twin rogue shadow counterfeit

Rogue

Having all privileges on a computer is known as having ________. A) access B) omniscience C) root privileges D) mojo

Root privileges

A _____ must find the best matching row in its _____ table comparing multiple row matches. Ethernet switch, switching router, routing both neither

Router, routing

Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) both A and B D) neither A nor B

Running optical fiber to neighborhoods

The highest layer in SDN consists of ________. A) switches B) routers C) the SDN controller D) SDN applications

SDN applications

Which of the following is a processor-sharing application? A) BitTorrent B) SETI@home C) SIP D) Skype

SETI@home

Which of the following signaling standards is likely to dominate in VoIP? A) SIP B) H.323

SIP

SIP is a ________ protocol for VoIP. A) signaling B) transport C) both A and B D) neither A nor B

SIgnaling

Mail servers communicate with each other by using ________. A) POP B) HTTP C) RFC 2822 D) SMTP

SMTP

A traditional e-mail user sending messages to his or her mail server would most likely use ________. A) IMAP standard B) POP standard C) either IMAP or POP standard D) SMTP standard

SMTP standard

In XSS, the malicious script that gets placed in a webpage sent to a target is ________. A) created by a Trojan horse B) sent by someone who has compromised the webserver C) embedded in a database the user queries D) sent by a user

Sent by the user

Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above

Service for more customers

OpenFlow can be used to standardize ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

Southbound API's

Which element of the Skype network is in charge of signaling? A) the login server B) host nodes C) super nodes D) media gateways

Super nodes

In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________. A) swarm B) index peers C) trackers D) none of the above

Swarm

Which element of the Skype network is in charge of transport? A) the login server B) the calling and called host nodes C) super nodes D) media gateways

THe calling and called host nodes

Most P2P applications use servers. TRUE/FALSE

TRUE

In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manage

The SDN controller

IPsec protects ______ layer messages data link applicaiton both neither

application

For human reading, IPv6 fields are spearated by ______ dashes slashes colons None

colons

The first step in the routing process involves _____ selecting the best match row comparing the packets destination IP address to all rows comparing the packets destinatino IP address to matching rows selecting an interface

comparing the packets destination IP address to all rows

Pinging is to send ICMP ______ messages to the target host echo request error advisement ping echo

echo request

Which of the following is usually set up by a hacker outside the building? Rogue access point evil twin access point both neither

evil twin access point

Compared to normal routing, decision chaching is ______ faster less dangerous Both

faster

After selecting a row on a routing table, a router will send packets out to the ______ port socket interface plug

interface

Router connectors are called ________. sockets plugs interfaces ports

interfaces

Routers usually are connected in a ______ topology. Point to point mesh hierarchical bus

mesh

What transmission medium do ALL DSL services use? A) one-pair data-grade UTP B) two-pair data-grade UTP C) one-pair voice-grade UTP D) all of the above

one pair voice grad UTP

RFC 822 and RFC 2822 standards govern ________. A) plain text content of e-mail messages B) HTTP page contents C) HTML page contents D) pages written in any language

plain text content of email messages

The main promise of VoIP is to ________. A) add video B) improve voice quality C) improve reliability D) reduce cost

reduce cost

Centralized access point management _______. increases management costs but provides better control reduces management costs

reduces management costs

When a router forwards incoming packets closer to their destination hosts, this is _____. routing switching bridging relaying

routing

The attack on GHOSTNET began with ________. A) a wireless vulnerability B) a social engineering attack C) malicious mobile code D) an insider attack

social engineering attack

Which of the following is one of the three parts of an IPv4 address? subnet part mask both neither

subnet part

An internal router only connects different IP ______ Subnets networks Both Neither

subnets

VoIP ________ uses the Internet Protocol for transmission. A) always B) usually C) seldom D) never

alwahys

Which of the following offers more reliable antivirus protection? A) antivirus software on user PCs B) antivirus software on the mail server C) Both A and B are about equally reliable.

Antivirus software on the mail server

Users are primarily concerned with the ________ layer. A) application B) transport C) internet D) physical

Applications

DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B

Asymmetric speed

WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the PSDN carrier D) by the ISP

At the ends of leased lines

To use a leased line, the customer requires a(n) ________ at each site. A) switch B) router C) CSU/DSU D) modem

CSU/DSU

The PSDN technology that is growing rapidly today is ________. A) Frame Relay B) Carrier Ethernet C) the Internet D) No PSDN technology is growing rapidly today.

Carrier Ethernet

In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B

Cell

In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier

Cellsite

The advance that made the client/server application architecture possible was ________. A) the Internet B) client processing power C) application sophistication D) input/output methods

Client processing power

In ________ file retrieval, your computer downloads a file from a server. A) P2P B) client/server C) BitTorrent D) none of the above

Client/server

For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP

Coaxial cable

VoIP users have ________ in their phones or on their computers. A) media gateways B) codecs C) both A and B D) neither A nor B

Codecs

Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) both A and B D) neither A nor B

Companies lack rights of way

The Trojan horse placed on the first compromised GHOSTNET client could ________. A) conduct audio and video surveillance B) delete files C) both A and B D) neither A nor B

Conduct audio and video surveillance

The creation of routing tables for a router is an example of ________. A) forwarding B) control C) both A and B D) neither A nor B

Control

Which of the following does the carrier NOT own? A) the network core B) customer premises equipment C) both A and B D) neither A nor B

Customer premises equipment

When an e-mail user encrypts an outgoing messages with SSL/TLS, how far will this encryption extend? A) to the sender's e-mail server B) to the receiver's e-mail server C) to the receiver's client host D) to an application program on the receiver's client host

The senders email server

What is the almost universal standard for end-to-end encryption? A) SSL/TLS B) IPsec C) PGP D) There is no almost universal standard for end-to-end encryption.

There is no almost universal standard for end to end encryption

How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.

They lease them from telephone companies.

Control functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

Traditional routing

Speech codecs ________. A) translate human voice signals into digital signals for transmission B) translate human voice signals into analog signals for transmission C) both A and B D) neither A nor B

Translate human voice signals into digital signals for transmission

IPsec provides protection in two modes of operation, one of these two modes is ______ transport mode data link mode network mode 802.1X mode

Transport mode

A networked application is an application that requires a network to operate. TRUE/FALSE

True

Client PCs must have digital certificates in ________ transport mode tunnel mode both neither

Tunnel mode

For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) SIP D) IP

UDP

Which header comes SECOND in a VoIP transport packet? A) RTP B) UDP C) TCP D) Application

UDP

E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) MIME D) UNICODE

UNICODE

Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures? A) underutilized processing capacity of client PCs B) potential for essential data/services to become unavailable as a device is turned off C) both A and B D) neither A nor B

Underutilized procesing capacity of clients PC's

Tor provides confidentiality ________. A) all the way to the destination host B) up to the entry P2P node C) up to the exit P2P node D) Tor does not provide confidentiality.

Up to the exit P2P node

In SQL injection attacks, the attacker sends ________. A) a legitimate SQL query B) a malformed SQL query C) user input that is used in an SQL query D) an SQL query in malware that is delivered to the target computer

User input that is used in an SQL query

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? VLANs VPNs PEAP 802.1X mode

VPNs

The Internet is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

WAN

Which of the following has more diversity in technologies? A) LANs B) WANs C) Both A and B are about equal in diversity of technologies

WANs

Which of the following allows you to read your e-mail easily on an Internet café's computer? A) POP B) Web-enabled e-mail C) both A and B D) neither A nor B

Web enabled email

For ADSL service, which of the following typically must be added to the telephone system? A) a DSLAM B) a transmission line to the customer premises C) both A and B D) neither A nor B

a DSLAM

in 802.11i protection is provided between the client and the _______ access point switch router server

access point

In SNMP, the manager communicates directly with a _______ managed device agent object access point

agent

The encapsulating security protocol offers _____ confidentiality authentication both neither

both

What does a router do with address resolution protocol request messages? broadcasts them sends them directly to the destination host sends them to a next hop router sends them to the default next hop router

broadcasts them

Typically, the most common way for an attacker to get extensive privileges on a computer is to ________. A) take over an application program B) take over the operating system C) take over a computer's hardware D) privilege escalation after an initial takeover

take over an application program

The main benefit of the IPv6 over IPv4 is _____ two more bits in the IP address two more bytes in the IP address the ability to have quality of service guarantees the ability to support more possible hosts

the ability to support more possible hosts

In BitTorrent, a(n) ________ is a server that coordinates the file transfer. A) swarm B) index C) tracker D) none of the above

tracker

Which of the following uses an access point? Traditional Wi-Fi Wi-Fi direct Both Neither

traditional Wi-Fi

MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on

transparent to

If a company uses 802.11i for its core security protocol, an evil twin access point will set up ______ 802.11i connections. One Two Four 16

two

A lesson of XSS is that programmers should never trust ________. A) contractors B) their own staff colleagues C) databases D) user input

user input

To drive around a city looking for working access points that are unprotected is ______ Drive by hacking war driving

war driving

Which is a problem with IPv4 addresses? They cant be used on wireless devices they are too complex routers find it difficult to handle them we have run out of them

we have run out of them


Conjuntos de estudio relacionados

Chapter 55: A/C and Heating Test

View Set

Twentieth Century World Power: History

View Set

Chapter 8: Atlantic Revolutions, Global Echoes 1750-1900

View Set

Howard Gardner's theory of multiple intelligences

View Set

Quiz and homework questions and answers

View Set

National Electrical Code Article 110 Requirements for Electrical Installations

View Set

Microeconomics Unit 2 HW Questions

View Set