ISM 4220 exam 2
In transport mode, ESP fields surround an IPv4 packet's ____________. data field header entire length none is correct
data field
in 802.1x initial authentication mode, the authenticator is the________. wireless client none is correct authentication server wireless access point
wireless access point
A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________. 0 1 254 256
1
In an routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet's IP address. What row will the router look at first when trying to find matching rows? 1 47 3497 the default row
1
Your firm has a 22-bit network part and a 6-bit subnet part. How many hosts can you have per subnet? 14 8 16 6
14
A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frame(s) will be involved in this one-way transmission? 1 There will be one frame for each switch along the way. 4 2
2
A change in power fom 100 W corresponds to approximately _____________ decibels. 20 10 -20 -10
20
If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________.
2001:::fe::::cdef
In the mask 255.255.255.0, how many 1s are there? 8 16 24 It cannot be determined from the information given
24
Express the mask /18 in dotted decimal notation (no space is needed). Hint: recall the formula in Ch. 2
255.255.48.0
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? 16 bits 64 bits 32 bits It cannot be determined from the information given
32 bits
Most end-office switches are Class ___________switches 4 3 1 5
5
Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? 8 6 7 9
8
Which of the following uses OFDM ? 802.11n 802.11ac 802.11 802.11ac AND 802.11n
802.11ac AND 802.11n
A change in power from 2 mW to 17 mW corresponds to approximately _________ decibels. 3 12 9 20
9
Convert the following EUI-48 address to a modified E U I-64 address: 9B-E5-33-21-FF-0D. (no space nor colon is needed)
99e5:33ff:fe21:ff0d
The DNS ______________ record is for the host name's ______________ address. AAAA: IPv4 AAAA: IPv6 A: IPv6 None is correct
AAAA: IPv6
If a cellsite uses Channel 237, which other cellsites can reuse the channel? no other cellsites Adjacent cellsites Cellsites one beyond adjacent cells Cellsites two beyond adjacent cells
Adjacent cellsites
In IPv4, the __________ field is used to deal with congestion in the internet. ECN DiffServ header checksum time to live
ECN
Which of the following can route non-IP packets? EIGRP OSPF Both None is correct
EIGRP
There is a row for each host address in a(n) ____________________. Rotuing number ethernet switching table modem table none is correct
Ethernet switching table
Most wireless systems operate in the______range. MHz kHz GHz hz
GHz
Which is NOT one of the three parts of a public IPv 6 unicast address? Routing prefix subnet ID HOst part All of the above are parts in a public IPv6 unicast address
Host part
If you triple channel bandwidth, what happens to the number of channels in a service band? It triples. It increases by a factor of nine. It is reduced to a third. It is reduced to a ninth.
It is reduced to a third.
Bluetooth _____________ is likely to be used most of the time in IoT transmission. HDR HS LE COIN
LE
If no other row matches, the router will select the ________ row as its best match. First Last Depending on the circumstances None is correct
Last
A channel extends from 55 MHz to 60 MHz. Its bandwidth is ___________ . 55 MHz 58 MHz 60 MHz None is correct
None is correct
What transmission medium do ALL D S L services use? One-pair data-grade U T P One-pair voice-grade U T P None is correct Two-pair data-grade U T P
One-pair voice-grade U T P
A group of devices on a desk that communicate wirelessly is called a _________________. WAN PAN LAN MAN
PAN
802.11i PSK initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points
Residences with a single access point
To connect to an access point, you must know its __________. ESSID Wi-Fi ID SSID IP address
SSID
How do WAN carriers typically get their trunk lines? They lease them from telephone companies They use the internet They construct them They use wireless transmission
They lease them from telephone companies
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? 802.1X mode VlANs VPNs None is correct
VPNs
The WIFI Alliance calls 802.11i___________. WPA None is correct WEP WPA2
WPA2
When does it make sense to use RTS /CTS ? When efficiency is crucial When all devices can hear each other When not all of the devices can hear each other Always
When not all of the devices can hear each other
The other wireless device is far away in a known direction. It would be better to use _________. an omnidirectional antenna a regular antenna None is correct a dish antenna
a dish antenna
At 10 meters, a signal has a strength of 100 m W . About how strong will it be at 40 meters? About 0.5 mW About 5 mW About 6 mW About 25 mW
about 6mW
In 802.11i, protection is provided between the client and the__________. access point switch router server
access point
In SNMP, the manager communicates directly with a(n) _______________. agent access point object managed device
agent
a rogue access point is usually created by_______ an evil twin an external attacker the IT security department an employee
an employee
Classic Bluetooth provides transmission speeds of _______________. 24 Mbps 3 Mbps both 3 Mbps and 24 Mbps None is correct
both 3 Mbps and 24 Mbps
In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n)___________ MTSO wireless carrier cell cellsite
cellsite
For their transmission medium, cable television companies primarily use ___________ coaxial cable 2-pair DG UTP cabling 2-pair VG UTP cabling 4-pair U T P
coaxial cable
Which of the following does the carrier NOT own? the network core and the customer premises equipment the network core customer premises equipment none is correct
customer premises equipment
If the next-hop router field in the best-match row says "local", the router should address the packet to the ________. local router destination host default router none is correct
destination host
After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. WPA keys different pairwise session keys an 802.1x key the preshared key
different pairwise session key
Compared to ADSL service, cable modem traditionally has been ________. slower and more expensive faster and less expensive faster and more expensive slower and less expensive
faster and more expensive
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.
fffe
In NAT, the ____________ creates new external source IP addresses and port numbers. firewall router destination host source host
firewall
The set of frequencies used for police communication in a city are ______ . None is correct channels frequencies spectrums
frequencies
Router sockets for wire and optical fiber cords are called ____________________. plugs ports sockets iterfaces
interfaces
the downside of unlicensed bands is potential __________. speed loss interference from others loss of flexibility less-developed standards
interference from others
The internet is organized in a ____________________. mesh hierarchy ring None is correct
mesh
The P S T N core is organized as a _____________ modified hierarchy mesh loop hierarchy
modified hierarchy
Spread spectrum transmission is used in WLAN s for ________. higher transmission speed more reliable transmission more efficient transmission greater security
more reliable transmission
A border router connects different IP. subnets networks subnets and networks none is correct
networks
If you have a subnet part of 7 bits, how many subnets can you have? 128 512 256 None is correct
none is correct
Which is the correct formula for decibels? 10* P2/P1 10* (P2/P1)^2 Log10(P2/P1) None is correct
none of these
CSMA /CA +ACK is _______. reliable semireliable None is correct unreliable
reliable
Cells are used in cellular telephony to provide ________. service for more customers greater reliability greater transmission speed all of the above
service for more customers
Multipath interference is mitigated through ________. broadband transmission spread spectrum transmission MIMO beamforming
spread spectrum transmission
An internal router connects different IP. subnets networks subnets and networks none is correct
subnets
For cost reasons, you should ____________ where you can, ______________ where you must. switch; route switch; switch route; route route; switch
switch; route
Which of the following would be an SNMP object? Number of rows in routing table system uptime system uptime and number of rows in routing table none is correct
systemuptimeandnumber of rows in routing table
Access points in the same ESS communicate via _______. routers the distribution system wireless transmission a master access point
the distribution system
when a wireless client in an evil twin attack transmits, _______ the evil twin reads the packet, encrypts it, and passes on the packet the evil twin reads the packet and passes on the packet the evil twin reads the frame, encrypts it, and passes on the frame the evil twin reads the frame and passes on the frame
the evil twin reads the frame, encrypts it, and passes on the frame
If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client? the local DNS server the remote DNS server either A or B No IP address will be returned to the client.
the local DNS server
".com" is a ____________. second-level domain top-level domain root domain none of above
top-level domain
if a company uses 802.11i for its core security protocol, an evil twin access point will set up _______ 802.11i connection(s) none is correct four two one
two