IS302 Exam 2 Ch 6-10

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Why is low speed and short distance good in the Internet of Things?

"Slow and close" communication extends battery life.

What three operational security threats must PSK users consider?

(1) Change the pre-shared key when a person leaves a company (2) Create a guest account to provide temporary access to outsiders as appropriate. (3) Create a strong pass-phrase

Distinguish between evil twin access points and rogue access points.

(1) Evil twin access points are typically laptops with software to impersonate a real access point. (2) A rogue access point is an unauthorized access point set up within a firm which typically has poor or no security

Compare the relative benefits of the two types of Classic Bluetooth.

(1) Extended Data Rate (EDR) @ 3Mbps provides good performance at modest power (2) High Speed (HS) @ 24Mbps provides brief high-speed transfers at modest power ( good form occasional file transfers )

Distinguish between link security and end-to-end security.

(1) Link security on the link between the wireless client and the wireless access point. (2) End-to-end security all the way between the wireless client and the server on the wired LAN (or a server on the Internet).

How does near field communication differ from normal radio communication?

(1) Radio communication - transmits out by producing electromagnetic waves that propagate away ( and do not come back ) (2) Near Field Communication - pulses waves outward a very short distance, then they are reabsorbed back into the antenna ( Waves Surges Out and then Back - in radio they do not surge back )

How are VPNs able to defeat evil twin attacks? Explain in detail.

(1) the client and server encrypt all communications within a pre-shared VPN key that is never transmitted ( it is pre-shared). (2) When the client transmits it first encrypts its message with the VPN key. (3) The evil twin intercepts the message, but since it never gets the the pre-shared VPN key, it cannot decrypt the message, so it cannot read it.

high speed bluetooth

-2 to 3 Mbps -capable to switch on the high speed connection for downloading any webpage etc. -second ratio in high speed bluetooth has a speed of about 24 Mbps -uses radio transmission technology to cover greater distance -runs on one-to-one mode, cannot use access points

What use was 802.11i PSK (pre-shared key) mode created for?

-home use -business use (single access point)

What devices know the unshared session key?

-host machine -access point

Advantages of Carrier Ethernet

-low cost-familiarity of the technology-high speeds-speed agility

Why is WPS desirable?

-simplifies the configuration of wireless clients in making the connection easier with access points -user has to only know the pin,8 digits long -WPS is a default turned on at access points

Classic bluetooth

-speeds up to 2 or 3 Mbps -satisfactory speed for wireless mice and other devices -satisfactory speed for voice communication -covers distance of about 10 meters -batteries run a long time

How does centralized management provide for the detection of rogue access points?

1) By sending SNMP traps when it detects the signal of a nearby unauthorized access point. (2) By asking an access point for the EUI-48 addresses of nearby access points. It can see one if these is not authorized.

Describe the process by which access point locations are determined.

1) Determine how far signals should travel to find the radius of service around each access point. (2) Use architecture drawings to lay out 10 meter circles that cover all points in the building. (3) Make adjustments for thick walls, filing cabinets, or other obstructions

What cryptographic protections do 802.11i provide?

1. initial authentication 2. message-by-message confidentiality/integrity/authentication

1 Watt represents a dBm value of about ________.

30

A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels.

9

A router will discard a packet if the TTL value reaches ________. A) 0 B) 1 C) 128 D) 256

A) 0

If there is an access point that serves eight wireless hosts, on how many channels will these devices transmit and receive during the course of an hour or two? A) 1 B) 2 C) 8 D) 9

A) 1

In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches? A) 1 B) 47 C) 30,451 D) The default row.

A) 1

If the sending host does not do MTU discovery, the largest packet it can send is ________. A) 1,280 octets B) 65,536 octets C) 65,536 octets minus the 40 octets of the main headers D) None of the above. The sending host must do MTU discovery.

A) 1,280 octets

Many "T1" lines that carriers provide today use ________ in the local loop. A) 1-pair voice-grade UTP B) 2-pair voice-grade UTP C) 1-pair data-grade UTP D) 2-pair data-grade UTP

A) 1-pair voice-grade UTP

There is an access point that serves eight wireless hosts. On how many channels will these devices transmit during the course of an hour or two? A) 1. B) 2 (one in each direction). C) 7. D) 8. E) 9.

A) 1.

Which of the following is in Frame Relay's speed range? A) 10 Mps. B) 100 Mbps. C) Both A and B D) Neither A nor B

A) 10 Mps.

Which of the following is a private IP address range? A) 10.x.x.x. B) 128.171.x.x. C) Both A and B D) Neither A nor B

A) 10.x.x.x.

If you have a subnet part of 7 bits, how many subnets can you have? A) 126 B) 254 C) 510 D) none of the above

A) 126

Which of the following is a fractional T1 line speed? A) 128 kbps. B) 1 Mbps. C) Both A and B D) Neither A nor B

A) 128 kbps.

In the mask /14, how many 1s are there? A) 14 B) 16 C) 24 D) None of the above

A) 14

Which unlicensed band is defined the same way in most countries around the world? A) 2.4 GHz. B) 5 GHz. C) Both A and B D) None of the above.

A) 2.4 GHz.

Which unlicensed band provides greater propagation distance for a given level of power? A) 2.4 GHz. B) 5 GHz. C) Both A and B allow about the same propagation distance.

A) 2.4 GHz.

T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps

A) 250 kbps

Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /14 and the reliability metric 10. Which row will the router choose if both are matches? A) 2707. B) 4400. C) Either A or B D) The router will choose the default row.

A) 2707

Row 2707 has the mask /16 and the speed metric 20. Row 4400 has the mask /16 and the speed metric 10. Which row will the router choose if both are matches? A) 2707. B) 4400. C) Either A or B D) The router will choose the default row.

A) 2707

The network part of an IP address is ________ bits long. A) 8 B) 16 C) 32 D) We cannot say.

A) 8

I wish to have a wireless LAN to serve my house. I will use ________. A) 802.11 B) Bluetooth C) either A or B

A) 802.11

Which of the following can use access points? A) 802.11 B) Bluetooth C) both A and B D) neither A nor B

A) 802.11

Which of the following is a reason that 802.11a is more efficient than 802.11g when both operate at the same data rate? A) 802.11a does not have to support legacy devices B) 802.11a devices can handle more data C) 802.11a equipment is more sophisticated and expensive D) 802.11a encoding is more efficient

A) 802.11a does not have to support legacy devices

Which of the following can operate in the 5 GHz band? A) 802.11ac B) 802.11g C) Both A and B D) Neither A nor B

A) 802.11ac

What is the strongest security protocol for 802.11 today? A) 802.11i B) 802.11s C) 802.11X D) WPA

A) 802.11i

In what mode of 802.11i operation is a central authentication server used? A) 802.1X mode B) PSK mode C) both A and B D) neither A nor B

A) 802.1X mode

For ADSL service, which of the following typically must be added to the telephone system? A) A DSLAM. B) A transmission line to the customer premises. C) Both A and B D) Neither A nor B

A) A DSLAM.

When two devices communicate using NFC, how close must they be? A) A few inches B) Up to 50 feet C) Up to 5 feet D) Up to 10 feet

A) A few inches

What propagation problem becomes worse as frequency increases? A) Absorptive attenuation. B) Electromagnetic interference. C) Both A and B D) Neither A nor B

A) Absorptive attenuation.

Which of the following is more efficient and faster? A) CSMA/CA+ACK. B) RTS/CTS. C) Both are about equally efficient.

A) CSMA/CA+ACK.

Which of the following are usually given dynamic IP addresses? A) Clients. B) Servers. C) Both A and B D) Neither A nor B

A) Clients.

802.11i 802.1X initial authentication mode was created for ______ A) Corporations with multiple access points B) Corporations with less than eight access points C) Residences with a single access point D) Residences with more than eight access points

A) Corporations with multiple access points

In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B

A) E-Line

In ________, switching decisions are based on destination addresses. A) Ethernet B) PSDNs that use virtual circuits C) Both A and B D) Neither A nor B

A) Ethernet

A(n) ________ must find the best-matching row in its ________ table by comparing several row matches. A) Ethernet switch, switching B) router, routing C) Both A and B D) Neither A not B

A) Ethernet switch, switching

The IEEE calls 64-bit interface addresses ________. A) Extended Unique Identifiers B) Interface IDs C) Both A and B

A) Extended Unique Identifiers

A TCP ________ segment is a request to close a connection. A) FIN B) ACK C) Close D) Disconnect

A) FIN

Four-way closes use ________ segments. A) FIN B) RST C) Both A and B D) Neither A nor B

A) FIN

Which of the following segments is not acknowledged? A) FIN. B) RST. C) Both of the above are acknowledged. D) Neither A nor B is acknowledged.

A) FIN

Which of the following offers speeds that match speed range of greatest corporate demand for WAN transmission? A) Frame Relay. B) ATM. C) Both A and B D) Neither A nor B

A) Frame Relay.

In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) Neither A nor B

A) Get

Which of the following standards provides for central management? A) IPsec. B) SSL/TLS. C) Both A and B D) Neither A nor B

A) IPsec

Which of the following allows routers to check for errors in the header when a packet arrives? A) IPv4. B) IPv6. C) Both A and B D) Neither A nor B

A) IPv4

Which of the following permits fragmentation by routers along a packet's route? A) IPv4. B) IPv6. C) Both A and B D) Neither A nor B

A) IPv4

The neighbor advertisement protocol message was created to give the ________ address of the host sending the message. A) IPv6 B) IPv4 C) Both A and B D) Neither A nor B

A) IPv6

The downside of unlicensed bands is potential _____ A) Interference from others B) Less-developed standards C) Speed loss D) Loss of flexibility

A) Interference from others

What does a router do with ARP request messages? A) It broadcasts them. B) It sends them directly to the destination host. C) Both A and B D) Neither A nor B

A) It broadcasts them.

A company has more control over its ________ technology. A) LAN B) WAN

A) LAN

A network that runs on the customer premises is a ________. A) LAN B) WAN C) Both A and B D) Neither A nor B

A) LAN

Which of the following usually offers higher speeds? A) LANs. B) WANs. C) Both A and B are about equal in typical speeds.

A) LANs.

Today's dominant cellular technology is ________. A) LTE B) 3G C) HSPA+ D) MTSO

A) LTE

According to the ITU, which of the following can be advertised as 4G? A) LTE. B) HSPA+. C) Both A and B D) Neither A nor B

A) LTE.

Wireless LAN standards come from ________. A) OSI B) TCP/IP C) both A and B D) neither A nor B

A) OSI

Wireless network standards come from ________. A) OSI B) TCP/IP C) Both A and B D) Neither A nor B

A) OSI

________ is an interior dynamic routing protocol. A) OSPF B) BGP C) both A and B D) neither A nor B

A) OSPF

A group of devices on a desk that communicate wirelessly is called a ____ A) PAN B) MAN C) WAN D) LAN

A) PAN

A customer's leased line to its ISP connects to the ISP's ________. A) POP B) NAP C) CSU/DSU D) interface

A) POP

Which TCP/IP interior dynamic routing protocol is good for small internets if security is not a serious concern? A) RIP. B) BGP. C) OSPF. D) Both A and C

A) RIP

________ is an interior dynamic routing protocol. A) RIP B) BGP C) Both A and B D) Neither A nor B

A) RIP

Which of the following DSL services does not offer QoS guarantees? A) Residential. B) Business. C) Both A and B D) Neither A nor B

A) Residential.

For 100,000 addresses, which will have fewer rows? A) Router table. B) Ethernet switch table. C) Both will be about the same length.

A) Router table.

Which is less expensive to implement? A) SSL/TLS. B) IPsec. C) Both cost about the same to implement.

A) SSL/TLS.

Which of the following is one of the three parts of an IP address? A) Subnet part. B) Mask. C) Both A and B D) Neither A nor B

A) Subnet part

Which of the following are more widely used? A) T1 lines. B) SONET lines. C) Both are used about equally.

A) T1 lines.

Which of the following can handle an application message that is one megabyte in size? A) TCP. B) UDP. C) Both A and B D) Neither A nor B

A) TCP

Which of the following is reliable? A) TCP. B) UDP. C) Both A and B D) Neither A nor B

A) TCP

Which of the following is reliable? A) TCP B) IP C) Both A and B D) Neither A nor B

A) TCP

What aspect of 802.11 standards affects interference between nearby access points? A) The number of possible nonoverlapping channels. B) The standard's minimum spacing parameter. C) RTS/CTS. D) All of the above.

A) The number of possible nonoverlapping channels.

What happens if two nearby access points use the same channel? A) They will interfere with each other. B) They will be bonded for joint operation automatically. C) They will be bonded for joint operation automatically if they use CSMA/CA+ACK. D) They will be bonded for joint operation automatically if they use RTS/CTS.

A) They will interfere with each other.

As a wireless host moves farther from a wireless access point, it is likely to transition to a slower modulation method. A) True. B) False.

A) True.

CSMA/CA+ACK is reliable. A) True. B) False.

A) True.

In 802.11 WLANs, the terms handoff and roaming mean the same thing. A) True. B) False.

A) True.

Individual throughput falls as the number of wireless hosts using an access point increases. A) True. B) False.

A) True.

The signal strength at 20 meters is 90 mW the signal strength at 60 meters would be 10 mW. A) True. B) False.

A) True.

When a wireless NIC receives a frame correctly, it immediately sends back a reply without listening for traffic. A) True. B) False.

A) True.

Which of the following is not true in regard to upgrading to Wi-Fi 6? A) Upgrading Wi-Fi routers and access points is a must B) Supports faster speeds C) Compatible with previous versions of wi-fi D) There are not additional infrastructure upgrades required

A) Upgrading Wi-Fi routers and access points is a must

Wi-Fi is a term used by the ________. A) Wi-Fi Alliance B) IEEE C) both A and B D) neither A nor B

A) Wi-Fi Alliance

If a radio transmission is easily blocked by obstacles, then you need to maintain ________. A) a clear line of sight B) spread spectrum transmission integrity C) broadband transmission D) deep transmission E) shadow zone transmission

A) a clear line of sight

In caching, ________. A) a message may not have to be transmitted B) messages are cached at the transmitting end of the line C) both A and B D) neither A nor B

A) a message may not have to be transmitted

Service quality issues with the Internet can be addressed by using ________. A) a single ISP B) multiple ISPs

A) a single ISP

What propagation problem is especially bad in moist air? A) absorptive attenuation B) electromagnetic interference C) multipath interference D) inverse square law attenuation

A) absorptive attenuation

In 802.11i, protection is provided between the client and the ________. A) access point B) switch C) router D) server

A) access point

A rogue access point is created by ________. A) an employee B) an external attacker C) the IT security department D) an evil twin

A) an employee

Cellular telephony uses ________. A) an omnidirectional antenna B) a dish antenna C) Both A and B D) Neither A nor B

A) an omnidirectional antenna

WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the PSDN carrier

A) at the ends of leased lines

Leased lines standards are most different around the world at speeds ________. A) below about 50 Mbps B) above about 50 Mbps C) Leased line speeds around the world are about equally different in both speed ranges.

A) below about 50 Mbps

One-bit fields are called ________ fields. A) binary B) flag C) ACK D) None of the above

A) binary

In CSMA/CA, CS means ________. A) carrier sense B) carriage suspension C) cancel sending D) counter-source

A) carrier sense

In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B

A) cell

In the 60 GHz service band, ________. A) channel bandwidth can be very wide B) signals travel farther C) Both A and B D) Neither A nor B

A) channel bandwidth can be very wide

To handle multiple conversations in radio transmission, you use multiple ________. A) channels B) frequencies C) service bands D) UWBs E) wires

A) channels

Which form of Bluetooth has a typical transmission speed of less than 3 Mbps? A) classic Bluetooth B) high-speed Bluetooth C) personal Bluetooth D) none of the above

A) classic Bluetooth

SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above

A) community names

SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of these

A) community names

Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) Both A and B D) Neither A nor B

A) companies lack rights of way

Smart antennas can ________. A) direct signal strength at individual wireless hosts B) transmit multiple spatial data streams in the same channel C) Both A and B D) Neither A nor B

A) direct signal strength at individual wireless hosts

Breaking into WLANs from outside the premises is ________. A) drive-by hacking B) war driving

A) drive-by hacking

In MPLS, the interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) on the basis of the previous packet going to the packet's IP address. D) None of the above

A) during the router's routing process

Pinging sends ICMP ________ messages to the target host. A) echo B) error advisement C) Both A and B D) Neither A nor B

A) echo

To see if a target host can be reached, you normally would send it an ICMP ________ message. A) echo B) error advisement C) Both A and B D) Neither A nor B

A) echo

To see if a target host can be reached, you normally would send it an ICMP ________ message. A) echo request B) error advisement C) either echo request or error advisement D) neither echo request nor error advisement

A) echo request

The Wi-Fi Alliance calls 802.1X mode ________ mode. A) enterprise B) personal C) WEP D) WPA

A) enterprise

A notebook computer configured to act like a real access point is a(n) ________. A) evil twin access point B) rogue access point

A) evil twin access point

Leased lines offer ________ service. A) fast B) any-to-any C) rapid-connection D) none of the above

A) fast

Compared to normal routing, decision caching is ________. A) faster B) less dangerous C) Both A and B D) Neither A nor B

A) faster

Compared to ADSL service, cable modem service typically is ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive

A) faster and more expensive

According to the IETF standards, if a router receives a series of packets from the same IP address to the same IP address, it should ________. A) go through the entire process for each packet B) cache the decision made for the first packet and use this decision on subsequent packets C) skip the first step in the routing process but go through other steps for each subsequent packet D) None of the above

A) go through the entire process for each packet

The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B

A) higher speed

Metropolitan area Ethernet is used primarily ________. A) in MANs B) to link sites in distant cities C) Both A and B D) Neither A nor B

A) in MANs

MIMO ________. A) increases throughput B) lowers propagation distance C) Both A and B D) Neither A nor B

A) increases throughput

If more users move to an access point, this decreases ________. A) individual throughput B) aggregate throughput C) Both A and B D) Neither A nor B

A) individual throughput

A company is free to select whatever ________ dynamic routing protocol it wishes. A) interior B) exterior C) both interior and exterior D) neither interior nor exterior

A) interior

An autonomous system is free to select whatever ________ dynamic routing protocol it wishes. A) interior B) exterior C) Both A and B

A) interior

Spread spectrum transmission is used in WLANs because ________. A) it is required by regulators B) it offers strong security C) Both A and B D) Neither A nor B

A) it is required by regulators

Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B

A) leased lines

Interference is minimized in ________. A) licensed bands B) unlicensed bands

A) licensed bands

A WAN is a network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) All of the above

A) links different sites together

Session keys are used to ________. A) make cryptanalysis more difficult B) improve authentication C) both A and B D) neither A nor B

A) make cryptanalysis more difficult

In SNMP, the ________ creates commands. A) manager B) agent C) Both A and B D) Neither A nor B

A) manager

Companies are moving to the 5 GHz band because there is ________ than in the 2.5 GHz band. A) more bandwidth B) less absorptive attenuation C) both A and B D) neither A nor B

A) more bandwidth

In an extended service set, each access point ________. A) must have the same SSID B) must have different SSIDs C) must have coordinated SSIDs D) none of the above

A) must have the same SSID

The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) Both A and B

A) network

In a network mask, the 1s correspond to the ________. A) network part B) subnet part C) host part D) None of the above

A) network part

Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

A) northbound APIs

Carrier access lines to residential buildings typically use ________. A) one-pair voice-grade UTP B) two-pair voice-grade UTP C) two-pair data-grade UTP D) four-pair UTP

A) one-pair voice-grade UTP

Mesh networking in 802.11 is likely to use ________. A) only wireless devices B) wireless devices and the site's wired LAN C) Both A and B

A) only wireless devices

SONET/SDH lines use ________. A) optical fiber B) high-quality forms of data-grade UTP C) Both A and B D) Neither A nor B

A) optical fiber

Leased lines are ________. A) point-to-point lines between two premises B) always on C) Both A and B D) Neither A nor B

A) point-to-point lines between two premises

The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. A) protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B

A) protection over only part of the route

MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces

A) reduces

SDN ________. A) reduces CapEx B) increases OPEx C) both A and B D) neither A nor B

A) reduces CapEx

The use of virtual circuits ________. A) reduces costs B) improves reliability C) Both A and B D) Neither A nor B

A) reduces costs

CSMA/CA+ACK usually is ________. A) required B) optional C) not important D) efficient

A) required/mandatory

When a cellular customer moves from one city to another, this is ________. A) roaming B) a handoff C) Both A and B D) Neither A nor B

A) roaming

The highest-level DNS servers are called ________. A) root servers B) top-level servers C) Both A and B D) Neither A nor B

A) root servers

Dynamic _____ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) none of the above

A) routing

Dynamic ________ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) None of the above

A) routing

When a router forwards incoming packets closer to their destination hosts, this is ________. A) routing B) switching C) bridging D) hopping

A) routing

Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) Both A and B D) Neither A nor B

A) running optical fiber to neighborhoods

Wireless access points typically link wireless clients to ________. A) servers on the wired network B) wireless servers C) both A and B

A) servers on the wired network

Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater speed D) All of the above

A) service for more customers

NAT enhances security by preventing ________. A) sniffers from learning internal IP addresses B) encryption C) Both A and B D) Neither A nor B

A) sniffers from learning internal IP addresses

An internal router only connects different IP ________. A) subnets B) networks C) Both A and B D) Neither A nor B

A) subnets

LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) the slow corporate adoption of newer WAN technologies D) economics

A) technological limitations

Using the Internet as a WAN is attractive because of ________. A) the Internet's low cost per bit B) the Internet's service quality C) Both A and B D) Neither A nor B

A) the Internet's low cost per bit

In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manager

A) the SDN controller

Wireless network standards operate at ________. A) the data link layer B) the internet layer C) Both A and B D) Neither A nor B

A) the data link layer. The data link layer and the physical layer.

Which of the following uses an access point? A) traditional Wi-Fi B) Wi-Fi Direct C) both A and B D) neither A nor B

A) traditional Wi-Fi

Control functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

A) traditional routing

MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on

A) transparent to

Client PCs must have digital certificates in ________. A) transport mode B) tunnel mode C) Both A and B D) Neither A nor B

A) transport mode

Which mode of IPsec may be more expensive if a company has a large number of computers? A) transport mode B) tunnel mode C) Both transport mode and tunnel mode are equally expensive.

A) transport mode

In stateless autoconfiguration, providing the address of DNS servers is ________. A) unnecessary B) mandatory C) optional D) impossible

A) unnecessary

In unlicensed bands, ________. A) you can use radios wherever you please B) you can prevent nearby businesses from setting up access points in the same channel C) Both A and B D) Neither A nor B

A) you can use radios wherever you please

The DNS ________ record is for the host name's ________ address

A, IPv4

Southbound APIs

APIs between the controller and forwarding devices

If someone says that a 1-bit flag is set, this means that it is given the value ________. A) 0 B) 1 C) Either of the above

B) 1

Which of the following already runs to nearly all customer premises? A) 4-pair UTP. B) 1-pair VG UTP. C) 1-pair DG UTP. D) None of the above

B) 1-pair VG UTP.

E1 leased lines run at a speed of about ________. A) 250 kbps B) 2 Mbps C) 34 Mbps D) 45 Mbps

B) 2 Mbps

A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission? A) 1. B) 2. C) 3. D) 4. E) There will be one frame for each switch along the way.

B) 2.

If your subnet part is 8 bits long, you can have ________ subnets. A) 128 B) 254 C) 256 D) 64

B) 254

The 2.4 GHz band supports ________ nonoverlapping channels. A) 1 B) 3 C) 7 D) 11 E) more than 11

B) 3

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits. B) 32 bits. C) 64 bits. D) We cannot say.

B) 32 bits.

The main version of Internet Protocol in use today is IP version ________. A) 1 B) 4 C) 5 D) 6

B) 4

802.11g has a rated speed of ________. A) 11 Mbps B) 54 Gbps C) 300 Mbps D) 1 Gbps

B) 54 Gbps

In an IPv6 global unicast address, the interface ID is ________ bits long. A) less than 32 B) 64 C) 128 D) We cannot say.

B) 64

Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? A) 6 B) 8 C) 7 D) 5

B) 8

802.1X requires security between the supplicant and the authenticator in ________. A) Ethernet B) 802.11 C) both A and B D) neither A nor B

B) 802.11

Which of the following brings gigabit speeds to clients? A) 802.11n B) 802.11ac C) 802.11g D) None of the above

B) 802.11ac

If an 802.11n access point and an 802.11g client communicate, they communicate using ________. A) 802.11n B) 802.11g C) Either A or B D) Neither A nor B

B) 802.11g

Which offers stronger security? A) WPA B) 802.11i C) Both A and B offer equally strong security.

B) 802.11i

If a firm has many access points, it should use ________ mode in 802.11i. A) PSK B) 802.1X C) IPsec D) PEAP

B) 802.1X

In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) Both A and B D) Neither A nor B

B) ADSL modem

Which of the following was created for PANs? A) 802.11 B) Bluetooth C) both A and B D) neither A nor B

B) Bluetooth

Which of the following DSL services tend to be symmetric in speed? A) Residential. B) Business. C) Both A and B D) Neither A nor B

B) Business.

Which of the following DSL services usually offers QoS guarantees? A) Residential. B) Business. C) Both A and B D) Neither A nor B

B) Business.

If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________. A) traditional cellular technology B) CDMA C) Both A and B D) Neither A nor B

B) CDMA

The PSDN technology that is growing rapidly today is ________. A) Frame Relay B) Carrier Ethernet C) the Internet D) No PSDN technology is growing rapidly today.

B) Carrier Ethernet

To handle multiple conversations in 802.11 transmission, you normally use multiple A) Service bands B) Channels C) Frequencies D) Wires

B) Channels

Which of the following does the carrier NOT own? A) The network core. B) Customer premises equipment. C) Both A and B D) Neither A nor B

B) Customer premises equipment.

Clients normally get their IP addresses from ________. A) DNS servers B) DHCP servers C) directory servers D) identity servers

B) DHCP servers

________ is a general naming system for the Internet. A) NAT B) DNS C) Both A and B D) Neither A nor B

B) DNS

Which of the following can route non-IP packets? A) OSPF B) EIGRP C) both OSPF and EIGRP D) neither OSPFA nor EIGRP

B) EIGRP

Which of the following can route non-IP packets? A) OSPF. B) EIGRP. C) Both A and B D) Neither A nor B

B) EIGRP

There is a row for each address in a(n) ________. A) Router table B) Ethernet switch table C) Both of the above D) Neither A nor B

B) Ethernet switch table

Access points take frames from wireless devices and send these frames on to devices on the wired LAN. They also do the converse. A) True. B) False.

B) False.

An access point and a host it serves can transmit to each other simultaneously. A) True. B) False.

B) False.

Radio has more reliable transmission than UTP. A) True. B) False.

B) False.

Spread spectrum transmission is used in commercial WLANs for security reasons. A) True. B) False.

B) False.

The most rapidly growing 802.11 LAN standard today is 802.11g. A) True. B) False.

B) False.

The most widely used 802.11 LAN standard today is 802.11n. A) True. B) False.

B) False.

The terms channel and service band mean roughly the same thing. A) True. B) False.

B) False.

There is less interference in the 2.4 GHz band than in the 5 GHz band. A) True. B) False.

B) False. More interference

In SNMP, the manager can create ________. A) traps B) GET commands C) Both A and B D) Neither A nor B

B) GET commands

When actively connected and using a WLAN while roaming in an ESS, the process of connecting to a new AP and disconnecting from another AP in one's path is called ______________. A) MIMO B) Handoff C) Switching D) Nomadic

B) Handoff

Which of the following is connectionless? A) TCP B) IP C) Both A and B D) Neither A nor B

B) IP

________ operates at the internet layer. A) TCP B) IP C) Both A and B D) Neither A nor B

B) IP

Which has stronger security? A) SSL/TLS. B) IPsec. C) Both have about equal security.

B) IPsec.

On what full 4G standard are carriers converging? A) LTE. B) LTE Advanced. C) HSPA+. D) None of the above

B) LTE Advanced.

Which of the following offers true 4G speeds? A) LTE. B) LTE Advanced. C) HSPA+. D) All of the above

B) LTE Advanced.

________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) None of the above

B) NAT

Local loop access lines to business use which of the following transmission media? A) 1-pair data-grade UTP. B) Optical fiber. C) Both A and B D) Neither A nor B

B) Optical fiber.

In 802.11i ________, hosts must know a shared initial key. A) 802.1X mode B) PSK mode C) both A and B D) neither A nor B

B) PSK mode

The 802.11e amendment made a change to the MAC layer to enable WLAN traffic to be prioritized. This is generally referred to as___________. A) RSNA B) QoS C) VoWLAN D) WPA2

B) QoS

Which of the following is usually optional in access point operation? A) CSMA/CA+ACK. B) RTS/CTS. C) Both A and B D) Neither A nor B

B) RTS/CTS.

To use an access point, you need to know its ________. A) BSSID B) SSID C) Wi-Fi ID D) ESSID

B) SSID

What is the main problem the 802.11ax standard of Wi-Fi 6 addresses? A) Ease of use B) Security C) Large number of devices D) Speed

B) Security

When a wireless NIC wishes to transmit, it listens for traffic. If there is traffic, it waits. If there is no traffic, it may transmit. A) True. B) Sometimes true. C) False.

B) Sometimes true.

How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.

B) They lease them from telephone companies.

Which mode of IPsec is more expensive? A) Transport mode. B) Tunnel mode. C) Both A and B are equally expensive.

B) Tunnel mode.

Which of the following is connectionless? A) TCP. B) UDP. C) Both A and B D) Neither A nor B

B) UDP

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? A) VLANs B) VPNs C) PEAP D) 802.1X mode

B) VPNs

The Internet is a ________. A) LAN B) WAN C) Both A and B D) Neither A nor B

B) WAN

Which of the following has more diversity in technologies? A) LANs. B) WANs. C) Both A and B are about equal in diversity of technologies.

B) WANs.

Compared to wired transmission, propagation problems in radio transmissions are _____ A) Better B) Worse C) About as bad

B) Worse

The other wireless device is far away in a known direction. You should use ________. A) an omnidirectional antenna B) a dish antenna C) Both A and B D) Neither A nor B

B) a dish antenna

When a cellular customer moves from one cell in a city to another cell in the same city, this is ________. A) cell switching B) a handoff C) cell hopping D) roaming

B) a handoff

In SNMP, the ________ creates responses. A) manager B) agent C) Both A and B D) Neither A nor B

B) agent

In SNMP, the ________ creates traps. A) manager B) agent C) Both A and B D) Neither A nor B

B) agent

In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) Both A and B D) Neither A nor B

B) agent

An 802.11g access point has an actual speed of 30 MHz. This is ________. A) the rated speed B) aggregate throughput C) channel bandwidth

B) aggregate throughput

A router's load-balancing process is determined by ________. A) the SDN controller B) an SDN application C) the router D) any of the above

B) an SDN application

Which of the following is usually set up by a hacker outside the building? A) a rogue access point B) an evil twin access point C) both A and B D) neither A nor B

B) an evil twin access point

IPsec protects ________ layer messages. A) data link B) application C) Both A and B D) Neither A nor B

B) application

DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B

B) asymmetric speed

In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above

B) before the packet arrives

To connect two sites at 2.8 Mbps, I would use ________. A) a T1 line B) bonded T1 lines C) a T2 line D) a T3 line

B) bonded T1 lines

To transmit data very rapidly, you would want a ________ channel. A) narrowband B) broadband C) single-frequency band D) Any of the above.

B) broadband

Bluetooth is for ________. A) large WLANs B) cable replacement C) both A and B D) neither A nor B

B) cable replacement

In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier

B) cellsite

The first Step in the Routing process involves ________. A) selecting the best match row B) comparing the packet's destination IP address to all rows C) comparing the packet's destination IP address to matching rows D) selecting an interface

B) comparing the packet's destination IP address to all rows

UDP is ________. A) connection-oriented B) connectionless C) Both A and B D) Neither A nor B

B) connectionless

The creation of routing tables for a router is an example of ________. A) forwarding B) control C) both A and B D) neither A nor B

B) control

Two-way amplifiers are needed for cable ________ service. A) television B) data C) Both A and B D) Neither A nor B

B) data

In IPv6, the payload length gives the number of octets in the ________. A) entire packet B) entire packet minus the main header C) entire packet minus the main and extension headers D) entire packet minus the extension headers

B) entire packet minus the main header

In NAT, the ________ creates new external source IP addresses and port numbers. A) router B) firewall C) source host D) destination host

B) firewall

In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) Both A and B D) Neither A nor B

B) first label-switching router

In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B

B) first label-switching router

The router advertisement protocol may ________. A) give the client an IPv6 address B) forbid the use of stateless autoconfiguration C) Both A and B D) Neither A nor B

B) forbid the use of stateless autoconfiguration

Wireless radio transmission usually is expressed in terms of ________. A) wavelength B) frequency C) Both A and B D) Neither A nor B

B) frequency

Access to a router is needed to create a ________. A) link local IPv6 address B) global unicast IPv6 address C) Both A and B D) Neither A nor B

B) global unicast IPv6 address

If a host to be able to communicate via IPv4 and IPv6, it is said to ________. A) be bilingual B) have a dual stack C) be IPv6 ready D) be fully compliant

B) have a dual stack

Frequency is measured in terms of ________. A) nanometers B) hertz C) Both A and B D) Neither A nor B

B) hertz

For human reading, IPv6 address are written in ________. A) decimal B) hexadecimal C) binary D) Elvish

B) hexadecimal

Which form of Bluetooth has a typical transmission speed of about 24 Mbps? A) classic Bluetooth B) high-speed Bluetooth C) enterprise Bluetooth D) none of the above

B) high-speed Bluetooth

The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________. A) that it provides protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B

B) higher cost

In packet fragmentation and reassembly, the ________ field is used. A) version B) identification C) protocol D) Diff-Serv

B) identification

CSMA/CA+ACK is ________. A) efficient B) inefficient

B) inefficient

The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) We cannot say.

B) interface ID

Label-switching routers base their decisions on a packet's ________. A) IP address B) label number C) Both A and B D) Neither A nor B

B) label number

MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B

B) label number

For human reading, in IPv6 addresses, letters should be written in ________. A) uppercase B) lowercase C) Both A and B D) Neither A nor B

B) lowercase

In the Shannon Equation, C is the ________. A) actual speed of transmission in a channel B) maximum possible speed of transmission in a channel C) minimum possible speed of transmission in a channel D) channel bandwidth E) signal-to-noise ratio

B) maximum possible speed of transmission in a channel

Routers usually are connected in a ________ topology. A) point-to-point B) mesh C) hierarchical D) bus

B) mesh

Spread spectrum transmission is used in WLANs for ________. A) higher transmission speed B) more reliable transmission C) greater security D) All of the above.

B) more reliable transmission

Wi-Fi normally uses a(n) ________. A) dish antenna B) omnidirectional antenna C) both A and B D) neither A nor

B) omnidirectional antenna

Today, it is problematic to have ________. A) only a single IPv4 stack B) only a single IPv6 stack C) a dual stack D) All of the above

B) only a single IPv6 stack

In tunnel mode, IPsec provides protection ________. A) all the way between the two hosts B) only between the IPsec servers C) Both A and B D) Neither A nor B

B) only between the IPsec servers

Access points take ________ from wireless devices and send them on to devices on the wired LAN. They also do the converse. A) frames B) packets

B) packets

Attenuation with distance is faster with ________. A) UTP transmission B) radio transmission C) Both A and B D) Neither A nor B

B) radio transmission

Centralized access point management ________. A) increases management costs but provides better control B) reduces management costs

B) reduces management costs

An unauthorized internal access point is a(n) ________ access point. A) evil twin B) rogue C) shadow D) counterfeit

B) rogue

For a given volume of traffic, which are more expensive? A) switches. B) routers. C) Both of the above are about equally expensive.

B) routers

DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve. A) ranges B) scopes C) spans D) domains

B) scopes

Corporations most wish to have ________ domain names. A) top-level B) second-level C) third-level D) None of the above

B) second-level

Most corporations wish to have ________ domain names. A) top-level B) second-level C) third-level D) None of these

B) second-level

Traditional MIMO can ________ A) send signals to two different clients at the same time B) send multiple signals in the same channel C) Both A and B D) Neither A nor B

B) send multiple signals in the same channel

After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key. A) VPN B) session C) 802.1X D) preshared

B) session

OpenFlow can be used to standardize ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B

B) southbound APIs

Signals usually ________. A) travel at a single frequency B) spread over a range of frequencies

B) spread over a range of frequencies

Servers are normally given ________ IP addresses. A) well-known B) static C) dynamic D) None of the above

B) static

Fragmentation is ________. A) very common B) suspicious because it is often used by hackers C) Both A and B D) Neither A nor B

B) suspicious because it is often used by hackers

The use of options in IP is ________. A) very common B) suspicious because they are often used by hackers C) Both A and B D) Neither A nor B

B) suspicious because they are often used by hackers

At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master? A) the Bluetooth phone B) the Bluetooth headset C) Both are simultaneously masters and slaves.

B) the Bluetooth headset

Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B

B) the Internet

".com" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above

B) top-level domain

".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above

B) top-level domain

A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard. A) command B) trap C) alarm D) All of the above

B) trap

If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s). A) one B) two C) four D) 16

B) two

WLANs normally use ________. A) licensed bands B) unlicensed bands

B) unlicensed bands

Frame Relay frames contain ________. A) destination addresses B) virtual circuit numbers C) Both A and B

B) virtual circuit numbers

To drive around a city looking for working access points that are unprotected is ________. A) drive-by hacking B) war driving

B) war driving

IEEE 802.11ac can use channels with a bandwidth of up to ___________ in order to achieve data rates of up to 6.9 Gbps A) 20 MHz B) 40 MHz C) 160 MHz D) 80 MHz

C) 160 MHz

A 100/1 increase in power corresponds to approximately ________ decibels. A) 6 B) 10 C) 20 D) none of the above

C) 20

In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 8 B) 12 C) 20 D) 128

C) 20

In 802.11, channel bandwidth usually is ________. A) 20 GHz B) 40 GHz C) 20 MHz D) 40 MHz

C) 20 MHz

In the mask 255.255.255.0, how many 1s are there? A) 8 B) 16 C) 24 D) None of the above

C) 24

Deciding how to send the packet back out is Step ________ in the routing process. A) 1 B) 2 C) 3 D) 4

C) 3

What speed does the LTE Advanced standard require downstream? A) 3 Mbps B) 30 Mbps C) 3 Gbps D) 30 Gbps

C) 3 Gbps

1 Watt represents a dBm value of about ________. A) 10 B) 20 C) 30 D) We cannot say because only one power is given.

C) 30

802.11n may offer a rated speed of about ________. A) 11 Mbps B) 54 Mbps C) 300 Mbps D) 3 Gbps

C) 300 Mbps

A mask has ________ bits. A) 8 B) 16 C) 32 D) We cannot say.

C) 32

The total length of an IP address is ________ bits. A) 8 B) 16 C) 32 D) We cannot say.

C) 32

HSPA+ is a ________ service. A) 1G B) 2G C) 3G D) 4G

C) 3G

For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access? A) 1G. B) 2G. C) 3G. D) 4G.

C) 3G.

A firm uses a PSDN. It has four sites. How many leased lines will it need? A) None B) 1 C) 4 D) None of the above

C) 4

For human reading, symbols in IPv6 addresses are written in groups of ________. A) 1 B) 2 C) 4 D) 16

C) 4

Near-field communication has a maximum transmission distance of about ________. A) 400 cm/200 in B) 40 cm/20 in C) 4 cm/2 in D) The devices must be physically touching.

C) 4 cm/2 in

Each frequency channel in an 802.11a WLAN is 20MHz wide and is divided into ___________ subcarriers that are modulated with data. A) 56 B) 114 C) 52 D) 48

C) 52

The maximum mandatory rate of an IEEE 802.11a WLAN, according to the standard, is ____________. A) 11 Mbpsb B) 24 Mbpsc C) 54 Mbpsd D) 108 Mbps

C) 54 Mbpsd

In the 5 GHz band, how many channels can you have with 802.11ac with 80 GHz channels? A) 1 B) 12 C) 6 D) 24

C) 6

In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) None of the above

C) 8

Which 802 working group created 802.11i? A) 802.1 B) 802.3 C) 802.11 D) It was not an 802 working group. It was the Wi-Fi Alliance

C) 802.11

Wireless LAN standards are created by the ________ Working Group. A) 802.1 B) 802.3 C) 802.11 D) 802.3W

C) 802.11

For wireless backup, which of the following is adequate? A) 802.11g B) 802.11n C) 802.11ac D) All of the above

C) 802.11ac

Which of the following can offer speeds of about a gigabit per second? A) 802.11g. B) 802.11n. C) 802.11ac. D) None of the above.

C) 802.11ac.

In ________, the authenticator is the ________. A) 802.1X, wireless access point B) 802.11i, switch C) 802.11i, wireless access point D) 802.1X, central authentication server

C) 802.11i, wireless access point

For which standard is 300 Mbps a typical rated speed? A) 802.11ad. B) 802.11ac. C) 802.11n. D) 802.11g.

C) 802.11n.

A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels. A) 3 B) 6 C) 9 D) none of the above

C) 9

A radio that has a power of 8 mW represents a ratio of about ________ dBm. A) 2 B) 8 C) 9 D) 10

C) 9

Bluetooth is standardized by the ________. A) 802.11 Working Group B) Wi-Fi Alliance C) Bluetooth Special Interest Group D) none of the above

C) Bluetooth Special Interest Group

In the United States, to get a leased line of at least 2.5 Mbps. Your access line would be ________. A) T1 B) Fractional T1 C) Bonded T1s D) None of the above

C) Bonded T1s

58) Which of the following is contributing to the exhaustion of IPv4 addresses? A) The growing number of hosts in Asia. B) The growing number of mobile devices. C) Both A and B D) Neither A nor B

C) Both A and B

802.11 standards are being developed to work in the ________ unlicensed band. A) 2.4 GHz B) 5 GHz C) Both A and B D) None of the above.

C) Both A and B

802.11ad will ________. A) operate in the 60 GHz radio band B) have short propagation distance C) Both A and B D) Neither A nor B

C) Both A and B

802.11n is designed to operate in the ________ unlicensed band. A) 2.4 GHz B) 5 GHz C) Both A and B D) Neither A nor B

C) Both A and B

802.11n is faster than 802.11g because 802.11n ________ A) is designed to use wider channels B) can send multiple signals (spatial transmission speeds) in a single channel C) Both A and B D) Neither A nor B

C) Both A and B

802.11n will be superior to current 802.11 standards by ________. A) offering wider channels B) sending multiple spatial data streams in a single channel between wireless access points and wireless NICs C) Both A and B D) Neither A nor B

C) Both A and B

ARP is used to find the destination data link layer destination addresses of ________. A) destination hosts B) routers C) Both A and B D) Neither A nor B

C) Both A and B

An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) Both A and B D) Neither A nor B

C) Both A and B

Beamforming can ________. A) direct signal strength at individual wireless hosts B) transmit multiple spatial data streams in the same channel C) Both A and B D) Neither A nor B

C) Both A and B

Beamforming can allow an access point to ________. A) send signals to two different clients at the same time B) direct power to individual clients C) Both A and B D) Neither A nor B

C) Both A and B

In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) Both A and B D) Neither A nor B

C) Both A and B

In TCP/IP, routing means ________. A) the process that routers use to forward incoming packets B) the process that routers use to exchange routing table information C) Both A and B D) Neither A nor B

C) Both A and B

Leased line switched WANs typically use ________. A) leased lines B) a router at each site C) Both A and B D) Neither A nor B

C) Both A and B

MIMO increases ________. A) throughput B) propagation distance C) Both A and B D) Neither A nor B

C) Both A and B

Media access control governs transmission by ________. A) access points B) wireless NICs C) Both A and B D) Neither A nor B

C) Both A and B

The default row ________. A) always has the mask /32 B) will always match the IP address of an incoming packet C) Both A and B D) Neither A nor B

C) Both A and B

The encapsulating security protocol can be used in ________. A) IPv4 B) IPv6 C) Both A and B D) Neither A nor B

C) Both A and B

The encapsulating security protocol offers ________. A) confidentiality B) authentication C) Both A and B D) Neither A nor B

C) Both A and B

To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination host's ________ before the router can send the packet on to the destination host. A) IP address B) data link layer address C) Both A and B D) Neither A nor B

C) Both A and B

What propagation problem becomes worse as frequency increases? A) Absorptive attenuation. B) Shadow zones. C) Both A and B D) Neither A nor B

C) Both A and B

When a host moves from one wireless access point to another in a WLAN, this is ________. A) a handoff B) roaming C) Both A and B D) Neither A nor B

C) Both A and B

Which of the following go from one customer site to another customer site? A) Leased lines. B) Access lines. C) Both A and B

C) Both A and B

Which of the following is true? A) An 802.11n host can work with an 802.11g access point. B) An 802.11g host can work with an 802.11n access point. C) Both A and B D) Neither A nor B

C) Both A and B

Which of the following uses OFDM? A) 802.11g. B) 802.11n. C) Both A and B D) Neither A nor B

C) Both A and B

Why is metro Ethernet popular? A) Familiarity. B) Rapid reprovisioning. C) Both A and B D) Neither A nor B

C) Both A and B

Why is metro Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) Both A and B D) Neither A nor B

C) Both A and B

________ operates at the transport layer. A) TCP B) UDP C) Both A and B D) Neither A nor B

C) Both A and B

To configure itself, a client PC running IPv6 can configure itself using ________. A) DHCP B) stateless autoconfiguration C) Both A and B D) Neither A nor B

C) Both A and B, DHCP & stateless autoconfiguration

Which of the following is true about NAT? A) It can enhance security. B) It presents problems for some protocols. C) Both A and B D) Neither A nor B

C) Both A and B, It can enhance security & presents problems for some protocols

The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) Both A and B D) Neither A nor B

C) Both A and B, a way to find a host's IP addresses if your computer only knows the host's host name & a general naming system for the Internet

Stateless autoconfiguration can be used to ________. A) change all subnet IDs in a network B) change all routing prefixes in a network C) Both A and B D) Neither A nor B

C) Both A and B, change all subnet IDs & all routing prefixes in a network

The router advertisement protocol may ________. A) give the client a routing prefix B) give the client a subnet ID C) Both A and B D) Neither A nor B

C) Both A and B, gives the client a routing prefix & a subnet ID

Label-switching routers provide ________. A) lower cost B) the ability to do traffic engineering C) Both A and B D) Neither A nor B

C) Both A and B, lower cost & the ability to do traffic engineering

Which of the following would be an SNMP object? A) Number of rows in routing table. B) System uptime (since last reboot). C) Both A and B D) Neither A nor B

C) Both A and B, number of rows in routing table & system uptime (since last reboot)

Which of the following can be used within a firm? A) Private IP addresses. B) Public IP addresses. C) Both A and B D) Neither A nor B

C) Both A and B, private & public addresses

IPsec is used for ________ VPNs. A) remote-access B) site-to-site C) Both A and B D) Neither A nor B

C) Both A and B, remote-access & site-to-site

To use a leased line, the customer requires a(n) ________ at each site. A) switch B) router C) CSU/DSU D) modem

C) CSU/DSU

LANs are ________. A) single networks B) internets C) Either A or B D) Neither A nor B

C) Either A or B

WANs are ________. A) single networks B) internets C) Either A or B D) Neither A nor B

C) Either A or B

The management information base (MIB) is a(n) ________. A) schema B) actual database C) Either A or B D) Neither A nor B

C) Either A or B, schema or actual database

Most wireless systems operate in the ________ range. A) hz B) kHz C) GHz D) MHz

C) GHz

Which is not one of the three parts of a public IPv6 unicast address? A) Subnet ID. B) Routing prefix. C) Host part. D) All of the above ARE parts in a public IPv6 unicast address.

C) Host part.

An IPv4 packet's protocol field value is 1. The data field contains a(n) ________ message. A) TCP B) UDP C) ICMP D) DNS

C) ICMP

An access point can transmit to more than one wireless client at a time with A) MIMO B) CSMC/CA+ACK C) Multiuser MIMO D) Bonding

C) Multiuser MIMO

Which form of spread spectrum transmission divides the channel into many smaller channels called subcarriers? A) DSSS. B) FHSS. C) OFDM. D) All of the above. E) None of the above.

C) OFDM.

Which interior dynamic routing protocol is good for large internets? A) RIP. B) BGP. C) OSPF. D) Both A and C

C) OSPF

What transmission medium do ALL DSL services use? A) One-pair data-grade UTP. B) Two-pair data-grade UTP. C) One-pair voice-grade UTP. D) Two-pair voice-grade UTP.

C) One-pair voice-grade UTP.

Bluetooth use ______operation. A) Point-to-multipoint B) One-to-all C) One-to-one D) All-to-all

C) One-to-one

In a PSDN, companies connect to the network core at ________. A) NAPs B) Public/Private access points C) POPs D) DSLAMs

C) POPs

In a PSDN, customers connect to the network core at ________. A) NAPs B) public/private access points C) POPs D) DSLAMs

C) POPs

How does WPA3 help keep devices on a public, open network secure? A) It requires a facial recognition scan at the access point B) It requires users to establish physical connections with the network C) WPA3 individually encrypts each device that connect to the network D) WPA3 will require a fee in Dogecoin to use the network

C) WPA3 individually encrypts each device that connect to the network

SNMPv3 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above

C) a different password for each manager-agent pair

A company receives its domain name from ________. A) the IETF B) its ISP C) a domain registrar D) None of the above

C) a domain registrar

Combining multiple WAN technologies into a collectively managed system is called having ________. A) SNMP B) network visibility C) a virtual WAN D) WAN optimization

C) a virtual WAN

In the Shannon Equation, if you quadruple the bandwidth in a channel while the signal-to-noise ratio remains the same, you can transmit ________. A) Log2(1+4) times as fast B) Log2(1+1/4) times as fast C) about 4 times as fast D) about 1/4 as fast E) at the same speed, but more reliably

C) about 4 times as fast

In 802.11 networks, the speed I receive on my portable devices is a(n) ________. A) individual throughput B) rated speed C) aggregate throughput D) None of the above

C) aggregate throughput

In CSMA/CD+ACK, when a wireless NIC wishes to transmit, it listens for traffic. If there is traffic, it waits. When the traffic stops, it may transmit immediately. A) always true B) sometimes true C) always false

C) always false

The PSDN transport core normally is drawn as a cloud ________. A) because it has no internal structure B) for security reasons C) because customers do not need to care about what is inside it D) All of the above

C) because customers do not need to care about what is inside it

802.11i provides ________. A) confidentiality B) message integrity C) both A and B D) neither A nor B

C) both A and B

An extended service set (ESS) is a group of BSSs that ________. A) are connected to the same distribution system B) have the same SSID C) both A and B D) neither A nor B

C) both A and B

DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B

C) both A and B

Forwarding functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B

C) both A and B

Managed access points should ________. A) allow access point power to be adjusted remotely B) provide constant transmission quality monitoring C) both A and B D) neither A nor B

C) both A and B

Managed access points should ________. A) identify rogue access points B) be able to push updates out to access points C) both A and B D) neither A nor B

C) both A and B

SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B

C) both A and B

The messages of VPNs ________. A) are encrypted B) share the public network like Internet C) both A and B D) neither A nor B

C) both A and B

Traffic shaping ________. A) limits the amount of some types of traffic B) does not admit some types of traffic C) both A and B D) neither A nor B

C) both A and B

WAN optimization provides ________. A) network protocol acceleration B) caching C) both A and B D) neither A nor B

C) both A and B

Which of the following affects what throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B

C) both A and B

Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B

C) both A and B

Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B

C) both A and B

Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B

C) both A and B

The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B D) neither A nor B

C) both A and B, a way to find a host's IP addresses if your computer only knows the host's host name & a general naming system for the Internet

For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP

C) coaxial cable

The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________. A) default router B) local next-hop router C) destination host D) None of the above

C) destination host

Part of WPS weakness is caused by ________. A) 802.1X mode B) WPA2 preshared key mode C) dividing the 8 digit PIN into two 4 digit halves D) IPsec

C) dividing the 8 digit PIN into two 4 digit halves

Stateless autoconfiguration makes more sense for ________. A) single-stack IPv4 hosts B) single-stack IPv6 hosts C) dual-stack hosts D) It makes equal sense for all of the above.

C) dual-stack hosts

Pinging is to send ICMP ________ messages to the target host. A) ping B) error advisement C) echo request D) echo

C) echo request

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000

C) fffe

Which Bluetooth profile would a desktop use with a Bluetooth keyboard? A) Bluetooth input profile B) Bluetooth I/O profile C) human interface device profile D) none of the above

C) human interface device profile

Routers send packets out ________. A) ports B) connections C) interfaces D) plugs

C) interfaces

IPsec is a(n) ________ layer standard. A) physical B) data link C) internet D) All of the above

C) internet

In VPNs designed to frustrate evil twin attacks, the shared secret ________. A) is transmitted in the clear B) is transmitted with cryptographic protections C) is not transmitted D) Any of the above.

C) is not transmitted

In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path

C) label-switched path

The PSTN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop

C) modified hierarchy

A LAN is a network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) All of the above

C) provides service within a site

TCP messages are called ________. A) frames B) packets C) segments D) fragments

C) segments

A channel has more bandwidth than is necessary given data transmission speeds requirements in ________ transmission. A) normal radio B) reliable commercial C) spread spectrum transmission D) licensed E) None of the above.

C) spread spectrum transmission

In the TJX breach, attackers first got into the network through ________. A) spear phishing B) an inside conspirator C) the use of weak wireless encryption D) all of the above

C) the use of weak wireless encryption

MIMO ________. A) uses a single spatial stream but multiple signals B) bonds channels for higher speed C) transmits multiple signals in the same channel D) is used in all forms of 802.11

C) transmits multiple signals in the same channel

Low-speed leased lines use ________ transmission lines to the customer premises. A) one-pair voice-grade UTP B) one-pair data-grade UTP C) two-pair data-grade UTP D) four-pair UTP

C) two-pair data-grade UTP

Using unused transmission channels in a service band is called using ________. A) dark spectrum B) opportunistic agility C) white space D) a smart antenna

C) white space

What cryptographic protections does 802.11i provide?

Confidentiality, Integrity, and Authentication (acronym = CIA).

How many DNS root servers are there? A) 1. B) 2. C) 10. D) 13.

D) 13.

65) If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________. A) 2001:0000:0000:00fe::::cdef B) 2001:::00fe:0000:0000:0000:cdef C) 2001::00fe::::cdef D) 2001:::00fe::cdef

D) 2001:::00fe::cdef

Most end-office switches are Class ________ switches. A) 1 B) 2 C) 3 D) 5

D) 5

The new version of Internet Protocol that is coming into use is IP version ________. A) 1 B) 4 C) 5 D) 6

D) 6

Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have? A) 8 B) 16 C) 254 D) 65,534

D) 65,534

How many modulation and coding sets are defined in 802.11n? A) 10 B) 27 C) None, 802.11n does not define any MCSs D) 77

D) 77

The most widely used 802.11 standard today is ________. A) 802.11a B) 802.11b C) 802.11e D) 802.11g E) 802.11n

D) 802.11g

Which of the above is NOT an element in a network management system? A) The manager. B) Agents. C) Objects. D) All of the above ARE elements in network management systems.

D) All of the above ARE elements in network management systems

A rogue access point ________. A) is an unauthorized internal access point B) often has very poor security C) often operates at high power D) All of the above are true.

D) All of the above are true.

________ servers provide ________ IP addresses to clients. A) DNS, static B) DNS, dynamic C) DHCP, static D) DHCP, dynamic

D) DHCP, dynamic

________ is used for supervisory messages at the internet layer. A) TCP B) DNS C) DHCP D) ICMP

D) ICMP

Because 802.11ac uses essentially the same transmission technology as 802.11n, which of the following is the main reason for its increased throughput? A) A more efficient protocol B) The signal strength is higher C) It does not suffer from interference at all D) It can use wider frequency channels divided into more subcarriers

D) It can use wider frequency channels divided into more subcarriers

________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time. A) Creating extended service sets B) The distribution system C) Roaming D) Media access control

D) Media access control

802.11a supports ________ nonoverlapping channels. A) 1 B) 3 C) 7 D) More than 10

D) More than 10

ATM ________. A) offers speeds in the range of greatest corporate demand B) is relatively inexpensive C) Both A and B D) Neither A nor B

D) Neither A nor B

According to the ITU, which of the following offers true 4G speeds? A) LTE. B) HSPA+. C) Both A and B D) Neither A nor B

D) Neither A nor B

For which of the following is 100 meters a typical service distance? A) 802.11n. B) 802.11g. C) Both A and B D) Neither A nor B

D) Neither A nor B

IP is made reliable through ________. A) echo and echo reply messages B) error advisement messages C) Both A and B D) Neither A nor B

D) Neither A nor B

In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) Both A and B D) Neither A nor B

D) Neither A nor B

TCP is ________. A) connectionless B) unreliable C) Both A and B D) Neither A nor B

D) Neither A nor B

Two wireless devices communicate via Wi-Fi Direct using ________. A) an access point that lets them talk directly B) an Ethernet network to connect their access points C) Either A or B D) Neither A nor B

D) Neither A nor B

What propagation problem becomes worse as frequency increases? A) Inverse square law attenuation. B) Electromagnetic interference. C) Both A and B D) Neither A nor B

D) Neither A nor B

Which of the following is a draft standard, according to the book? A) 802.11n. B) 802.11g. C) Both A and B D) Neither A nor B

D) Neither A nor B

Which of the following is a full, according to the book? A) 802.11ac. B) 802.11ad. C) Both A and B D) Neither A nor B

D) Neither A nor B

Wider channel bandwidth ________. A) allows more channels to be used in a service band B) decreases transmission speed C) Both A and B D) Neither A nor B

D) Neither A nor B (it increases transmission speed)

Are all devices able to use WPA3? A) Only devices made before 2018 B) Yes, all devices will be able to support WPA3 C) Only devices made after 2014 D) No, most devices will require replacement or firmware update

D) No, most devices will require replacement or firmware update

In DNS servers, the IPv6 address of a host is contained in the ________ record. A) IPv6 B) IPv4+ C) A D) None of the above

D) None of the above

The version number field in IPv6 has the value ________. A) 0001 B) 0100 C) 0101 D) None of the above

D) None of the above (0110)

You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 14 B) 16 C) 256 D) None of the above

D) None of the above (254 hosts)

If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) None of the above

D) None of the above (254 subnets)

The 802.11 standard for mesh networking is ________. A) 802.11r B) 802.11m C) 802.11ac D) None of the above

D) None of the above (is 802.11s)

A channel extends from 55 MHz to 60 MHz. Its bandwidth is ________. A) 60 MHz B) 55 MHz C) 65 MHz D) None of the above.

D) None of the above. (5MHz)

In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait. A) CSMA/CA+ACK B) CSMA/CA C) CSMA/CD D) RTS/CTS

D) RTS/CTS

The highest layer in SDN consists of ________. A) switches B) routers C) the SDN controller D) SDN applications

D) SDN applications

Wi-Fi operates in the 2.4GHz and 5GHz _____ A) Spectrums B) Frequencies C) Channels D) Service bands

D) Service bands

In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at last when trying to find matches? A) 1 B) 37 C) 30,451 D) The default row

D) The default row

Which of the following has a dangerous vulnerability that is causing problems today? A) PEAP B) 802.11i C) WPA D) WPS

D) WPS

In the IPv4 address 1.2.3.4, what is the network part? A) 1 B) 1.2 C) 1.3 D) We cannot say.

D) We cannot say.

The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes ________. A) a frequency spectrum B) a broadband C) a channel D) a service band E) All of the above.

D) a service band

At 10 meters, a signal has a strength of 100 mW. About how strong will it be at 40 meters? A) about 0.5 mW B) about 5 mW C) about 25 mW D) about 6 mW

D) about 6 mW

Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) quality of service D) all of the above

D) all of the above

Which of the following is a risk in 802.11i PSK mode? A) WPS can easily be cracked if it is used. B) Unauthorized sharing of the pre-shared key. C) A weak passphrase may be selected. D) all of the above

D) all of the above

Which of the following would be an SNMP object? A) number of rows in routing table B) system uptime (since last reboot) C) both number of rows in routing table and system uptime (since last reboot) D) neither number of rows in routing table nor system uptime (since last reboot)

D) both number of rows in routing table and system uptime (since last reboot)

Channels with wide bandwidths are called ________ channels. A) single-mode B) multimode C) full-duplex D) broadband E) modulated

D) broadband

After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. A) the preshared key B) an 802.1X key C) WPS keys D) different session keys

D) different session keys

In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain

D) domain

The frequency range from 500 megahertz to 10 gigahertz is called the ________. A) frequency spectrum B) commercial mobile service band C) UWB region D) golden zone E) unlicensed band

D) golden zone

In the telephone system, the lines that connect customers to the nearest switch are called the ________. A) access lines B) local lines C) access loop D) local loop

D) local loop

The most serious problem with wireless transmission in WLANs is ________. A) inverse square law attenuation B) absorptive attenuation C) shadow zones D) multipath interference

D) multipath interference

For post-authentication communication with an access point, the client in 802.11i PSK mode will ________ for subsequent communication. A) always use the same preshared key each time it is connected B) always use the same session key each time it is connected C) both A and B D) neither A nor B

D) neither A nor B

In which frequency band does NFC operate? A) 2.4 GHz B) 5 GHz C) both A and B D) neither A nor B

D) neither A nor B

IP is reliable because of ________. A) echo and echo reply messages B) error advisement messages C) both echo and echo reply messages and error advisement messages D) neither echo and echo reply messages nor error advisement messages

D) neither echo and echo reply messages nor error advisement messages

An 8/1 increase in power corresponds to approximately ________ decibels. A) 3 B) 6 C) 20 D) none of the above

D) none of the above

In Bluetooth, a master can have up to ________ slaves at any moment. A) 1 B) 3 C) 12 D) none of the above

D) none of the above

Passive RFID chips are powered by ________. A) a battery B) the sun C) body temperature D) none of the above

D) none of the above

Which is the correct formula for decibels? A) 10 * P2/P1 B) 10 * (P2/P1)2 C) Log10(P2/P1) D) none of the above

D) none of the above

In an IPv4 packet, the ________ field value tells the type of message contained in the IP packet's data field. A) data B) next-hop C) next-header D) protocol

D) protocol

In IPsec, agreements about how security will be done are called ________. A) tranches B) security contracts C) service-level agreements D) security associations

D) security associations

The main benefit of IPv6 over IPv4 is ________. A) two more bits in the IP address B) two more bytes in the IP address C) the ability to have quality-of-service guarantees D) the ability to support more possible hosts

D) the ability to support more possible hosts

Passive RFID chips are powered by ________. A) a battery B) the sun C) body temperature D) the scanning unit

D) the scanning unit

IPsec provides protection in two modes of operation; one of these two modes is ________. A) data link mode B) 802.1X mode C) network mode D) transport mode

D) transport mode

A router must use the ARP process ________. A) when a new router comes online B) when a router goes offline C) whenever it forwards an IP packet D) whenever it forwards an IP packet to a host that is not in its ARP cache

D) whenever it forwards an IP packet to a host that is not in its ARP cache

To transmit very rapidly in RADIO, you need ________. A) single-frequency transmission B) single-mode transmission C) multimode transmission D) wide bandwidth E) narrow bandwidth

D) wide bandwidth

In 802.1x mode, why is no security necessary between the authenticator and the host before authentication is done?

Difficult for someone to tap the wired access line between the computer and the switch.

The frequency spectrum extends ________. A) into the megahertz range B) into the gigahertz range C) into the visible light range D) into the ultraviolet range E) to infinity

E) to infinity

Which of the following is more widely used?

ESP

Why is a short transmission range not a protection against eavesdroppers?

Eavesdroppers with highly directional antennas and amplifiers can intercept signals over much longer distances.

Carrier Ethernet (CE)

Ethernet for WAN service offered by carriers; was originally limited to metropolitan area network, so it was originally called metro Ethernet

".UK" is a generic top-level domain.

FALSE

A router has to go through the ARP process each time it needs to send a packet to a destination host or to a next-hop router.

FALSE

A row in a routing table has the destination 10.8.0.0 and the mask /24. It is a match for 10.8.6.7.

FALSE

ADSL offers symmetric service.

FALSE

An autonomous system can freely select the exterior dynamic routing protocol it will use.

FALSE

Border router's main job is to connect different subnets in the same network.

FALSE

By regulation, cellular systems must give almost the same throughput at different places in their service areas.

FALSE

By regulation, cellular systems must give almost the same throughput at different times during the day.

FALSE

Human interface functionality is defined by the SNMP standard.

FALSE

ICMP error advisement messages add reliability to IP.

FALSE

IPsec operates at the data link layer.

FALSE

If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with traditional cellular technology.

FALSE

If two products both comply with 802.11 ac, they should have close to the same performance.

FALSE

In IP subnet planning, having a large subnet part allows more hosts per subnet.

FALSE

In SNMP, "object" is another name for "managed device."

FALSE

In SNMP, the agent can create commands.

FALSE

In SNMP, the manager communicates directly with the managed device.

FALSE

In SNMP, the manager creates both commands and responses.

FALSE

In a routing table, a row is a route for a single IP address.

FALSE

In cellular technology, a cellsite is a small geographical area.

FALSE

In the Domain Name System, there is a single root server.

FALSE

In tunnel mode, IPsec provides protection all the way between the two hosts.

FALSE

NAT works automatically with all protocols.

FALSE

Routers know the difference between network and subnet masks.

FALSE

Servers are normally given dynamic IP addresses.

FALSE

Stateless autoconfiguration will give an IPv6 host most or all of the configuration information it needs to operate effectively.

FALSE

The default row will never be selected as the best match row.

FALSE

The slowest offered SONET/SDH leased lines run at about 50 Mbps.

FALSE

To be protected by IPsec, applications must be IPsec-aware.

FALSE

UDP is reliable.

FALSE

UTP transmission is normally limited to about 100 meters.

FALSE

WAN prices are closely related to carrier costs.

FALSE

All 5 GHz bands are available for use by WLANs worldwide.

False

In a Wi-Fi LAN, wireless hosts generally send frames directly to one another

False

Nearly all public Wi-Fi hotspots encrypt your transmissions

False

n NFC, an attacker several meters away cannot read the transaction.

False

Two WLAN products that conform to the same standard will have almost equal performance. (True or False)

False Will not have equal performance.

________ is used for supervisory messages at the internet layer. A) DNS B) DHCP C) TCP D) ICMP

ICMP

SA protections are applied in the ________.

IPsec protection

Why does the host and authenticator need security BEFORE 802.1x authentication?

In order to encrypt the authentication data being sent from host to authenticator.

Comment on the cost of central access point management.

It's expensive, but it greatly reduces management labor, so there should be considerable net savings from its use

What is the state of NFC standards?

NFC standards are still in flux. (1) All NFC protocols use transmission in the 13.56 MHz unlicensed service band created and Its technical standards are largely set. (2) However, for applications such as point-of-sale payments, there are competing application standards

Do public hot spots protect your transmissions?

No

Northbound APIs

SDN APIs between applications and controllers

".edu" is a generic top-level domain.

TRUE

39) DSL throughput is typically sensitive to distance from the nearest switching building.

TRUE

After creating a link local IPv6 address, a host doing IPv6 stateless autoconfiguration should use the neighbor discovery protocol.

TRUE

All SONET/SDH leased lines run faster than 50 Mbps.

TRUE

Cellular carriers are happy when flat fee users use a corporate 802.11 LAN to place calls instead of using the carrier network.

TRUE

Cellular technology was created to support more customers in a single area.

TRUE

Clients can send a DHCP request message to multiple DHCP servers.

TRUE

Converting networks to support IPv6 is relatively simple and inexpensive.

TRUE

IPsec is used for site-to-site VPNs.

TRUE

IPsec protects all layers above the internet layer.

TRUE

IPv6 has a number of known security weaknesses.

TRUE

If the ACK bit is set, the acknowledgment number field MUST have a value.

TRUE

In IPv6, routers usually only have to consider the hop-by-hop options extension header.

TRUE

In SNMP, Set commands tell the agent to change a parameter on the managed device.

TRUE

In SNMP, the time-to-live value for a router interface is the value for an object.

TRUE

In transport mode, IPsec provides security over the internal networks.

TRUE

Label-switching routers do NOT look at the IP address of each arriving packet.

TRUE

Metro Ethernet offers relatively high speeds and low costs.

TRUE

NAT can multiply the number of IP addresses available to the firm by over a thousand.

TRUE

NAT operates transparently to the two hosts.

TRUE

NAT provides security.

TRUE

Private IP address ranges are only used within a firm.

TRUE

Servers have static IP addresses so that clients can find them easily.

TRUE

Some smart phones can act as wireless access points.

TRUE

Stateless autoconfiguration can be used to change all routing prefixes and subnet IDs in a network.

TRUE

The first stage in IPv6 stateless autoconfiguration is to create an address that can only be used on the host's single network.

TRUE

The general name for a company that is given rights of way to lay wires through public areas is carrier.

TRUE

The next-hop router in the default row is called the default router.

TRUE

The time to live field in IPv4 has the same basic function as the hop limit field in IPv6.

TRUE

To deliver signals to individual residences, cable television companies primarily use coaxial cable.

TRUE

To handle internetwork transmission control tasks that the IP protocol cannot handle, the IETF created TCP.

TRUE

To use your smartphone as a wireless access point today generally will require you to pay a larger monthly fee.

TRUE

When a network mask is applied to any IP address on the network, the result is the IP address' network part followed by zeros.

TRUE

When a packet arrives, the router should look for matches in ALL rows in the routing table.

TRUE

When the subnet part is made larger, the host part must be smaller.

TRUE

What does it mean that Bluetooth uses one-to-one operation?

There is are only two devices (1:1) connected per single bluetooth connection. However a device can have multiple bluetooth connections.

Passive RFID chips have no batteries. How can they transmit when queried?

They use the power of the near field itself to modulate the near field to send information.

Although such devices as 2.4 GHz cordless phones, microwave ovens, and Bluetooth devices may cause interference problems with802.11b networks in the 2.4 GHz ISM band, they are not a problem with 802.11a.

True

If a wireless client only has two MIMO antennas, an access point with three MIMO antennas will produce better performance than an access point with two MIMO antennas. (True or False)

True

The Federal Communications Commission (FCC) has segmented the 555 MHz of the original U-NII spectrum into four segments or bands.

True

The presence of a client that is distant from the access point reduces the individual throughput of other clients served by that access point. (True or False)

True

Another name for beamforming is having a smart antenna. (True or False)

True.

As a station moves away from an access point, the access point transmits more slowly to it.(True or False)

True.

MIMO allows you to transmit two signals in the same channel. (True or False)

True.

Why would you not want to use high-speed Bluetooth all the time?

Uses too much battery life

Can a Bluetooth device be both a master and a slave simultaneously?

Yes

Can a Bluetooth master have multiple slaves?

Yes, a master can have up to seven slaves simultaneously.

How is the access point used in Wi-Fi Direct?

You do not need Access Points in Wi-Fi direct ( Wi-Fi Direct allows for device-to-device communication, without a centralized network )

What other ad hoc networking protocol is widely used?

Z-Wave

In what radio band or bands does Z-Wave operate?

Z-Wave only operates in the 800/900 MHz ISM bands.

A company has a domain name. What else must it have before it can make a website available to the public?

a DNS server to host its domain name and the website itself

Head End

a central distribution; signals travel out to neighborhoods via optical fiber

Channel Reuse

a channel can be reused in multiple cells so the carrier can serve more customers

E-Line

a site-to-site service; competes directly w/ leased lines but offers other benefits

WAN Core

actual operation of WAN ex. switched networks

NAT ______________.

allows a firm to have more internal IP addresses and provides some security

How long must passphrases be to generate strong pre-shared keys?

at least 20 characters long

Cellsite

building w/ cellular equipment (in each cell)

PSDN Core

carrier Ethernet; switches that forward data

CSU/DSU Interface

changes the signal format

Leased Lines

companies sign contracts w/ carriers; dedicated lines; fast, point-to-point, akways-on connections; physical transmission lines

Wide Area Networks (WANs)

connect different sites within an organization or between organizations

Metropolitan Area Networks (MANs)

connect sites in a city and its suburbs

End Office Switch

connected to each customer

Point of Presence (POP)

connects the different sites to the PSDN core

Mobile Telephone Switching Office (MTSO)

controls cell sites & connects mobiles to the PTSN

Public Switched Data Network (PSDN)

different sites that are associated w/ points (POP)

Asymmetric Digital Subscriber Line (DSL)

downstream data is faster & the upstream data is slower, that's why it is asymmetric

Ping is for ________ messages

error advisory

E-LAN

essentially extends the LAN to the wide area

Local Area Networks (LANs)

exist within a company's site

Carrier Ethernet

extends site Ethernet LANs to the corporation (Layer 2)

Coaxial Cable

from neighborhood splitters, signals travel through this

Cell

geographical region

Handoff

if you travel between cells, you will be handed off to a new cell site in the new cell

Speed Agility

increased in speed can be provisioned rapidly

Software Defined Networking (SDN)

may permit a vast expansion in our ability to manage entire corporate networks

What kind of network is Zigbee used for?

network of IoT devices

Corporate WANs

offer the required QoS; mostly for transmission between a corporation's sites

Fractional T1

offered by carriers

The Public Switched Telephone Network (PSTN)

old telephone lines that are already installed; modified hierarchy w/ the possibility of bypass lines

Fiber to the Home (FTTH)

running optical fiber from the end office switch to residential households

Splitter

separates the data signal & the voice signal

DSL Access Multiplexer (DSLAM)

similar to the splitter; data goes to data WAN & voice goes to PTSN

One-Pair Voice-Grade (1PVG) UTP

single unshielded pair was created for voice, not data

Application Program Interfaces (APIs)

standards are implemented through this

Multiprotocol Label Switching (MPLS)

strong traffic for high QoS; routers identify the best route for a range of IP addresses before sending data

At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master?

the Bluetooth headset

What Bluetooth profile would you use for a game joystick, based on information in the text?

the Human Interface Device (HID) Profile ( the same one used for mice and keyboards ).

Drop Cable

the access line to individual homes is a thin coaxial cable called this

An advantage of using DHCP to configure clients is that ________.

the configuration information will be up-to-date

Frame Relay

this and leased line date networks each accounted for about 40% of WAN traffic

Cable Modem Service

two-way data service; popular in the U.S.; not popular in most countries

Synchronous DSL

upstream & downstream speeds are the same

Asynchronous Digital Subscriber Line (ADSL)

uses old phone lines to transport data; 1-pair voice grade UTP; inexpensive

Co-Axial Cable Service

was created to bring television to homes that had poor over-the-air reception; now also offers two-way data service called cable modem service

ATM

was created to replace the core of the public switched telephone network; it offers very high speeds and many expected it to replace Frame Relay as WAN speeds increased

Digital Subscriber Line (DSL)

when the telephone company transmits digital signals over it

Label Switched Path

when two hosts start to converse, an MPLS network first determines the best path for the packets

Customer Premises Equipment (CPE)

your mobile device


Kaugnay na mga set ng pag-aaral