IS435 Daeeun Daniel Choi- midterm

¡Supera tus tareas y exámenes ahora con Quizwiz!

121) A firewall will drop a packet if it ________. A) is a definite attack packet B) is a highly probable attack packet C) both A and B D) neither A nor B

A

149) In optical fiber, light travels through the ________. A) core B) cladding C) both A and B

A

74) Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency

A

97) Users typically can eliminate a vulnerability in one of their programs by ________. A) installing a patch B) using an antivirus program C) both A and B D) neither A nor B

A

100) ________ are full programs. A) Viruses B) Worms C) both A and B D) neither A nor B

B

106) In a DDoS attack, a ________ sends messages directly to the victim. A) botmaster B) bot C) command and control server D) all of the above

B

110) Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

B

115) Requiring someone prove his or her identity is ________. A) confidentiality B) authentication C) authorization D) both B and C

B

117) Iris scanning is attractive because of its ________. A) low cost B) precision C) both A and B D) neither A nor B

B

118) Digital certificate authentication fails if the supplicant ________. A) is the true party B) learns the true party's private key C) learns the true party's public key D) either B or C

B

126) Which type of firewall filtering looks at application-layer content? A) stateful packet inspection B) NGFW C) both A and B D) neither A nor B

B

134) What type of switch connects switches to other switches? A) trunk switches B) core switches C) workgroup switches D) none of the above

B

17) Which of the following is true? A) Frames are carried inside packets. B) Packets are carried inside frames. C) both A and B D) neither A nor B

B

32) At what layer, will you find standards for routers? A) transport B) Internet C) both A and B D) neither A nor B

B

38) At what layer, will you find standards for EUI-48 addresses? A) application B) data link C) transport D) Internet

B

4) The IETF primarily ________. A) manages the Internet B) creates Internet standards C) coordinates the work of ISPs D) all of the above

B

49) If someone says that a 1-bit flag is set, it is given the value ________. A) 0 B) 1 C) either 0 or 1 D) neither 0 or 1

B

53) The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B

B

55) The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server

B

56) "Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B

B

57) Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is ________. A) reliable B) unreliable C) both A and B D) neither A nor B

B

6) What process adds a header in front of an application message or fragment? A) application B) transport C) internet D) data link

B

60) Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111

B

63) The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5

B

69) In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? A) 10 B) 5 C) 2 D) none of the above

B

70) Trunk lines in the Internet core are ________. A) dedicated B) multiplexed C) both A and B D) neither A nor B

B

76) An SLA specifies the ________. A) best case B) worst case C) both A and B D) neither A nor B

B

77) An SLA specifies ________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B

B

79) ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B

B

101) Malware programs that masquerade as system files are called ________. A) viruses B) scripts C) root malware D) Trojan horses

D

102) Pieces of code that is executed after the virus or worm has spread are called ________. A) vulnerabilities B) exploits C) compromises D) payloads

D

151) ________ describe light entering a fiber's core at different angles. A) Co-cycle waves B) Harmonics C) Divergences D) Different modes

D

29) Which standards layer governs e-mail? A) data link B) transport C) Internet D) none of the above

D

3) Who owns the Internet? A) The U.S. Government B) The United Nations C) The IETF D) No one

D

30) Which standards layer governs multiuser word processing programs? A) data link B) transport C) Internet D) none of the Above

D

36) At what layer, will you find standards for IP addresses? A) application B) data link C) transport D) Internet

D

1) ISPs ________. A) carry traffic on the Internet B) connect users to the Internet C) both A and B D) neither A nor B

C

103) In a ________ attack, the attacker encrypts some or all of the victim's hard drive. A) virus B) DoS C) ransom D) lock

C

104) ________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker. A) A keystroke logger B) Anti-privacy software C) Spyware D) Data mining software

C

31) Which layer(s) governs transmission through a single network? A) data link B) physical C) both A and B D) neither A nor B

C

42) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN/ACK D) none of the above

C

64) In QoS, the S stands for ________. A) software B) security C) service D) satisfaction

C

65) QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above

C

122) Stateful packet inspection firewalls are attractive because of their ________. A) low cost for a given traffic volume B) ability to base rules on specific application programs C) both A and B D) neither A nor B

A

127) Which of the following is the most frustrating to use? A) IDSs B) opaque filtering C) SPI firewalls D) NGFW firewalls

A

130) Ethernet messages are ________. A) frames B) packets C) segments D) not named

A

136) ________ links connect switches to other switches. A) Trunk B) Long C) Access D) Workgroup

A

141) How long (in milliseconds) is a clock cycle if I transmit 400 Mbps with four states? A) 0.000005 B) 0.0025 C) 0.005 D) none of the above

A

54) The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server

A

107) Advanced persistent threats are ________. A) inexpensive for the attacker B) extremely dangerous for the victim C) both A and B D) neither A nor B

B

147) The main benefit of parallel transmission over serial transmission is ________. A) reliability B) speed C) both A and B D) neither A nor B

B

159) What is 9F hex in binary? A) 10001101 B) 10011111 C) 10101111 D) 11111001

B

137) Physical layer standards govern ________. A) signaling B) physical connectors C) both A and B D) neither A nor B

C

92) SDN can ________. A) permit routing rules to be changed rapidly B) reduce router costs C) both A and B D) neither A nor B

C

140) If you double the number of states, you can transmit ________ more bit(s) per clock cycle. A) 1 B) 2 C) 4 D) none of the above

A

15) Which of the following is an Internet supervisory protocol? A) DNS B) IP C) both A and B D) neither A nor B

A

150) The strength of a wave is its ________. A) amplitude B) frequency C) wavelength D) force

A

152) Modal dispersion limits transmission distance in ________. A) multimode fiber B) single-mode fiber C) both A and B D) neither A nor B

A

153) If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use? A) 4-pair UTP B) multimode fiber C) single-mode fiber D) none of the above

A

156) 850 nm multimode fiber is used in LANs ________. A) to keep cost low B) to have the longest transmission distances C) both A and B D) neither A nor B

A

158) Ethernet became the dominant LAN technology because of ________. A) low cost B) high speed C) link reliability D) agility

A

161) To manage their Ethernet networks, companies rely on ________. A) SNMP B) HTTP C) FTTH D) none of the above

A

164) To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

A

18) A host sends a packet to another host containing seven single networks along the way. How many other hosts will there be along the route when Host A transmits? A) 1 B) 2 C) 7 D) 9

A

20) A host sends a packet to another host containing six single networks along the way. How many routes are included in this transmission? A) 1 B) 6 C) 7 D) 8

A

23) ________ have DHCP servers. A) Home access routers B) Internet core routers C) both A and B D) neither A nor B

A

24) Internet standards are published as ________. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols

A

27) A standards agency for OSI is ________. A) ITU-T B) IETF C) both A and B D) neither A nor B

A

39) If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 7

A

44) If a destination host receives a correct segment, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing

A

46) Which of the following is NOT one of the three general parts of messages? A) address field B) header C) data field D) trailer

A

47) If the destination internet process detects an error, it ________. A) discards the packet B) sends back a segment notifying the sender C) both A and B D) neither A nor B

A

48) Which of the following is a connectionless protocol? A) IP B) TCP C) both A and B D) neither A nor B

A

5) When you use your tablet to access the internet, the tablet is a ________. A) client host B) server host C) both A and B D) neither A nor B

A

50) The UDP header has ________ fields. A) 4 B) 8 C) 16 D) 32

A

52) On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B

A

66) Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octets per second D) none of the above

A

67) Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B

A

71) The business benefit of multiplexing is ________. A) lower cost B) higher speed C) avoiding the need to send many transmission links through narrow conduits D) security

A

72) ________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above

A

73) When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) output C) jitter D) throughput

A

78) An SLA specifies ________. A) maximum latency B) minimum latency C) both A and B D) neither A nor B

A

88) SNMP Get commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B

A

89) The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud

A

91) Using standard configurations ________. A) saves money B) gives management agility C) both A and B D) neither A nor B

A

94) Routing packets is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

A

12) Paths across a single network are called ________. A) routes B) data links C) physical links D) none of the above

B

124) How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP segment that contains an acknowledgement? A) process it through the Access Control List (ACL) B) pass it if it is part of an approved connection C) both A and B D) neither A nor B

B

13) If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12

B

131) The path a message takes from the source host to the destination device in an Ethernet network is a ________. A) physical link B) data link C) route D) label-switched route

B

139) A system with 16 states can transmit ________ bits per clock cycle A) 3 B) 4 C) 5 D) none of the above

B

142) What type of copper wiring is widely used in Ethernet? A) optical fiber B) 4-pair UTP C) both A and B D) neither A nor B

B

144) 4-pair UTP terminates in a(n) ________ connector. A) USB B) RJ-45 C) SC D) standard telephone

B

146) The ability to transmit in two directions simultaneously is ________. A) parallel communication B) full-duplex communication C) both A and B D) neither A nor B

B

148) Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? A) category 6 B) category 6A C) both A and B D) neither A nor B

B

16) In a point-to-point single network, how many physical links will there be when a packet is transmitted? A) 0 B) 1 C) 2 D) We cannot say with the information provided.

B

160) What is binary 0010 in hex? A) 1 B) 2 C) 3 D) none of the above

B

19) A host sends a packet to another host containing six single networks along the way. How many data links are used for this transmission? A) 1 B) 6 C) 7 D) 8

B

21) A host sends a packet to another host with six single networks along the way. How many frames are involved? A) 1 B) 6 C) 7 D) 8

B

22) Source and destination EUI-48 (or MAC) addresses are found in ________ headers. A) IP B) frame C) TCP D) UDP

B

26) Which standards agency is especially important for internet processes? A) ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B is important.

B

28) Which layer governs wires? A) transport B) physical C) Internet D) none of the above

B

34) At what layer, will you find standards for switches? A) application B) data link C) transport D) Internet

B

35) At what layer, will you find standards for frames? A) application B) data link C) transport D) Internet

B

8) When a frame arrives, the data link process on the destination host ________. A) adds a header B) removes a header C) both A and B D) neither A nor B

B

80) ________ can be addressed by using priority. A) Chronic lacks of capacity B) Momentary traffic peaks C) both A and B D) neither A nor B

B

82) To handle momentary traffic peaks, which would you give higher priority to? A) e-mail B) VoIP C) both A and B D) It is impossible to say with the information provided.

B

84) SNMP agents communicate with the ________. A) network visibility program B) network management program C) MIB D) all of the above

B

87) SNMP Set commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B

B

99) What kind of attack is most likely to succeed against a system with no technological vulnerabilities? A) malware B) social engineering C) both A and B D) neither A nor B

B

108) Employees often attack ________. A) for revenge B) for money C) both A and B D) neither A nor B

C

109) Who are the most dangerous types of employees? A) financial employees B) manufacturing employees C) IT security employees D) former employees

C

113) The messages of VPNs ________. A) share the same transmission lines used by other VPNs B) are encrypted C) both A and B D) neither A nor B

C

119) A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________. A) segmentation B) redundancy C) two-factor authentication D) none of the above

C

120) When a firewall identifies an attack packet, it ________. A) discards the packet B) copies information about the packet into a log file C) both A and B D) neither A nor B

C

123) When a packet that is part of an ongoing connection arrives at a stateful inspection firewall the firewall usually ________. A) drops the packet B) drops the packet and notifies an administrator C) passes the packet D) passes the packet, but notifies an administrator

C

125) SPI firewalls are being replaced in large part because they are limited in their ability to detect ________. A) NAT B) piggybacking C) port spoofing D) none of the above

C

129) Ethernet standards are specified at the ________ layer. A) physical B) data link C) both A and B D) neither A nor B

C

132) What 802 Working Group creates Ethernet standards? A) 802.1 B) 802.2 C) 802.3 D) 802.11

C

138) To transmit three bits per clock cycle, you must have ________ states. A) 3 B) 6 C) 8 D) 16

C

154) Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________. A) 10GBASE-SR B) 100GBASE-SR C) 10GBASE-SR with bonding D) 100GBASE-SR with bonding

C

155) The longest transmission distances are possible with ________. A) USB B) UTP C) single-mode fiber D) multimode fiber

C

157) In Ethernet, switches are organized in a ________. A) ring B) mesh C) hierarchy D) any of the above

C

163) Rapid Spanning Tree Protocol (RSTP) ________. A) can increase reliability B) was created to break accidental loops C) both A and B D) neither A nor B

C

25) Network standards provide ________. A) strobing B) synchronization C) interoperability D) entanglement

C

33) At what layer, will you find standards for access points? A) physical B) data link C) both A and B D) neither A nor B

C

40) If two hosts are connected by five networks, how many routers will there be when one host sends a packet to the other host? A) 1 B) 2 C) 4 D) 5

C

45) In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the side that does not initiate the close C) both A and B D) neither A nor B

C

51) UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B

C

58) Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange

C

61) A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64

C

62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8

C

68) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) none of the above

C

7) What process adds a header in front of a TCP segment? A) Application B) Transport C) Internet D) Data Link

C

75) Guarantees for quality of service are called ________. A) QoS-G B) QoS metrics C) SLAs D) QoS guarantees

C

81) Momentary traffic peaks can lead to ________. A) latency B) packet loss C) both A and B D) neither A nor B

C

83) Traffic shaping may ________ traffic that is undesirable. A) prohibit B) limit C) both A and B D) neither A nor B

C

86) Ping tells you ________. A) that a host is reachable B) latency in the connection to the host C) both A and B D) neither A nor B

C

9) The transport layer on the destination host ________. A) reassembles the application message if it has been fragmented B) removes the transport header C) both A and B D) neither A nor B

C

90) Using the SNMP Set command ________. A) saves management labor B) requires excellent security C) both A and B D) neither A nor B

C

95) The general term for evil software is ________. A) virus B) worm C) malware D) all of the above

C

135) ________ links connect users to workgroup switches. A) Trunk B) Core C) Access D) Workgroup

C Difficulty: Basic

112) Secured packets typically receive ________. A) confidentiality B) authentication C) message integrity D) all of the above

D

128) ________ look at ________, while ________ mostly look at ________. A) Antivirus programs; packets; firewalls; packets B) Antivirus programs; files; firewalls; files C) Antivirus programs; packets; firewalls; files D) Antivirus programs; files; firewalls; packets

D

133) What type of switch connects users to the network? A) user switches B) core switches C) access switches D) workgroup switches

D

14) If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12

D

143) How many wires are there is a 4-pair UTP Ethernet cord? A) 1 B) 2 C) 4 D) 8

D

145) Optical fiber cords use two strands ________. A) for reliability through redundancy B) to form a complete electrical loop C) to double the transmission speed D) for full-duplex transmission

D

165) To prevent an unauthorized user from sending supervisory commands to switches, companies use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE

D

166) After an ARP cache poisoning attack, the ARP cache gives the ________. A) IP address of the router the user wishes to send to B) EUI-48 address of the router the user wishes to send to C) IP address of the router the MITM attacker D) EUI-48 address of the router the MITM attacker

D

2) We call any device connected to the Internet a(n) ________. A) IP B) client C) router D) host

D

37) At what layer, will you find standards for routes? A) application B) data link C) transport D) Internet

D

41) If two hosts are connected by five switches, how physical links will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 6

D

43) If a destination host receives a TCP segment with an error, it will transmit ________ A) an ACK segment B) an NAC segment C) an RSND segment D) nothing

D

59) Transmitting "Oh, My!" without the quotes in ASCII requires ________ octets. A) 2 B) 4 C) 6 D) 7

D

85) To determine if a host is reachable, you send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping

D

93) Creating switching and routing tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

D

96) ________ is the general name for a security flaw in a program. A) A virus B) Malware C) A security fault D) A vulnerability

D

98) Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) indefensible B) stealth C) malware D) zero-day

D

111) Electronic signatures provide message-by-message ________. A) authentication B) confidentiality C) both A and B D) neither A nor B

A

116) In authentication, ________ are the general name for proofs of identity. A) credentials B) authorizations C) digital certificates D) all of the above

A

114) Using SSL/TLS for Web applications is attractive because SSL/TLS ________. A) is essentially free to use B) offers the strongest possible cryptographic protections C) both A and B D) neither A nor B

A

10) IPv4 addresses are ________ bits long. A) 32 B) 64 C) 128 D) none of the above

A

105) ________ is a program that can capture passwords as you enter them. A) A keystroke logger B) Data mining software C) both A and B D) neither A nor B

A

11) Routing is based on a(n) ________. A) IP address B) single-network address C) either A or B D) neither A nor B

A


Conjuntos de estudio relacionados

Income Statement, Balance Sheet, Cash Flow Statement

View Set

Which bone articulates with what?

View Set

Chapter 7: The Rise and Spread of Islam questions

View Set

Physical Science Semester 1 Study Set

View Set