Business Data Networks & Security - Ch. 6, Business Data Networks and Security - Chapters 8, 9, 10, and 11., Business Data Networks & Security (Panko)- Ch 9- Internetworking, Business Data Networks and Security Ch 10, Business Data Networks & Securit...

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B

A) leased lines

Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above

A) service for more customers

In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manager

A) the SDN controller

T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps

B) 1 Mbps

Which of the following already runs to nearly all customer premises? A) 4-pair UTP B) 1-pair VG UTP C) 1-pair DG UTP D) none of the above

B) 1-pair VG UTP

Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B

B) the Internet

Index Server

BitTorrent's .torrent files are stored on the _____.

An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B

C) both A and B

DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B

C) both A and B

Forwarding functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

C) both A and B

In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) both A and B D) neither A nor B

C) both A and B

SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B

C) both A and B

WAN optimization provides ________. A) network protocol acceleration B) caching C) both A and B D) neither A nor B

C) both A and B

For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP

C) coaxial cable

WANs are ________. A) single networks B) internets C) either A or B D) neither A nor B

C) either A or B

RTP

Codec data comes after the _____ header in VoIP Transport Frames.

Faster and More Expensive

Compared to ADSL service, cable modem service typically is _____.

Faster

Compared to normal routing, decision caching is _____.

Most end-office switches are Class ________ switches. A) 1 B) 2 C) 3 D) 5

D) 5

The highest layer in SDN consists of ________. A) switches B) routers C) the SDN controller D) SDN applications

D) SDN applications

A. Voice Transmission B. Data Transmission C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

DSL offers _____.

Routing

Dynamic _____ protocols allow routers to transmit routing table information to one another.

UNICODE

E-Mail bodies that have non-English text use _____.

running optical fiber to neighborhoods.

Fiber to the home service is normally created by _____.

A Routing Table

For 100,000 Addresses, which will have fewer rows?

Routers

For a given volume of traffic, which are more expensive?

Hexadecimal

For human reading, IPv6 address is written in _____ notation.

Colons

For human reading, IPv6 fields are separated by _____.

4

For human reading, symbols in IPv6 addresses are written in fields of _____ symbols.

UDP

For the Transport Layer, VoIP uses _____ for transport transmission.

Coaxial Cable

For their transmission medium, cable television companies primarily use _____.

A. Traditional Routing B. SDN C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Forwarding functions are located in routers in _____.

A. Echo and Echo Reply Messages B. Error Advisement Messages C. Both A and B D. Neither A nor B CORRECT ANSWER - D. Neither A nor B

IP is reliable because of _____.

A. Run Side-By-Side. B. Are Twisted Around Each Other. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - D. Neither A nor B.

In coaxial cable, the two conductors _____.

None of the Above

In the mask /14, how many 1s are there?

preventing sniffers from learning internal IP addresses.

NAT enhances security by _____.

Soutbound APIs

OpenFlow can be used to standardize _____.

Translate Human Voice Signals into Digital Signals for Transmission

Speech codecs _____.

modified hierarchy

The PSTN core is organized as a _____.

Anonymity

Tor was created to improve _____.

A. Limits the amount of some types of traffic. B. Does not admit some types of traffic. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - C. Both A and B

Traffic shaping _____.

Transport Mode

Which mode of IPsec may be more expensive if a company has a large number of computers?

Business

Which of the following DSL services usually offers QoS quarantees?

OSPF

_____ is an interior dynamic routing protocol.

Domain Name System (DNS)

a general system for naming domains.

MIB object

a piece of information about a managed device. SNMP Objects Set Commands Password used to encrypt manager Systems Objects IP Objects TCP Objects UDP Objects ICMP Objects Interface Objects

Border Gateway Protocol (BGP)

almost-universal external routing protocol.

Man in the middle attack

attack that places the attacker in the middle of the compromised transmissions between two legitimate hosts

Data field

contains two subfields: the LLC subheader and the packet that the frame is delivering

802.11 standards

dominant WLAN standards used today. Created by the IEEE 802.11 Working Group

Electromagnetic interference (EMI)

electromagnetic signals from nearby motors, flourescent lights, and even other wire pairs (crosstalk interference)

Frame Check Sequence Field

4 octets long. Permits error detection

Logical link control layer (LLC) subheader

8 octets long. Describes the type of packet contained in the data field.

An SDN Application

A router's load-balancing process is determined by _____.

WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the PSDN carrier D) by the ISP

A) at the ends of leased lines

Multimode fiber

fiber that permits multiple modes to travel through it. Core of 50 microns

Single-mode fiber

fiber with a core diameter of only 8 or 9 microns

sniffer program

hackers use the program to read all packets coming out of the firm.

dual stack

hosts both IPv4 stack and IPv6 stack.

internet layer protocol stack (IP stack)

inter layer process that handles more than the Internet Protocol (IP).

3 main issues that mesh networking must address

must be self-organizing, must be difficult to overload access points near geographical center, and security

Hierarchical topology

required by Ethernet, otherwise loops would exist

exterior dynamic routing protocol

required by the external network to with it is connected.

Clear-to-send (CTS) message

response by the access point to an RTS message. Other hosts must wait while the host sending the RTS may then transmit, ignoring CSMA/CA

Channel

what service bands are subdivided into smaller frequency ranges. Do not interfere with each other

Wireless LANs (WLANs)

wireless local area networks. Wireless networking's widest application

Interior

A company is free to select whatever _____ dynamic routing protocol it wishes.

a domain registrar.

A company receives its domain name from _____.

POP

A customer's leased line to its ISP connects to the ISP's _____.

User Input

A lesson of XSS is that programmers should never trust _____.

32

A mask has _____ bits.

A. Signaling B. Transport C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

A media gateway translates _____ transmissions.

Whenever it forwards an IP packet to a host that is not in its ARP cache.

A router must use the Address Resolution Protocol process _____.

1

A router will discard a packet if the Time-To-Live (TTL) value in an arriving packet is _____.

fffe

A step in creating an EUI-64 is dividing a 48-Bit MAC address in half and inserting _____ in the center.

Either IMAP or POP Standard

A traditional e-mail user retrieving messages from his or her mail server could use _____.

SMTP Standard

A traditional e-mail user sending messages to his or her mail server would most likely use _____.

Router, Routing

A(n) _____ must find the best-matching row in its _____ table by comparing multiple row matches.

Many "T1" lines that carriers provide today use ________ in the local loop. A) 1-pair voice-grade UTP B) 2-pair voice-grade UTP C) 1-pair data-grade UTP D) 2-pair data-grade UTP

A) 1-pair voice-grade UTP

In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B

A) E-Line

A company has more control over its ________ technology. A) LAN B) WAN

A) LAN

A network that runs on the customer premises is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

A) LAN

Which of the following usually offers higher speeds? A) LANs B) WANs C) Both A and B are about equal in typical speeds.

A) LANs

Today's dominant cellular technology is ________. A) LTE B) 3G C) HSPA+ D) MTSO

A) LTE

A customer's leased line to its ISP connects to the ISP's ________. A) POP B) NAP C) CSU/DSU D) interface

A) POP

For ADSL service, which of the following typically must be added to the telephone system? A) a DSLAM B) a transmission line to the customer premises C) both A and B D) neither A nor B

A) a DSLAM

In caching, ________. A) a message may not have to be transmitted B) messages are cached at the transmitting end of the line C) both A and B D) neither A nor B

A) a message may not have to be transmitted

In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B

A) cell

Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) both A and B D) neither A nor B

A) companies lack rights of way

Leased lines offer ________ service. A) fast B) any-to-any C) rapid-connection D) none of the above

A) fast

Compared to ADSL service, cable modem service typically is ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive

A) faster and more expensive

The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B

A) higher speed

A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above

A) links different sites together

Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

A) northbound APIs

MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces

A) reduces

SDN ________. A) reduces CapEx B) increases OPEx C) both A and B D) neither A nor B

A) reduces CapEx

Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) both A and B D) neither A nor B

A) running optical fiber to neighborhoods

Layer 3

ARP operates at _____.

Go through the entire process for each packet.

According to the IETF standards, if a router receives a series of packets from the same IP address to the same IP address, it shoud _____.

2

According to the principle of defense in depth, antivirus filtering should be done in at least _____ location(s).

A. Destination Hosts B. Routers C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Address Resolution Protocol is used to find the destination data link layer destination addresses of _____.

Interface

After selecting a row on a routing table, a router will send packets out to the _____.

A. Controls Cellsites in a Cellular System. B. Links Mobile Users to Wired Telephone Customers. C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

An MTSO _____.

Subnets

An internal router only connects different IP _____.

A. Viruses B. Trojan Horses C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Antivirus software checks e-mail attachments for _____.

In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B

B) ADSL modem

The PSDN technology that is growing rapidly today is ________. A) Frame Relay B) Carrier Ethernet C) the Internet D) No PSDN technology is growing rapidly today.

B) Carrier Ethernet

How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.

B) They lease them from telephone companies.

The Internet is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

B) WAN

Which of the following has more diversity in technologies? A) LANs B) WANs C) Both A and B are about equal in diversity of technologies.

B) WANs

A router's load-balancing process is determined by ________. A) the SDN controller B) an SDN application C) the router D) any of the above

B) an SDN application

DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B

B) asymmetric speed

remote-site-access VPN

connecting a remote user to a site and a site-to-site VPN that connects two corporate sites.

Optical multimode (OM)

consists of OM3 and OM4. OM4 cost more, but can carry signals farther

Basic service set (BBS)

consists of an access point and the wireless hosts it serves

Length field

contains a binary number that gives the length of the data field (not entire frame) in octets. Maximum length is 1,522 octets

DNS A Record

contains the IPv4 address for a target host..

DNS AAAA Record

contains the IPv6 address for a target host (4X DNS A Record)

Service bands

contiguous spectrum ranges that regulators divide the frequency spectrum into.

top-level domains

country domains (.uk, .ca, .ie, .au, .ch, ect.) genetic domains (.com, .edu, .net, .info, .gov, .org)

802 LAN/MAN standards committee

create LAN standards, also known as the 802 Committee. Done in working groups.

802.3 Working Group

creates Ethernet standards

What speed does the LTE Advanced standard require downstream? A) 3 Mbps B) 30 Mbps C) 3 Gbps D) 30 Gbps

C) 3 Gbps

A firm uses a PSDN. It has four sites. How many leased lines will it need? A) 0 B) 1 C) 4 D) none of the above

C) 4

To use a leased line, the customer requires a(n) ________ at each site. A) switch B) router C) CSU/DSU D) modem

C) CSU/DSU

In a PSDN, customers connect to the network core at ________. A) NAPs B) public/private access points C) POPs D) DSLAMs

C) POPs

Orthogonal frequency division multiplexing (OFDM)

each broadband channel is divided into many smaller channels called subcarriers. A part of a frame is transmitted,

Address Resolution Protocol (ARP) cache

each host and router has this. Lists IP addresses and their corresponding EUI-48 addresses

Hierarchy

each switch has only one parent switch above it. Only a single possible path between any two hosts

Single points of failure

failure of a single component (a switch or trunk link between switches) can cause disruption

lower-level domains

further qualified domains (shidler.hawaii.edu.domain, Shidler College School of Business within the University of Hawaii)

Digital signaling

has a few states (2, 4, 8 etc) always a multiple of two

Media Access Control (MAC) layer

has functionality specific to a particular working group's core operation

Logical Link Control (LLC) layer

has functionality that all 802 standards use to interact with the internet layer. 802.2 is the only single standard

Binary signaling

has two states (conditions) which may be two voltage levels or light being turned on or off

Traffic shaping ________. A) limits the amount of some types of traffic B) does not admit some types of traffic C) both A and B D) neither A nor B

C) both A and B

Which of the following affects what throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B

C) both A and B

Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B

C) both A and B

Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B

C) both A and B

Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B

C) both A and B

LANs are ________. A) single networks B) local internets C) either A or B D) neither A nor B

C) either A or B

In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path

C) label-switched path

The PSTN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop

C) modified hierarchy

What transmission medium do ALL DSL services use? A) one-pair data-grade UTP B) two-pair data-grade UTP C) one-pair voice-grade UTP D) all of the above

C) one-pair voice-grade UTP

A LAN is the network that ________. A) links different sites together B) provides service within a company C) provides service within a site D) all of the above

C) provides service within a site

CSMA/CA+ACK

Carrier Sense Multiple Access with Collision Avoidance and Acknowledgement, a mandatory method for media access control

3 common UTP cable categories

Category 5e, Category 6, Category 6A UTP

service for more customers.

Cells are used in cellular telephony to provide _____.

Enhanced Interior Gateway Routing Protocol (EIGRP)

Cisco Systems interior routing protocol. gateway- another term for a router.

Transport Mode

Client PCs must have digital certificates in _____.

Traditional Routing

Control functions are located in routers in _____.

Base 16 hexadecimal (hex) notation

Converted from 48-bit Ethernet addresses.

Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) quality of service D) all of the above

D) all of the above

Frequency

how radio waves are described. The number of of complete cycles. Increases by factor of 1,000

N = 2^b - 2

if a part is b bits long , it can represent 2^b - 2 networks, subnets, or hosts

authoritative DNS server

if the host's IP address is not know it will find the domain in the host name.

ACK

if the receiver receives a message correctly, it immediately sends an acknowledgement to the sender. If sender does not receive an ACK, it retransmits. This is reliable for providing both error detection and correction

Terminal crosstalk interference

if wires are untwisted too far, the interference between the untwisted wires would be crippling

root DNS servers

keep an overview information for the system.

IPsec policy servers

manage IPsec security options in order to prevent weak options from being used.

Multipath interference

may cause the signal to range from strong to nonexistent within a few centimeters

Request-to-send (RTS) message

message that host sends to wireless access point for permission to send messages

802.11r messages

messages used for two access points involved in handoff of service

Media access control (MAC)

methods govern when hosts and access points may transmit so that collisions are avoided

500 megahertz to 10 gigahertz

most common radio frequencies for wireless transceivers

Local area network (LAN)

networks that operate a customer premises, like a home, office building, campus, etc

Request to send/clear to send (RTS/CTS)

nonmandatory control mechanism

Electromagnetic interference (EMI)

objects like cordless phones, microwaves, and nearby access points produce EMI creating excessive mutual interference

5 GHz service band

one of the two service bands used by 802.11 Wi-Fi WLANs. Provides between 11 and 24 non-overlapping 20 MHz channels. More expensive than 2.4 GHz receiver

2.4 GHz service band

one of the two service bands used by 802.11 Wi-Fi WLANs. Same in most countries around the world, stretching from 2.4 GHz to 2.835 GHz. Better for radio propagation. Only has 83.5 MHz of bandwidth, and only 3 non-overlapping 20 MHz 802.11 channels, centered at Channels 1, 6, and 11

ARP poisoning attack

packet that falsely tells the victim the incorrect EUI-48 address

Absorptive attenuation

partial absorption by air molecules, plants, etc when a radio signal travels. Bad in moist air and office plants -> water is an especially good absorber of radio signals

Connectorization

placing an RJ-45 connector on the end of a 4-pair UTP cable

Dish antenna

point in a particular direction, which allows for stronger signals. Good for longer distances because of focusing ability.

Network Address Translation (NAT)

presents external IP addresses that are different from internal IP addresses used within a firm.

Broadband channel

radio channels with large bandwidths

Spatial streams

radio signals that are released by the host or access point in the same channel between two or more different antennas on access points and wireless points

Transceivers

radios for data transmission, both transmit and receive.

Modes

rays of lights that enter the core at a few angles

Bandwidth

real signals that are spread out over a range of frequencies. Measured by subtracting the lowest frequency from the highest

ST connector

round connector on one end of an optical fiber cord

Co-channel interference

signals that interfere with each other if nearby access points operate in the same channel, unless the access points are far apart

Subcarrier

smaller subchannels that each broadband channel is divided into

second-level domains

specific organizations domains (microsoft.com, hawaii.edu, cnn.com, ect.)

SC connector

square connector on one end of an optical fiber cord

Secure Sockets Layer (SSL)

standard created by the Netscape Corporation but later passed it to the IETF.

802.1X

standard for Port-Based Access Control on the workgroup switches that give users access to the network

Rapid Spanning Tree Protocol (RSTP)

standard that Ethernet uses to detect and break loops automatically

IEEE Standards Association

standards setting arm of the Institute of Electrical and Electronics Engineers

Workgroup switches

switches that connect hosts to the network

Core switches

switches that connect switches to other switches

Multiple input/multiple output (MIMO)

technique used to double, triple, or quadruple transmission speed (or even increase it more) without increasing channel bandwidth

Backward compatibility

the ability of new access points and wireless clients to work with older equipment, permitting products meeting new standards to be installed gradually over time

Full duplex transmission

the ability to transmit in two directions simultaneously

Roaming

the ability to use handoffs in WLANs

Wavelength

the distance between successive wave heights, troughs, starts, stops, etc

Service set identifier (SSID)

the identifier within the access point in a BSS

Frequency spectrum

the range of all possible frequencies from zero hertz to infinity

Core

the thin strand of glass that optical fiber carries light signals through

Carrier sense (CS)

to listen to (sense) traffic (the carrier, in radio parlance)

Licensed radio bands

transceivers must have a gov't license to operate. e.g. commercial television bands, AM and FM radio bands

Access links

transmission links that connect hosts to workgroup switches

Trunk links

transmission links that connect switches to other switches

Spread spectrum transmission

transmission that uses far wider channels than transmission speed requires

Omnidirectional antenna

transmits signals equally strongly in all directions, as well as receive. Does not need to point in direction of receiver, but only a small fraction of energy reaches the receiver. Best for short distances, like in wireless LAN or cellular telephone network

Serial transmission

transmitting over a single pair of wires

Parallel transmission

transmitting over more than one pair of wires

Link aggregation/bonding

two or more UTP or fiber trunk links to connect a pair of switches. Ethernet supports both

Beamforming

usage of multiple antennas focusing radio power in a particular direction instead of broadcasting isotropically. Signal will be stronger

internal dynamic routing protocols

used to exchange routing table information between routers within an individuals organization or internet.

dynamic routing protocols

used to exchange routing table information between routers.

Multiple access (MS)

uses listening to control how multiple hosts can access the network to transmit. If another device is transmitting, the wireless host or access point does not transmit

Antenna

what transceivers need to transmit its signal. Two types: omnidirectional and dish

Clock cycle

when a device transmits, it holds the signal constant for a brief period of time

LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons

D) economic reasons

In the telephone system, the lines that connect customers to the nearest switch are called the ________. A) access lines B) local lines C) access loop D) local loop

D) local loop

In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) both A and B D) neither A nor B

D) neither A nor B

asymmetric speed.

DSL residential service provides _____.

3

Deciding what interface and to what device to send the packet back out is step _____ in the routing process.

Power over Ethernet (POE) Plus

Ethernet can provide both data and electrical power, up to 25 watts over the UTP access link

802.3 MAC Layer Standard

Ethernet's only single data layer layer standard. Governs frame organization and switch operation

None of the Above

Express the mask /18 in dotted decimal notation.

255.255.255.0

Express the mask /24 in dotted decimal notation.

Root Privileges

Having all privileges on a computer is known as having _____.

They lease them from telephone companies.

How do WAN carriers typically get their trunk lines?

13

How many DNS root servers are there?

4

How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?

None of the Above

How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?

8

How many fields are there in an IPv6 address written for human reading?

Transport Layer Security (TLS)

IEFT standard that was once SSL.

Internet Control Message Protocol (ICNMP)

IETF protocol used for supervisory messages at the internet layer and goes hand in hand with IP.

Open Shortest Path First (OSPF)

IETF standard for interior routing.

A. Remote-Access B. Site-to-Site C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

IPsec is used for _____ VPNs.

application

IPsec protects _____ layer messages.

Transport Mode

IPsec provides protection in two modes of operation; one of these two modes is _____.

Have a Dual-Stack.

If a host is to be able to communicate via IPv4 and IPv6, it is said to _____.

32-Bits

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?

126

If you have a subnet part of 7 bits, how many subnets can you have?

254

If your subnet part is 8 bits long, you can have _____ subnets.

A. Splitters B. An ADSL Modem C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

In ADSL, the customer should have _____.

Tracker

In BitForrent, a(n) _____ is a server that coordinates the file transfer.

Index

In BitTorrent, a(n) _____ website is a site the BitTorrent client program goes to in order to get .torrent files.

Domain

In DNS, a group of resources under the control of an organization is called a _____.

8

In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?

security associations.

In IPsec, agreements about how security will be done are called _____.

entire packet minus the main header.

In IPv6, the payload length gives the number of octets in the _____.

First Label-Switching Router

In MPLS, the _____ adds the label to the packet.

Label-Switched Path.

In MPLS, the packet travels along the _____.

before the packet arrives.

In MPLS, the router interface to send the packet back out will be decided _____.

Firewall

In NAT, the _____ creates new external source IP addresses and port numbers.

The SDN Controller

In SDN, a switch receives its forwarding table rules directly from _____.

set

In SNMP, companies are often reluctant to use _____ commands because of security dangers.

Agent

In SNMP, the manager communicates directly with a(n) _____.

Users Input That Is Used In An SQL Query

In SQL injection attacks, the attacker sends _____.

Sent By A User

In XSS, the malicious script that gets placed in a webpage sent to a target is _____.

Client/Server

In _____ File Retrieval, your computer downloads a file from a server.

Network Part

In a Network Mask, the 1s correspond to the _____.

POPs

In a PSDN, customers connect to the network core at _____.

None of the Above

In a Subnet Mask, the 1s correspond to the _____.

1

In a routing table, Row 47 and 3497 both match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches?

Protocol

In an IPv4 packet, the _____ field value tells the type of message contained in the IP packet's data field.

64

In an IPv6 global unicast address, the interface ID is _____ bits long.

a message may not have to be transmitted.

In caching, _____.

Cell

In cellular technology, a _____ is a small geograpihcal area.

Cellsite

In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) _____.

It is hard to say with limited information.

In the IPv4 address 1.2.3.4, What is the Network Port?

24

In the mask 255.255.255.0, how many 1s are there?

Local Loop

In the telephone system, the lines that connect customers to the nearest switch are called the _____.

only between the IPsec Servers.

In tunnel mode, IPsec provides protection _____.

A. Lower Cost B. The Ability to do Traffic Engineering C. Quality of Service D. All of the Above CORRECT ANSWER - D. All of the Above

Label-Switching Routers bring _____.

Fast

Leased Lines offer _____ service.

reduces

MPLS _____ the work that each router must do to deliver a packet during a traffic exchange.

Transparent To

MPLS is _____ the source and destination hosts.

Label Number

MPLS routers base their decisions on a packet's _____.

SMTP

Mail servers communicate with each other by using _____.

1-Pair Voice-Graded UTP

Many "T1" lines that carriers provide today use _____ in the local loop.

second-level

Most corporations wish to have _____ domain names.

5

Most end-office switches are Class _____ switches.

Hertz (Hz)

One cycle per second

Echo Request

Pinging is to send ICMP _____ messages to the target host.

plain text content of e-mail messages.

RFC 822 and RFC 2822 standards govern _____.

Jitter Control

RTP supports _____.

Interfaces

Router connectors are called _____.

Mesh

Routers usually are connected in a _____ topology.

2707

Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. Which row will the router choose if both are matches?

2707

Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16 and the reliability metric 10. Which row will the router choose if both are matches?

Inverse square law (1/r^2)

S2 = S1 * (r1/r2)^2. Area of a sphere is proportional to the square of its radius

Signaling

SIP is a _____ protocol for VoIP.

Community Names

SNMPv1 uses _____ for authentication.

a different password for each manager-agent pair

SNMPv3 uses _____ for authentication.

A. Compression B. Voice Quality C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Speech codecs vary with respect to _____.

Wi-Fi

Stems from the Wifi Alliance, an industry consortium of 802.11 product vendors

Benefits of using a central authentication server

Switch cost, consistency, reduced management cost, and rapid changes

1 Mbps

T1 leased lines run at a speed of about _____.

Segments

TCP messages are called _____.

Extended Unique Identifiers

The IEEE calls 64-bit interface addresses _____.

A. Called Party's SIP Proxy Server B. Called Party's VoIP Phone or Computer C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

The SIP invite is transmitted to the _____.

Conduct Audio and Video Surveillance

The Trojan Horse placed on the first compromised GHOSTNET client could _____.

Client Processing Power

The advance that made the client/server application architecture possible was _____.

A Social Engineering Attack

The attack on GHOSTNET began with _____.

A.) Always has the mask /32. B.) Will always match the destination IP address of an incoming packet. C.) Both A and B. D.) Neither A nor B. CORRECT ANSWER - C. Both A and B

The default row _____.

A. is a way to find a host's IP addresses if your computer only knows the Host's Host Name. B. is a general naming system for the Internet. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - C. Both A and B

The domain name system _____.

A. Confidentiality B. Authentication C. Both A and B D. Neither A nor B CORRECT ANSWER: C. Both A and B

The encapsulating security protocol offers _____.

Comparing the packet's destination IP address to all rows.

The first step in the routing process involves _____.

Root Servers

The highest-level DNS servers are called _____.

the ability to support more possible hosts.

The main benefit of IPv6 over IPv4 is _____.

Higher Cost

The main disadvantage of transport mode protection compared to tunnel mode protection in IP is _____.

protection over only part of the route.

The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is _____.

Reduce Cost

The main promise of VOIP is to _____.

4

The main version of Internet Protocol in use today is IP Version _____.

It is hard to say with limited information.

The network part of an IPv4 address is _____ bits long.

6

The new version of Internet Protocol that is coming into use is IP Version _____.

Interface ID

The part of an IPv6 global unicast address that designates the host is called the _____.

Higher Speed

The promise of FTTH is _____.

Destination Host

The router selects a row in which the next-hop router is labeled local. The router will send the packet to the _____.

Network

The routing prefix in IPv6 is like the _____ part in an IPv4 address.

32

The total length of an IPv4 address is _____ bits.

0110

The version number field in IPv6 has the value _____.

An Application Architecture

The way in which application layer functions are spread among computers to deliver service to users is called _____.

Ethernet Switching Table

There is a row for each individual Ethernet Address in a(n) _____.

Bonded T1 Lines

To connect two sites at 2.8Mbps, I would use _____.

A. IP Address B. Data Link Layer Address C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

To deliver an arriving packet to a destination host on a subnet connected to a router, the router needs to know the destination host's _____ before the router can send the packet on to the destination host.

Echo Request

To see if a target host can be reached, you normally would send it an ICMP _____ message.

private IP address ranges

To support NAT, the Internet Assigned Numbers Authority (IANA) has created three sets that can only be used in the firm. 10.x.x.x 192.168.x.x (Most Popular) 172.16.x.x through 172.31.x.x

CSU/DSU

To use a leased line, the customer requires a(n) _____ at each site.

LTE

Today's dominant cellular technology is _____.

A single IPv6 stack could not communicate with a single IPv4 stack.

Today, it can be problematic to have only a single IPv6 stack because _____.

P2P Applications

Transient client presence tends to be a problem in _____.

Data

Two-Way Amplifiers are needed for cable _____ service.

Take Over an Application Program

Typically, the most common way for an attacker to get extensive privileges on a computer is to _____.

Application

Users are primarily concerned with the _____ layer.

Always

VOIP _____ uses the Internet Protocol for Transmission.

Codecs

VoIP users have _____ in their phones or on their computers.

at the ends of leased lines.

WAN optimization devices are deployed _____.

A. Network Protocol Acceleration B. Caching C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

WAN optimization provides _____.

It broadcasts them.

What does a router do with Address Resolution Protocol request messages?

None of the Above

What is pushing IPv6 adoption now?

There Is No Almost Universal Standard for End-To-End Encryption.

What is the almost universal standard for end-to-end encryption?

3 Gbps

What speed does the LTE Advanced standard require downstream?

One-Pair Voice-Graded UTP

What transmission medium do ALL DSL services use?

Routing

When a router forwards incoming packets closer to their destination hosts, this is _____.

To The Sender's E-Mail Server

When an e-mail user encrypts an outgoing message with SSL/TLS, How far will this encryption extend?

Differentiated Services Control Point

Which IPv4 header field is used to specify quality of service?

IPsec

Which has stronger security?

UDP

Which header comes SECOND in a VoIP Transport Packet?

Host Part

Which is NOT one of the three parts of a public IPv6 unicast address?

We have run out of them.

Which is a problem with IPv4 addresses?

SSL/TLS

Which is less expensive to implement?

Leased Lines

Which lines run from one customer premise to another?

A. Being In A Moving Car. B. Being Far From the Cellsite. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - C. Both A and B.

Which of the following affects what throughput an individual user will receive?

IPv4

Which of the following allows routers to check for errors in the header when a packet arrives?

Web-Enabled E-Mail

Which of the following allows you to read your e-mail easily on an Internet cafe's computer?

1-Pair VG UTP

Which of the following already runs to nearly all customer premises?

A. Private IP Addresses B. Public IP Addresses C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Which of the following can be used within a firm?

EIGRP

Which of the following can route non-IP packets?

Customer Premises Equipment

Which of the following does the carrier NOT own?

A. To Connect Corporate Sites B. To Connect a Corporate Site to the Internet C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Which of the following is a common use for carrier WANS?

10.x.x.x

Which of the following is a private IP address range?

SETI@Home

Which of the following is a process-sharing application?

Underutilized Processing Capacity of Clients PCs

Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?

A. Cable Modem Service Companies B. ADSL Service Companies C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Which of the following is moving toward FTTH?

Subnet Part

Which of the following is one of the three parts of an IPv4 address?

A. It can enhance security. B. It presents problems for some protocols. C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Which of the following is true about NAT?

HTML

Which of the following is used to define webpage bodies?

HTTP

Which of the following is used to retrieve Web Pages?

Antivirus Software on the Mail Server

Which of the following offers more reliable antivirus protection?

PGP

Which of the following provides end-to-end encryption?

SIP

Which of the following signaling standards is likely to dominate in VoIP?

IPsec

Which of the following standards permits central management?

Login, Signaling, Transport

Which of the following steps are done in order during a call with Skype?

A. Number of Rows in Routing Table B. System Uptime (Since Last Reboot) C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B

Which of the following would be an SNMP object?

Number of Rows in Routing Table

Which of the following would be an SNMP object?

254

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?

65,534

Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have per subnet?

8

Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be?

DNS

_____ is a general naming system for the Internet.

NAT

_____ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.

ICMP

_____ is used for supervisory messages at the internet layer.

Extended service set (ESS)

a group of BSSs that are both connected to the same distribution system and all of the access points have the same SSID

Frame

a long series of 1s and 0s

Dead zone

a receiver cannot get a signal if there is a dense object blocking the direct path between sender and itself. Also known as shadow zone or dead spot

community name

a secret name the manger and all managed devices had to be configured to for SNMP Set Security.

RJ-45 connector

a snap-in connector that 4-pair UTP uses

Cladding

a thin glass cylinder surrounding the core. light never enters it. 125 micron diameter

Distribution system (DS)

a wired Ethernet LAN which access points connect to

Multiuser MIMO (MU-MIMO)

access points focus on two wireless devices at the same time. With focused transmissions, it can communicate with two or more devices at the same time, eliminating time device has to wait before transmitting

security associations (SAs)

agreements about what security methods and options the two devices will use when the communicate.

Access point

an 802.11 wireless access point, which wireless clients communicate wirelessly (by radio) to

domain

any group of resources (routers, single networks and hosts) under the control of an organization.

Collision avoidance (CA)

attempts to avoid two devices transmitting at the same time. Adds a random delay time to decide which device may transmit first. Works, but is inefficient because it adds a dead time when no one is transmitting

Channel bandwidth

bandwidth of individual channels. Must be wide enough for a signal's bandwidth

4-pair unshielded twisted pair (UTP) copper wire

carries electronic signals over copper wire

Optical fiber

carries light signals through very thin glass tubes

Normal radio transmission

channel bandwidths are limited to the speed requirements of the user's signal to allow as many channels as possible.

Unlicensed radio bands

company can add or drop access points at any time, as well as having as many wireless hosts as it wishes. All 802.11 Wi-Fi networks operate in these

Top-Level Domain

".com" is a _____.

Top-Level Domain

".edu" is a _____.

Microns

(micrometers or um)

Tag fields (two)

-first indicates frame is tagged -seconds gives tagged information

Control functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

A) traditional routing

MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on

A) transparent to

IPv6 global unicast addresses

single host address that can be transmitted over the internet. Three Parts routing prefix- lets router on the Internet route packets to an organization. subnet ID- lets routers within a firm route packets to individual subnets within a firm. interface ID- identifies and individual host in the firm.

Modal dispersion

slightly different times of arrival due to traveling different distances

Baseband signal

the original signal that's energy is spread over a much broader channel than is required

Management Information Base (MIB)

the place where managers retrieve information from agents on managed devices is stored.

Amplitude

the strength of the signal

In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above

B) before the packet arrives

To connect two sites at 2.8 Mbps, I would use ________. A) a T1 line B) bonded T1 lines C) a T2 line D) a T3 line

B) bonded T1 lines

Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B

B) business

Which of the following DSL services usually offers QoS guarantees? A) residential B) business C) both A and B D) neither A nor B

B) business

In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier

B) cellsite

The creation of routing tables for a router is an example of ________. A) forwarding B) control C) both A and B D) neither A nor B

B) control

Which of the following does the carrier NOT own? A) the network core B) customer premises equipment C) both A and B D) neither A nor B

B) customer premises equipment

Two-way amplifiers are needed for cable ________ service. A) television B) data C) both A and B D) neither A nor B

B) data

In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B

B) first label-switching router

MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B

B) label number

OpenFlow can be used to standardize ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

B) southbound APIs


Kaugnay na mga set ng pag-aaral

Fundamentals of Criminal Law Chapter 2

View Set

PREPU (UNFINISHED) Chapter 18: CNS Stimulants

View Set

Basic Information Final Exam Review

View Set

A200 Final Exam Polling Questions

View Set

World Religions Today Ch4: Christianity

View Set