test

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

1 / 1 pts Major incidents are handled by the __________ . CSIRT outside consultant FBI on-duty staff

CSIRT

Which of the following is an Internet supervisory protocol? both DNS and IP neither DNS nor IP DNS IP

DNS

Which is NOT in an IP packet? Data link header Internet header All of these are part of the IP packet. Transport header

Data link header

1 / 1 pts ________ describe light entering a fiber's core at different angles. Harmonics Different modes Divergences Co-cycle waves

Different modes

A TCP message is called a ________. frame None of these packet datagram

None of these

1 / 1 pts A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________. 256 254 0 1

1

1 / 1 pts If someone says that a 1-bit flag is set, it is given the value ________. either 0 or 1 1 0 neither 0 or 1

1

If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices? 12 2 1 10

2

0 1 / 1 pts A 5-bit field can represent ________ alternatives or different combinations. 32 8 16 64

32 Exam 2:

1 / 1 pts If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? None of these 64 bits 16 bits 32 bits

32 bits

0 / 1 pts A host sends a packet to another host with six single networks along the way. How many frames are involved? 8 7 1 6

6

1 / 1 pts In 802.11i, protection is provided between the client and the ________. switch access point server router

access point

1 / 1 pts If a destination host receives a correct segment, it will transmit ________. nothing an ACK segment an RSND segment an NAC segment

an ACK segment

1 / 1 pts If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________. use the decision it made for the first one go through all three steps for each None of these send them via different routers to create load balancing along different routes

go through all three steps for each

1 / 1 pts In Ethernet, switches are organized in a ________. ring mesh Any of these hierarchy

hierarchy

1 / 1 pts Which layer(s) governs transmission through the Internet? physical data link neither data link nor physical both data link and physical

neither data link nor physical

0 / 1 pts What propagation problem becomes worse as frequency increases? both inverse square law attenuation and electromagnetic interference neither inverse square law attenuation nor electromagnetic interference inverse square law attenuation electromagnetic interference

neither inverse square law attenuation nor electromagnetic interference

1 / 1 pts If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is ________. both still protected by a firewall and still protected by encryption still protected by encryption neither still protected by a firewall nor still protected by encryption still protected by a firewall

neither still protected by a firewall nor still protected by encryption

1 / 1 pts In encryption, what must be kept secret? the cipher neither the cipher nor the key the key both the cipher and the key

the key

1 / 1 pts TCP messages are called ________. fragments segments packets frames

segments

1 / 1 pts The second step in the routing process involves ________. selecting an interface selecting the best-match row comparing the packet's destination IP address to matching rows comparing the packet's destination IP address to all rows

selecting the best-match row

1 / 1 pts Attacking your own firm occurs in __________. vulnerability testing Both of these Neither of these War driving

vulnerability testing

1 / 1 pts The distance between two corresponding points in adjacent cycles is the ________. span bandwidth wavelength frequency

wavelength

1 / 1 pts A policy specifies . what should be done Neither of these Both of these how to do it

what should be done

1 / 1 pts Convert the binary number 100 to decimal. 4 2 It is in decimal. 8

4

1 / 1 pts Antivirus programs are designed to detect ________. viruses neither viruses nor worms both viruses and worms worms

both viruses and worms

1 / 1 pts If someone says that a 1-bit flag is not set, this means its value is ________. blank 0 1 We cannot say.

0

0 / 1 pts A host sends a packet to another host separated by seven single networks along the way (the packet will be in 7 different frames). How many routers will there be along the route? 1 2 6 9

1

0 / 1 pts If there is an access point that serves eight wireless hosts, on how many channels will these devices transmit and receive during the course of an hour or two? 9 1 2 8

1

0 / 1 pts In a point-to-point single network, how many physical links will there be when a packet is transmitted? 0 We cannot say with the information provided. 1 2

1

1 / 1 pts A host sends a packet to another host containing six single networks along the way. How many routes are included in this transmission? 8 7 6 1

1

1 / 1 pts A host sends a packet to another host with six single networks along the way. How many packets are involved in this transmission? 6 7 8 1

1

1 / 1 pts In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet's IP address. What row will the router look at first when trying to find matching rows? the default row 47 1 3497

1

1 / 1 pts In large Ethernet networks, there can be ________ possible data links between two hosts. many 3 2 1

1

1 / 1 pts CAT 5e and CAT 6 wiring can carry Ethernet traffic 100 meters up to ________. 10 Mbps 100 Mbps 10 Gbps 1 Gbps

1 Gbps

0 / 1 pts Which of the following is a private IP address range? both 10.x.x.x and 128.171.x.x neither 10.x.x.x nor 128.171.x.x 128.171.x.x 10.x.x.x

10.x.x.x

1 / 1 pts What is 9 hex in binary? 1000 1111 1001 1010

1001

1 / 1 pts Convert a decimal number 15 to the binary number. It is a binary number. 1100 1101 1111

1111

1 / 1 pts What is F hex in binary? 1010 None of these 1111 1001

1111

If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices? 1 2 12 10

12

1 / 1 pts If your subnet part is 7 bits long, how many subnets can you have? 128 None of these 256 512

128

1 / 1 pts In most encryption, keys must be at least ________ long to be considered safe. 128 bits 1,280 bytes 1,280 bits 128 bytes

128 bits

1 / 1 pts A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission? 1 There will be one frame for each switch along the way. 2 4

2

1 / 1 pts What is binary 0010 in hex? None of these 1 2 3

2

0 / 1 pts In 802.11i PSK mode, the pass phrase should be at least ________ characters long. 20 8 12 128

20

1 / 1 pts If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________. 2001::fe:0:0:0:cdef 2001:0:0:fe::cdef 2001::00fe:0::cdef 2001:0:0:fe:0:0:0:cdef

2001:0:0:fe::cdef

1 / 1 pts If I simplify the IPv6 address 2001:0000:0000:00fe:3270:0000:0000:cdef., I get ________. 2001::00fe:3270:0:0:cdef 2001::fe:3270:0:0:cdef 2001::00fe:3270::cdef 2001:0:0:00fe:3270:0:0:cdef

2001::fe:3270:0:0:cdef

1 / 1 pts If I simplify the address 2001:0ed2:056b:00d3:00c0:abcd:0bcd:0fe0, I get ________. neither 2001:ed2:56b:d3:c0:abcd:bcd:0fe0 nor 2001:ed2:56b:d3:c:abcd:bcd:0fe 2001:ed2:56b:d3:c:abcd:bcd:0fe 2001:ed2:56b:d3:c0:abcd:bcd:fe0 either 2001:ed2:56b:d3:c0:abcd:bcd:0fe0 or 2001:ed2:56b:d3:c:abcd:bcd:0fe

2001:ed2:56b:d3:c0:abcd:bcd:fe0

1 / 1 pts In the mask 255.255.255.0, how many 1s are there? 48 8 24 16

24

1 / 1 pts You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? 254 15 None of these 16

254

1 / 1 pts Express the mask /24 in dotted decimal notation. None of these 255.0.0.0 255.255.255.0 255.255.0.0

255.255.255.0

1 / 1 pts If your subnet part is 8 bits long, you can have ________ subnets. 64 254 256 128

256

1 / 1 pts Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. The default row has a metric cost of 2. Which row will the router choose if both are matches? 2707 4400 2 impossible to determine

2707

1 / 1 pts Deciding what interface and to what device to send the packet back out is step ________ in the routing process. None of these. 1 2 3

3

1 / 1 pts The 2.4 GHz band supports ________ possible non-overlapping 20 MHz channel(s). 11 3 1 7

3

1 / 1 pts A mask has ________ bits. 16 64 8 32

32

1 / 1 pts Sequence numbers are ________ bits long. 24 32 8 16

32

1 / 1 pts The total length of an IPv4 address is ________ bits. 32 16 64 8

32

IPv4 addresses are ________ bits long. 128 64 None of these 32

32

1 / 1 pts Your firm has a 22-bit network part. What subnet part would you select to give at least 10 subnets? 3 bits None of these 4 bits 2 bits

4 bits

0 / 1 pts Row 2707 has the mask /16 and the metric 20. Row 4400 has the mask /16 and the metric 10. Which row will the router choose if both are matches? The router will choose the default row. 4400 either 2707 or 4400 2707

4400

1 / 1 pts If your routing prefix is 16 bits, how long is your subnet ID? not possible to calculate 16 bits 32 bits 48 bits

48 bits

1 / 1 pts If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? 2 1 6 5

5

0 / 1 pts Which core diameter is used in multimode fiber. 50 mm 8 microns 8 mm 50 microns

50 microns

1 / 1 pts A host sends a packet to another host containing six single networks along the way. How many data links are used for this transmission? 8 6 1 7

6

1 / 1 pts In an IPv6 global unicast address, the interface ID is ________ bits long. 16 Its size varies. 8 64

64

1 / 1 pts In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? 6 8 7 None of these

8

1 / 1 pts To transmit three bits per clock cycle, you must have ________ states. 3 8 16 6

8

1 / 1 pts Your firm has an 8-bit network part. If you need at least 200 subnets, what must your subnet part size be? 5 8 7 6

8

1 / 1 pts ________ is among the most widely used 802.11 transmission standards used today and sales of devices supporting it dominate the market. 802.11g 802.11ac both 802.11g and 802.11ac neither 802.11g nor 802.11ac

802.11ac

0 / 1 pts Which of the following works in the 60 GHz unlicensed service band? 802.11ax All of these 802.11ad 802.11ac

802.11ad

1 / 1 pts What is the strongest security protocol for 802.11 today? 802.11s 802.11i WPA 802.11X

802.11i

1 / 1 pts What 802 Working Group creates Ethernet standards? 802.2 802.1 802.11 802.3

802.3

1 / 1 pts ________ is a program that can capture passwords as you enter them. Data mining software both A keystroke logger and Data mining software A keystroke logger neither A keystroke logger nor Data mining software

A keystroke logger

1 / 1 pts ________ is the general name for a security flaw in a program. Malware A virus A vulnerability A security fault

A vulnerability

1 / 1 pts The DNS ________ record is for the host name's ________ address neither AAAA; IPv4 nor AAAA; IPv6 AAAA; IPv4 both AAAA; IPv4 and AAAA; IPv6 AAAA; IPv6

AAAA; IPv6

1 / 1 pts ________ attacks typically extend over a period of months. Malware DDoS APT Spear phishing

APT

1 / 1 pts ________ links connect users to workgroup switches. Workgroup Core Trunk Access

Access

1 / 1 pts In public key encryption, if Bob wants to send Alice a secure message, Bob would use his public key Alice's public key Alice's private key his private key

Alice's public key

1 / 1 pts Secured packets typically receive ________. confidentiality All of these message integrity authentication

All of these

1 / 1 pts A single access point, and the set of hosts it serves, is called a(n) ________. None of these BSS ESS BSSID

BSS

Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack. malware DoS hacking virus

Dos

1 / 1 pts Which of the following is more widely used? ESP AH Both are about equally widely used.

ESP

1 / 1 pts Ethernet uses ________ addresses. IPv4 EUI-48 IPv6 Port

EUI-48

1 / 1 pts ________ is the official name for Ethernet addresses. EUI-48 both MAC and EUI-48 MAC neither MAC nor EUI-48

EUI-48

0 / 1 pts The IEEE calls a 64-bit interface addresses that it designed a(n) ________ address. IP address Extended Unique Identifier-64 Interface ID MAC address

Extended Unique Identifier-64

1 / 1 pts A TCP ________ segment is a request to the other transport process to close a connection. FIN ACK SYN CLS

FIN

1 / 1 pts Which of the following segments types is acknowledged? Both of these are acknowledged. FIN Neither FIN nor RST is acknowledged. RST

FIN

1 / 1 pts A switch knows the entire data link between the source and destination hosts. True False

False

1 / 1 pts For an internal client to use NAT to communicate with an external webserver, the client must be configured to do so. False True

False

1 / 1 pts The originating host needs to contact the DNS server each time it sends a packet to the target host. False True

False

1 / 1 pts ________ have DHCP servers. Home access routers Internet core routers both Home access routers and Internet core routers neither Home access routers nor Internet core routers

Home access routers

1 / 1 pts Which standards agency is especially important for internet processes? ITU-T Neither ITU-T nor IETF are important. IETF Both ITU-T and IETF are about equally important.

IETF

0 / 1 pts The first stage of IPsec uses the ________ protocol.

IKE

1 / 1 pts At what layer will you find standards for routers? neither transport nor Internet Internet transport both transport and Internet

Internet

What process adds a header in front of a TCP segment? Data Link Transport Application Internet

Internet

Internet communication that does not involve a human is referred to with the term ________. IoT anonymous impersonal World Wide Web

IoT

1 / 1 pts Communication after authentication is protected most strongly if the ________ initial authentication is used. 802.1X It does not matter which initial authentication mode is used. WPA PSK

It does not matter which initial authentication mode is used.

1 / 1 pts Ethernet addresses were formerly called ________ addresses. neither MAC nor EUI-48 EUI-48 MAC both MAC and EUI-48

MAC

Who is in charge of the Internet? No one the IETF the United Nations the U.S. Government

No one

Who owns the Internet? The IETF The U.S. Government The United Nations No one

No one

0 / 1 pts Which standards layer governs e-mail? transport Internet None of these data link

None of these

1 / 1 pts Express the mask /18 in dotted decimal notation. 255.255.255.0 255.0.0.0 None of these 255.255.0.0

None of these

1 / 1 pts If a destination host does not receive a segment, it will ________. transmit an RSND segment None of these transmit an ACK segment transmit an NAC segment

None of these

1 / 1 pts In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait. CSMA/CA+ACK CSMA/CD RTS/CTS CSMA/CA

RTS/CTS

0 1 / 1 pts Which is less expensive to implement? SSL/TLS IPsec Both cost about the same to implement.

SSL/TLS

1 / 1 pts Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. None of these SYN ACK SYN/ACK

SYN/ACK

1 / 1 pts Malware programs that masquerade as system files are called ________. scripts viruses root malware Trojan horses

Trojan horses

1 / 1 pts If an uplink from switch to switch is forwarding traffic on multiple VLAN's, we call this uplink a _____. Multiplexer None of these Trunk T-Uplink

Trunk

0 / 1 pts Which of the following provides security in Ethernet? VLANs RSTP All of these SNMP

VLANs

1 / 1 pts Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? 802.1X mode VLANs VPNs None of these

VPNs Fixed

1 / 1 pts Wi-Fi is a term used by the ________. both IEEE and Wi-Fi Alliance IEEE neither IEEE nor Wi-Fi Alliance Wi-Fi Alliance

WIFI Alliance

0 / 1 pts Convert the following EUI-48 address to a modified EUI-64 address: AA-00-00-FF-FF-00. aa00:ff:feff:ff00 a800:00ff:feff:ff00 aa00:00ff:feff:ff00 a800:ff:feff:ff00

a800:00ff:feff:ff00

1 / 1 pts If a signal has a strength of 100 mW at 10 meters, how strong will it be at 100 meters? about 1 mW about 0.1 None of these about 10 mW

about 1 mW

1 / 1 pts If a signal has a strength of 100 mW at 10 meters, how strong will it be at 50 meters? about 0.5 mW about 25 mW about 4 mW about 5 mW

about 4 mW

1 / 1 pts What propagation problem is especially bad in moist air? absorptive attenuation multipath interference electromagnetic interference inverse square law attenuation

absorptive attenuation

1 / 1 pts A spear phishing attack is usually aimed at ________. a group All of these everyone an individual

an individual

0 / 1 pts IPsec protects ________ layer content.

application

0 / 1 pts Hosts on the Internet have ________ addresses. IP data link both IP and data link neither IP nor data link

both IP and data link

1 / 1 pts From which standards architectures do organizations typically take their standards? both OSI and TCP/IP neither OSI nor TCP/IP TCP/IP OSI

both OSI and TCP/IP

1 / 1 pts Which of the following is a risk in 802.11i PSK mode? neither Unauthorized sharing of the pre-shared key nor A weak passphrase may be selected A weak passphrase may be selected. Unauthorized sharing of the pre-shared key. both Unauthorized sharing of the pre-shared key and A weak passphrase may be selected

both Unauthorized sharing of the pre-shared key and A weak passphrase may be selected

0 / 1 pts IPsec is used for ________ VPNs.

both remote-access and site-to-site

0 / 1 pts What type of attacker are most attackers today? career criminals cyberterrorists disgruntled employees and ex-employees hackers motivated by a sense of power

career criminals

1 / 1 pts In CSMA/CA, CS means ________. cancel sending carrier sense carriage suspension counter-source

carrier sense

0 / 1 pts A specific encryption method is called a ________. key method code schema cipher

cipher

1 / 1 pts The first step in the routing process involves ________. selecting the best match row comparing the packet's destination IP address to all rows comparing the packet's destination IP address to matching rows selecting an interface

comparing the packet's destination IP address to all rows

1 / 1 pts In transport mode, ESP fields surround an IPv4 packet's ________. data field entire length header None of these

data field

1 / 1 pts At what layer will you find standards for EUI-48 addresses? application data link transport Internet

data link

1 / 1 pts Network standards ________. prevent the growth of new features both decrease equipment prices and prevent the growth of new features decrease equipment prices neither decrease equipment prices nor prevent the growth of new features

decrease equipment prices

1 / 1 pts The next-hop router listed in the last row is the ________ router. best-match local default socket

defaults

1 / 1 pts In an SPI firewall, all rules except the last will permit the connection. The last will ________. None of these either also permit the connection or deny the connection deny the connection also permit the connection

deny the connection

1 / 1 pts If the next-hop router field in the best-match row says "local", the router should address the packet to the ________. None of these. default router destination host local router

destination host

0 / 1 pts IETF standards typically begin as simple protocols which ________. prevents longer-term development neither enhances development speed nor prevents longer-term development enhances development speed both enhances development speed and prevents longer-term development

enhances development speed

1 / 1 pts In tunnel mode, ESP fields surround an IPv4 packet's ________. data field header None of these entire length

entire length

1 / 1 pts In IPv6, the payload length gives the number of octets in the ________. entire packet minus the main and extension headers entire packet minus the main header entire packet minus the extension headers entire packet

entire packet minus the main header

1 / 1 pts 2500 is in the range for ________ port numbers. neither well-known nor ephemeral both well-known and ephemeral well-known ephemeral

ephemeral

0 / 1 pts Attackers only need to find a single weakness to break in. Consequently, companies must __________. have comprehensive security only give minimum permissions do risk analysis have insurance

have comprehensive security

1 / 1 pts Vulnerabilities are occasionally found in even the best security products. Consequently, companies must __________. only give minimum permissions do risk analysis have comprehensive security have defense in depth

have defense in depth

1 / 1 pts Users typically can eliminate a vulnerability in one of their programs by ________. installing a patch neither installing a patch nor using an antivirus program using an antivirus program both installing a patch and using an antivirus program

installing a patch

1 / 1 pts Router ports are called ________. plugs ports sockets interfaces

interfaces

1 / 1 pts If someone has been properly authenticated, they should receive _______ permissions. no maximum all minimum

minimum

When a source host sends a packet to a destination host, there will probably be ________ along the way. All of these about the same number of routes and data links more data links more routes

more data links

1 / 1 pts Spread spectrum transmission is used in WLANs for ________. greater security higher transmission speed more reliable transmission more efficient transmission

more reliable transmission

1 / 1 pts ISO standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer. neither transport nor Internet both transport and Internet Internet transport

neither transport nor Internet

1 / 1 pts The routing prefix in IPv6 is like the ________ part in an IPv4 address. subnet both subnet and network host network

network

1 / 1 pts In a network mask, the 1s correspond to the ________. network part host part Internet part subnet part

network part

1 / 1 pts A border router connects different IP ________. subnets neither subnets nor networks networks both subnets and networks

networks

1 / 1 pts If any row other than the default row matches an IPv4 address, the router will ________. sometimes choose the default row always choose the default row never choose the default row impossible to determine

never choose the default row

1 / 1 pts If a destination host receives a TCP segment with an error, it will transmit ________. nothing an ACK segment an NAC segment an RSND segment

nothing

0 / 1 pts Access points take ________ from wireless devices and send them on to devices on the wired LAN. packets both packets and frames frames neither packets nor frames

packets

1 / 1 pts CSMA/CA+ACK is ________. semireliable reliable unreliable

reliable

When a frame arrives, the data link process on the destination host ________. both adds a header and removes a header neither adds a header nor removes a header removes a header adds a header

removes the header

1 / 1 pts 802.11i PSK initial authentication mode was created for ________. residences with a single access point corporations with less than eight access points residences with less than eight access points corporations with multiple access points

residences with a single access point

1 / 1 pts If a source host does not receive an ACK segment, it will ________. None of these transmit an ACK segment retransmit the segment transmit an RSND segment

retransmit the segment

1 / 1 pts Balancing threats against protection costs is called . risk analysis The Illusion of Cost comprehensive security economic justification

risk analysis

0 / 1 pts The destination socket is 60.171.18.22:161. The destination host is a(n) ________. client server well-known server ephemeral server

server

0 / 1 pts Wireless access points typically link wireless clients to ________. both wireless servers and servers on the wired network servers on the wired network wireless servers

servers on the wired network

0 / 1 pts Wi-Fi operates in the 2.4GHz and 5GHz ________. spectrums service bands channels frequencies

service bands

1 / 1 pts For what specific purpose were the 2.5GBASE-T and 5GBASE-T standards developed? None of these general growth in demand for Ethernet speed to provide lower-cost service than 10G-BASE-T serving access points

serving access points

1 / 1 pts What propagation problem becomes worse when there is a large, and dense, object between sender and receiver? shadow zones (dead zones) multipath interference inverse square law attenuation None of these

shadow zones (dead zones)

1 / 1 pts For sensitive assets, reusable passwords ________. should not be used should be especially long should contain a truly complex mixture of characters should be difficult to remember

should not be used

1 / 1 pts Fiber that has a core diameter of 8.3 microns is ________. full duplex fiber single-mode fiber multimode fiber exceptionally fast

single-mode fiber

1 / 1 pts In authentication, the ________ is the party trying to prove his or her identity. All of these true party supplicant verifier

supplicant

1 / 1 pts What is the main promise of 802.11ax over 802.11ac? the ability to serve more users MIMO Mu-MIMO higher speed

the ability to serve more users

0 / 1 pts Access points in the same ESS communicate via ________. a master access point the distribution system routers wireless transmission

the distribution system

1 / 1 pts The supplicant claims to be ________. either the true party or an impostor neither the true party nor an impostor an impostor the true party

the true party

Fixed 0 / 1 pts In digital certificate authentication, the verifier decrypts the challenge message with ________.

the true party's public key

1 / 1 pts A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________. two-factor authentication redundancy segmentation None of these

two-factor authentication

1 / 1 pts Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is ________. reliable unreliable neither reliable nor unreliable both reliable and unreliable

unreliable

Depicting the Internet as a cloud symbolizes ________. the Internet is too complex for anyone to depict the Internet is amorphous the Internet today is too complex to be understandable by humans users do not have to know how the Internet operates

users do not have to know how the Internet operates

1 / 1 pts Which of the following attach themselves to other programs? neither viruses nor worms worms viruses both viruses and worms

viruses

1 / 1 pts When does it make sense to use RTS/CTS? always when all devices can hear each other when not all of the devices can hear each other when efficiency is crucial

when not all of the devices can hear each other

0 / 1 pts In 802.1x initial authentication mode, the authenticator is the ________. authentication server wireless client None of these wireless access point

wireless access point

0 / 1 pts Which of the following sometimes uses direct propagation between computers? Trojan horses viruses worms downloaders

worms

0 / 1 pts What is the maximum power for POE Plus in the standard? 25 watts 75 watts 150 watts 15 watts

25 watts

1 / 1 pts Which light wavelength dominates in LANs? 1 Gbps 1,550 nm 1,310 nm 850 nm

850 nm

1 / 1 pts TCP has ________ flag field(s). 2 5 9 1

9

1 / 1 pts The DNS ________ record is for the host name's ________ address A; IPv6 A; IPv4 None of these AAAA; IPv4

A; IPv4

Which of the following is a host when it's on a network? a client PC a mobile phone a server All of these

All of these

0 / 1 pts In roaming, a wireless client moves from one ________ to another without losing its connection. None of these BSS ESS SSID

BSS

1 / 1 pts The 802.11 standard has two mechanisms for media access control. Of the two, ________ is mandatory. CSMA/CD RTS/CTS CSMA/CA+ACK MAC

CSMA/CA+ACK

1 / 1 pts Which is one of the only two reliable protocols we have seen this term? UDP IP 802.3 CSMA/CA+ACK

CSMA/CA+ACK

1 / 1 pts Which of the following is more efficient and faster? CSMA/CA+ACK RTS/CTS Both are about equally efficient and fast.

CSMA/CA+ACK

1 / 1 pts ________ attackers are often well-funded. both Disgruntled employee and Cybercriminal Disgruntled employee neither Disgruntled employee nor Cybercriminal Cybercriminal

Cybercriminal

1 / 1 pts Which of the following letters may appear in EUI-48 addresses? H both D and H D neither D nor H

D

1 / 1 pts ________ have access points. Home access routers Internet core routers both Home access routers and Internet core routers neither Home access routers nor Internet core routers

Home access routers

1 / 1 pts When Host A wishes to communicate with Host B, a DNS server provides the IP address of ________. Host A Host B None of these the DNS server

Host B

1 / 1 pts Given the following information, Switch 1 Host A connected on port 15 and is on VLAN 42 Host B connected on port 10 is on VLAN 27 Trunk link connected on port 25 to Switch 2 Switch 2 Host C connected on port 3 is on VLAN 27 Host D connected on port 5 is on VLAN 27 Host E connected on port 6 is on VLAN 42 Trunk link connected on port 32 to Switch 1 Which host or hosts can Host B communicate with? Hosts A, B, C, D, and E Host A Hosts A and E Hosts C and D

Hosts C and D

1 / 1 pts Which of the following is the most frustrating to use? IDSs NGFW firewalls SPI firewalls opaque filtering

IDSs

0 / 1 pts What organization (most specifically) creates Ethernet standards? IETF IEEE ISO OSI

IEEE

1 / 1 pts Which of the following is a standards agency for the Internet? neither IETF nor ISO IETF ISO both IETF and ISO

IETF

1 / 1 pts Which standards agency creates Internet standards? OSI TCP/IP IETF ITU-T

IETF

1 / 1 pts Which standards agency is especially important for Internet supervisory processes? Neither ISO and ITU-T nor IETF are important. IETF Both ISO and ITU-T and IETF are about equally important. ISO and ITU-T

IETF

1 / 1 pts Which standards agency is especially important for transport processes? IETF Neither ISO and ITU-T nor IETF are important. Both ISO and ITU-T and IETF are about equally important. ISO and ITU-T

IETF

0 / 1 pts Which of the following is a connectionless protocol? neither IP nor TCP both IP and TCP TCP IP

IP

1 / 1 pts Source and destination IP addresses are found in the ________ header. IP All of these. TCP Frame

IP

Routing is based on a(n) ________. single-network address neither IP address nor single-network address either IP address or single-network address IP address

IP address

1 / 1 pts Which has stronger security? IPsec SSL/TLS Both have about equal security.

IPsec

1 / 1 pts Which of the following allows packet fragmentation? IPv6 neither IPv4 nor IPv6 IPv4 both IPv4 and IPv6

IPv4

1 / 1 pts Which of the following checks for errors in the packet header? IPv6 neither IPv4 nor IPv6 IPv4 both IPv4 and IPv6

IPv4

To deliver IPv4 packets, routers look at the ________ addresses. All of these IPv4 dotted decimal notation EUI-48

IPv4

1 / 1 pts Which has a better system for handling options beyond the main header? Neither can handle options. Both use the same method. IPv4 IPv6

IPv6

1 / 1 pts Which standards agency is especially important for data link processes? Both ISO and ITU-T and IETF are about equally important. Neither ISO and ITU-T nor IETF are important. ISO and ITU-T IETF

ISO and ITU-T

1 / 1 pts Who are the most dangerous types of employees? IT security employees former employees financial employees manufacturing employees

IT security employees

0 / 1 pts Which of the following is a standards agency? TCP/IP All of these ITU-T OSI

ITU-T

1 / 1 pts A standards agency for OSI is ________. ITU-T both ITU-T and IETF IETF neither ITU-T nor IETF

ITU-T

1 / 1 pts Which standards agency is especially important for physical transmission processes? Neither ITU-T nor IETF are important. IETF Both ITU-T and IETF are about equally important. ITU-T

ITU-T

1 / 1 pts ________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time. Roaming Creating extended service sets The distribution system Media access control

Media access control

1 / 1 pts ________ occurs when the light energies of two pulses arrive at the far end at overlapping times. Modal dispersion Modal bandwidth Multimode transmission Modal interference

Modal dispersion

0 / 1 pts An access point can transmit to more than one wireless client at a time with ________. bonding MIMO CSMC/CA+ACK Multiuser MIMO

Multiuser MIMO

1 / 1 pts Which type of firewall filtering collects streams of packets to analyze them as a group? both SPI and NGFW neither SPI nor NGFW NGFW SPI

NGFW

1 / 1 pts Which type of firewall filtering looks at application-layer content? both stateful packet inspection and NGFW NGFW neither stateful packet inspection nor NGFW stateful packet inspection

NGFW

1 / 1 pts Which type of firewall is more expensive per packet handled? NGFW both SPI and NGFW SPI neither SPI nor NGFW

NGFW

1 / 1 pts If a packet is highly suspicious but not a provable attack packet, an ________ may drop it. IDS None of these SPI firewall NGFW

None of these

1 / 1 pts In the mask /14, how many 1s are there? 24 8 None of these 16

None of these

1 / 1 pts The hop limit field in IPv6 corresponds to the ________ field in IPv4 length protocol header checksum None of these

None of these

1 / 1 pts The version of Internet Protocol that is growing rapidly is IP version ________. None of these 2 4 1

None of these

1 / 1 pts What is pushing IPv6 adoption now? pressure from ISPs None of these pressure from ISO pressure from the IETF

None of these

1 / 1 pts What is the bandwidth of a channel that extends from 55 MHz to 60 MHz? None of these 60 MHz 55 MHz 65 MHz

None of these

0 / 1 pts In Wi-Fi, 2.4 GHz and 5 GHz refer to ________. broadbands None of these. frequency spectrums channels

None of these.

1 / 1 pts What is the quality designator for multimode optical fiber? OM neither Cat nor OM Cat both Cat and OM

OM

0 / 1 pts ________ is an interior dynamic routing protocol. both OSPF and BGP OSPF neither OSPF nor BGP BGP

OSPF

0 / 1 pts In 802.11i ________, hosts must know a shared initial key. both 802.1X initial authentication mode and PSK initial authentication mode PSK initial authentication mode 802.1X initial authentication mode neither 802.1X initial authentication mode nor PSK initial authentication mode

PSK initial authentication mode

1 / 1 pts Which of the following is true? Frames are carried inside packets. Packets are carried inside frames. neither Frames are carried inside packets nor Packets are carried inside frames both Frames are carried inside packets and Packets are carried inside frames

Packets are carried inside frames.

1 / 1 pts Which phase of the plan-protect-respond cycle takes the largest amount of work? Protect The phases require about equal amounts of effort. Respond Plan

Protect

0 / 1 pts Internet standards are published as ________. RFCs Internet Protocols IETFs TCP/IPs

RFCs

1 / 1 pts An abrupt close uses a ________ segment. either FIN or RST RST FIN neither FIN nor RST

RST

1 / 1 pts ________ is the dominant firewall filtering method used on main border firewalls today. Application content filtering Stateful packet inspection NGFW ACL filtering

Stateful packet inspection

1 / 1 pts Which of the following can handle an application message that is one megabyte in size? both TCP and UDP TCP neither TCP nor UDP UDP

TCP

1 / 1 pts The Wi-Fi Alliance calls 802.11i ________. None of these WPA WEP WPA2

WPA2

1 / 1 pts In the IPv4 address 1.2.3.4, what is the network part? We cannot say. 1.2 1 1.2.3

We cannot say

1 / 1 pts Which is a problem with IPv4 addresses? They are incompatible with wireless devices. They are too complex. We have run out of them. Routers find it difficult to handle them.

We have run out of them.

1 / 1 pts SSL/TLS is used for ________. Web applications almost all applications neither Web applications nor almost all applications both Web applications and almost all applications

Web Applications

1 / 1 pts ________ have SSIDs. Wireless access points both Wireless clients and Wireless access points neither Wireless clients nor Wireless access points Wireless clients

Wireless access points

1 / 1 pts An evil twin access point is usually ________. a laptop computer a spreadsheet a database a calculator

a laptop computer Fixed

1 / 1 pts ARP cache poisoning is ________. a DDoS attack a man-in-the middle attack an illegal login attack a DoS attack

a man-in-the middle attack

0 / 1 pts A central firewall management program that pushes changes to firewalls is __________. (Select the most specific answer.) a single point of takeover defense in depth a weakest link risk analysis thinking

a single point of takeover

1 / 1 pts In digital signaling, there is (are) ________ state(s). one only two an infinite number of a small number of

a small number of

1 / 1 pts On a server, well-known port numbers indicate ________. both applications and connections with client computers applications neither applications nor connections with client computers connections with client computers

applications

1 / 1 pts Authentication should generally be ________. the same for all resources different for every different resource as strong as possible appropriate for a specific resource

appropriate for a specific resource

0 / 1 pts SAs in two directions ________. are always different are sometimes different are always the same

are sometimes different

1 / 1 pts A type of encryption that requires seperate keys for encryption and decryption none of these asymmetric key encryption substitution ciphers symmetric key encryption

asymmetric key encryption

1 / 1 pts Electronic signatures provide message-by-message ________. confidentiality both authentication and confidentiality authentication neither authentication nor confidentiality

authentication

0 / 1 pts If your local DNS server does not know the host name of an IP address, it will get the address from a(n) ________. root DNS server None of these proxy DNS server authoritative DNS server

authoritative DNS server

1 / 1 pts A user is allowed to edit files in a particular directory. This is an example of __________. (Select the most specific answer.) network segregation authentication defense in depth authorizations

authorizations

From a security perspective, the Internet's ability to give access to nearly everyone is a ________. good thing both good thing and bad thing neither good thing nor bad thing bad thing

bad thing

1 / 1 pts In antivirus filtering, the best ways to filter currently use ________. application awareness signature detection behavioral detection stateful inspection

behavioral detection

1 / 1 pts Using bodily measurements for authentication is ________. illegal mandatory for good security All of these biometrics

biometrics

0 / 1 pts In a DDoS attack, a ________ sends messages directly to the victim. botmaster bot command and control server All of these

bot

1 / 1 pts NAT ________. provides some security neither allows a firm to have more internal IP addresses nor provides some security allows a firm to have more internal IP addresses both allows a firm to have more internal IP addresses and provides some security

both allows a firm to have more internal IP addresses and provides some security

0 / 1 pts RSTP ________. neither can increase reliability nor was created to break accidental loops both can increase reliability and was created to break accidental loops can increase reliability was created to break accidental loops

both can increase reliability and was created to break accidental loops

ISPs ________. connect users to the Internet both carry traffic in the Internet and connect users to the Internet neither carry traffic in the Internet nor connect users to the Internet carry traffic in the Internet

both carry traffic in the Internet and connect users to the Internet

1 / 1 pts Which UTP quality levels can send signals at 10 gigabits per second? category 6 both category 6 and category 6A category 6A neither category 6 nor category 6A

both category 6 and category 6A

1 / 1 pts Which layer(s) governs transmission through a single network? physical neither data link nor physical data link both data link and physical

both data link and physical

1 / 1 pts Individual throughput for users of an access point ________. depends on your distance from the access point both depends on how many users are sharing the access point and depends on your distance from the access point depends on how many users are sharing the access point neither depends on how many users are sharing the access point nor depends on your distance from the access point

both depends on how many users are sharing the access point and depends on your distance from the access point

1 / 1 pts As your wireless client travels away from an access point, ________. neither errors begin to increase nor your transmission speed decreases both errors begin to increase and your transmission speed decreases your transmission speed decreases errors begin to increase

both errors begin to increase and your transmission speed decreases

1 / 1 pts Beamforming can allow an access point to ________. send signals to two different clients at the same time both focus power on individual clients and send signals to two different clients at the same time focus power on individual clients neither focus power on individual clients nor send signals to two different clients at the same time

both focus power on individual clients and send signals to two different clients at the same time

0 / 1 pts MIMO ________. both increases transmission speed and increases transmission distance increases transmission distance increases transmission speed neither increases transmission speed nor increases transmission distance

both increases transmission speed and increases transmission distance

1 / 1 pts The domain name system ________. is a general naming system for the Internet is a way to find a host's IP addresses if your computer only knows the host's host name neither is a way to find a host's IP addresses if your computer only knows the host's host name nor is a general naming system for the Internet both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet

both is a way to find a host's IP addresses if your computer only knows the host's host name and is a general naming system for the Internet

1 / 1 pts Ethernet standards are specified at the ________ layer. physical data link neither physical nor data link both physical and data link

both physical and data link

0 / 1 pts When a packet is transmitted, there is a single data link in each ________. neither point-to-point single network nor switched network switched network point-to-point single network both point-to-point single network and switched network

both point-to-point single network and switched network

The transport layer on the destination host ________. both reassembles the application message if it has been fragmented and removes the transport header removes the transport header reassembles the application message if it has been fragmented neither reassembles the application message if it has been fragmented nor removes the transport header

both reassembles the application message if it has been fragmented and removes the transport header

1 / 1 pts Physical layer standards govern ________. neither signaling nor physical connectors signaling both signaling and physical connectors physical connectors

both signaling and physical connectors

1 / 1 pts For reusable passwords, NIST now recommends ________. neither that passwords be easy to remember nor that passwords be long phrases instead of being about 8-12 characters long both that passwords be easy to remember and that passwords be long phrases instead of being about 8-12 characters long that passwords be easy to remember that passwords be long phrases instead of being about 8-12 characters long

both that passwords be easy to remember and that passwords be long phrases instead of being about 8-12 characters long

1 / 1 pts In a four-step close, which side transmits a FIN segment? the side that does not initiate the close neither the side that initiates the close nor the side that does not initiate the close both the side that initiates the close and the side that does not initiate the close the side that initiates the close

both the side that initiates the close and the side that does not initiate the close

1 / 1 pts UDP ________. both is unreliable and has a checksum field neither is unreliable nor has a checksum field is unreliable has a checksum field

both the side that initiates the close and the side that does not initiate the close

1 / 1 pts Which of the following meets the definition of hacking? to intentionally use a computer on which you have an account but use it for unauthorized purposes to intentionally use a computer resource without authorization both to intentionally use a computer resource without authorization and to intentionally use a computer on which you have an account but use it for unauthorized purposes neither to intentionally use a computer resource without authorization nor to intentionally use a computer on which you have an account but use it for unauthorized purposes

both to intentionally use a computer resource without authorization and to intentionally use a computer on which you have an account but use it for unauthorized purposes

1 / 1 pts The term "broadband" is commonly used for ________. wide radio bandwidths neither wide radio bandwidths nor high-speed transmission in general both wide radio bandwidths and high-speed transmission in general high-speed transmission in general

both wide radio bandwidths and high-speed transmission in general

0 / 1 pts Under the standard, Ethernet switches can provide enough power over UTP for ________. both wireless access points and voice over IP telephones wireless access points voice over IP telephones neither wireless access points nor voice over IP telephones

both wireless access points and voice over IP telephones

1 / 1 pts In an HTTP, which one (browser or Webserver application program) transmits message first? browser Webserver application program They transmit simultaneously. It depends on the situation.

browser

1 / 1 pts "Octet" is the same as ________. "byte" "bit" either "bit" or "byte", depending on the context neither "bit" nor "byte"

byte

1 / 1 pts Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? both category 6 and category 6A category 6A neither category 6 nor category 6A category 6

category 6A

1 / 1 pts In digital certificate authentication, the verifier gets the key it needs directly from the ________. true party verifier certificate authority supplicant

certificate authority

0 / 1 pts An FM radio station is called Moldy Oldies 101.1. The 101.1 refers to its ________. None of these channel single frequency service band

channel

1 / 1 pts If you want to transmit 7 times as fast in radio, you need to use ________. None of these channels that are about 49 times as wide channels that are about 7 times as wide spread spectrum transmission

channels that are about 7 times as wide

0 / 1 pts The source socket is 60.171.18.22:2707. The source is a(n) ________. ephemeral server client server well-known server

client

1 / 1 pts On the Internet, a ________ host usually gets a dynamic IP address. server neither client nor server both client and server client

client

When you use your tablet to access the internet, the tablet is a ________. server host client host neither client host nor server host both client host and server host

client host

1 / 1 pts In IPv6 addresses, fields are separated by ________. colons dots dashes hashtag

colons

1 / 1 pts Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. authentication both authentication and confidentiality confidentiality neither authentication nor confidentiality

confidentiality

1 / 1 pts In SPI firewalls, ACLs are used for packets in the ________ state. both connection-opening and ongoing communication connection-opening ongoing communication neither connection-opening nor ongoing communication

connection-opening

1 / 1 pts In optical fiber, light travels through the ________. core both core and cladding cladding

core

1 / 1 pts What type of switch connects switches to other switches? workgroup switches core switches trunk switches None of these

core switches

1 / 1 pts 802.11i 802.1X initial authentication mode was created for ________. corporations with less than eight access points residences with less than eight access points residences with a single access point corporations with multiple access points

corporations with multiple access points

The IETF primarily ________. All of these creates Internet standards coordinates the work of ISPs manages the Internet

creates Internet standards

1 / 1 pts In authentication, ________ are the general name for proofs of identity. digital certificates credentials authorizations All of these

credentials

1 / 1 pts At what layer will you find standards for switches? application transport Internet data link

data link

1 / 1 pts The path a message takes from the source host to the destination device in an Ethernet network is a ________. route data link label-switched route physical link

data link

paths across a single network are called ________. None of these routes data links physical links

data links

1 / 1 pts The final router in a route sends the packet being routed in a frame addressed to the ________. default router next-hop router destination host local router

destination host

1 / 1 pts After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. an 802.1X key the preshared key WPA keys different pairwise session keys

different pairwise session keys

1 / 1 pts If the destination internet process detects an error, it ________. discards the packet both discards the packet and sends back a segment notifying the sender sends back a segment notifying the sender neither discards the packet nor sends back a segment notifying the sender

discards the packets

1 / 1 pts In DNS, a group of resources under the control of an organization is called a ________. scope network domain subnet

domain

1 / 1 pts Companies get second-level domains from ________. the Internet Society domain registrars the United States Government the IETF

domain registrars

0 / 1 pts When a packet that is not part of an ongoing connection and that does not attempt to open a connection arrives at a stateful inspection firewall, the firewall ________. does not approve the connection passes the packet opens a new connection drops the packet

drops the packet

0 / 1 pts Pinging is to send ICMP ________ messages to the target host. echo echo request ping error advisement

echo request Partial

1 / 1 pts ICMP is used for ________. error messages configuration messages routing messages None of these

error messages

1 / 1 pts A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. the interface ID the subnet ID fffe 0000

fffe

1 / 1 pts One-bit fields are called ________ fields. None of these flag SYN ACK

flag

1 / 1 pts TCP has single-bit fields in its headers; these single-bit fields are called ________ fields. binary ACK port flag

flag

1 / 1 pts Optical fiber cords use two strands ________. to double the transmission speed to form a complete electrical loop for reliability through redundancy for full-duplex transmission

for full-duplex transmission

1 / 1 pts Source and destination EUI-48 addresses are found in ________ headers. TCP IP UDP frame

frame

1 / 1 pts Ethernet messages are ________. not named segments packets frames

frames

0 / 1 pts A message always has a ________. both header and data field neither header nor data field data field header

header

1 / 1 pts SYN segments have ________. headers, data fields, and trailers headers and data fields headers data fields only

headers

1 / 1 pts TCP control segments normally have ________. headers, data fields, and trailers None of these headers and data fields headers

headers

1 / 1 pts Frequency is measured in terms of ________. microns nanometers microseconds hertz

hertz

1 / 1 pts For human reading, IPv6 addresses are written in ________ notation. All of these dotted decimal hexadecimal binary

hexadecimal

1 / 1 pts Ethernet has reliability issues because of its ________. too-simple switch operation hierarchical organization neither too-simple switch operation nor hierarchical organization both too-simple switch operation and hierarchical organization

hierarchical organization

We call any device connected to the Internet a(n) ________. host client IP router

host

0 / 1 pts Which is NOT one of the three parts of a public IPv6 unicast address? host part subnet ID routing prefix All of these are parts in a public IPv6 unicast address.

host part

1 / 1 pts In which type of attack does the attacker gather extensive sensitive personal information about its victim? credit card number theft identity theft neither identity theft nor credit card number theft both identity theft and credit card number theft

identity theft

0 / 1 pts Policies are separated by implementation to take advantage of __________. implementer knowledge minimum permissions segregation of duties the delegation of work principle

implementer knowledge

1 / 1 pts Two access points that operate on the same channel will ________. bond interfere coordinate their use of the channel divide the available spectrum about equally

interfere

1 / 1 pts The downside of unlicensed bands is potential ________ loss of flexibility less-developed standards interference from others speed loss

interference from others

1 / 1 pts A company is free to select whatever ________ dynamic routing protocol it wishes. both interior and exterior neither interior nor exterior exterior interior

interior

1 / 1 pts Network standards provide ________. strobing synchronization interoperability entanglement

interoperability

1 / 1 pts A firewall will drop a packet if it ________. both is a definite attack packet and is a highly probable attack packet is a definite attack packet is a highly probable attack packet neither is a definite attack packet nor is a highly probable attack packet

is a definite attack packet

1 / 1 pts Using RSTP to provide backup links in Ethernet ________. is simple is impossible is challenging is automatic

is challenging

1 / 1 pts Facial recognition is controversial because ________. both it can be fooled very easily and it can be used surreptitiously neither it can be fooled very easily nor it can be used surreptitiously it can be fooled very easily it can be used surreptitiously

it can be used surreptitiously

1 / 1 pts Spread spectrum transmission is used in WLANs because ________. both it is required by regulators and it offers strong security it is required by regulators it offers strong security neither it is required by regulators nor it offers strong security

it is required by regulators

1 / 1 pts Stateful packet inspection firewalls are attractive because of their ________. low cost for a given traffic volume both low cost for a given traffic volume and ability to base rules on specific application programs neither low cost for a given traffic volume nor ability to base rules on specific application programs ability to base rules on specific application programs

low cost for a given traffic volume

1 / 1 pts The general term for evil software is ________. malware worm virus All of these

malware

1 / 1 pts The Internet is organized in a ________. mesh hierarchy ring None of these

mesh

1 / 1 pts Which of the following is used most often in LANs for fiber transmission links? single-mode fiber multimode fiber modal bandwidth fiber 1.550 nm fiber

multimode fibera

1 / 1 pts The most serious problem with wireless transmission in WLANs is ________. absorptive attenuation multipath interference inverse square law attenuation shadow zones

multipath interference

1 / 1 pts In an extended service set, each access point ________. must have a different SSID must have a coordinated SSID None of these must have the same SSID

must have the same SSID

0 / 1 pts The almost-universal exterior dynamic routing protocol is ________. EIGRP neither EIGRP nor OSPF both EIGRP and OSPF OSPF

neither EIGRP nor OSPF

1 / 1 pts Which of the following is an architecture? IETF both ISO and IETF neither ISO nor IETF ISO

neither ISO nor IETF

0 / 1 pts HTTP is ________. neither connection-oriented nor reliable both connection-oriented and reliable reliable Connection-oriented.

neither connection-oriented nor reliable

1 / 1 pts Wi-Fi normally uses a(n) ________. neither omnidirectional antenna nor dish antenna dish antenna omnidirectional antenna both omnidirectional antenna and dish antenna

omnidirectional antenna

1 / 1 pts A local area network operates ________. both on a customer premises and between customer premises neither on a customer premises nor between customer premises on a customer premises between customer premises

on a customer premises

0 / 1 pts After the side wishing to close a TCP connection sends a FIN segment, it will ________. only send ACK segments None of these only send FIN segments not send any more segments

only send ACK segments

1 / 1 pts When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________. passes the packet, but notifies an administrator drops the packet drops the packet and notifies an administrator passes the packet

passes the packet

0 / 1 pts IPv6 uses ________ to know the packet length. header length fields total length fields hop limits payload lengths

payload lengths

1 / 1 pts Pieces of code that are executed after the virus or worm has spread are called ________. exploits compromises vulnerabilities payloads

payloads

1 / 1 pts At what layer is the 100BASE-TX standard? data link physical physical and data link Internet

physical

1 / 1 pts Which layer governs wires? Internet physical None of these transport

physical

1 / 1 pts In a single switched network, a ________ connects consecutive switches. None of these. physical link route data link

physical link

1 / 1 pts UTP and fiber distance limits are for ________. Internet routes physical links data link physical and data link

physical links

1 / 1 pts SPI firewalls are being replaced in large part because they are limited in their ability to detect ________. NAT None of these port spoofing piggybacking

port spoofing

1 / 1 pts Iris scanning is attractive because of its ________. both low cost and precision neither low cost nor precision precision low cost

precision

0 / 1 pts NAT enhances security by ________. both preventing sniffers from learning internal IP addresses and encryption encryption preventing sniffers from learning internal IP addresses neither preventing sniffers from learning internal IP addresses nor encryption

preventing sniffers from learning internal IP addresses

1 / 1 pts In an IPv4 packet, the ________ field value tells the type of message contained in the IP packet's data field. next-hop next-header data protocol

protocol

0 / 1 pts UTP categories rate the ________ of UTP cabling. error performance quality-of-service performance speed Quality

quality

1 / 1 pts What problem limits transmission distance in 4-pair UTP? radiation None of these heat conduction reflection at the two ends

radiation

1 / 1 pts In a ________ attack, the attacker encrypts some or all of the victim's hard drive. lock DoS ransom virus

ransom

1 / 1 pts DoS attacks attempt to ________. delete files on a computer hack a computer steal information from a computer reduce the availability of a computer

reduce the availability of a computer

1 / 1 pts Having only a single possible path between devices ________. None of these. reduces errors provides reliability reduces switching cost

reduces switching cost

1 / 1 pts A ________ is an unauthorized internal access point. rogue binky None of these Shadow

rogue

1 / 1 pts It is most desirable to do access control based on __________. roles individuals a three-headed dog named Fluffy standard authorizations

roles

0 / 1 pts The highest-level DNS servers are called ________. top-level domain servers root servers neither root servers nor top-level domain servers both root servers and top-level domain servers

root servers

1 / 1 pts In a routing table, a ________ represents a route for a group of IP addresses. row column metric schema

row

0 / 1 pts Corporations wish to have ________ domain names. top-level None of these second-level third-level

second-level

1 / 1 pts In IPsec, agreements about how security will be done are called ________. security associations tranches service-level agreements security contracts

security associations Fixed

1 / 1 pts The PAD field is added by the ________ if the frame is too short without it. sender receiver neither sender nor receiver both sender and receiver

sender

1 / 1 pts Traditionally, we have told users that passwords ________. should be easy to remember neither should have a mix of characters (uppercase and lowercase letters, digits, other keyboard characters) nor should be easy to remember both should have a mix of characters (uppercase and lowercase letters, digits, other keyboard characters) and should be easy to remember should have a mix of characters (uppercase and lowercase letters, digits, other keyboard characters)

should have a mix of characters (uppercase and lowercase letters, digits, other keyboard characters)

1 / 1 pts The longest transmission distances are possible with ________. multimode fiber USB UTP single-mode fiber

single-mode fiber

1 / 1 pts What kind of attack is most likely to succeed against a system with no technological vulnerabilities? both malware and social engineering malware social engineering neither malware nor social engineering

social engineering

1 / 1 pts Signals in a transmission usually ________. spread over the entire service band travel at a single frequency spread over the entire frequency distribution spread over a range of frequencies

spread over a range of frequencies

1 / 1 pts Compliance with __________ is mandatory. Both of these Neither of these standards guidelines

standards

1 / 1 pts What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address? None of these subnet ID global routing prefix interface ID

subnet ID

1 / 1 pts In a subnet mask, the 1s correspond to the ________. network part All of these host part subnet part

subnet part

1 / 1 pts Which of the following is one of the three parts of an IPv4 address? neither subnet part nor subnet mask subnet part subnet mask both subnet part and subnet mask

subnet part

1 / 1 pts An internal router connects different IP ________. both subnets and networks neither subnets nor networks networks subnets

subnets

0 / 1 pts If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client? the local DNS server No IP address will be returned to the client. the remote DNS server either the local DNS server or the remote DNS server

the local DNS server

0 / 1 pts In digital certificate authentication, the supplicant encrypts the challenge message with ________. the verifier's private key the supplicant's private key the true party's private key None of these

the supplicant's private key

0 / 1 pts When a user attempts to plug into an Ethernet switch protected by 802.1X, ________. the user will be required to authenticate himself or herself the switch port will freeze None of these the switch will freeze

the user will be required to authenticate himself or herself

1 / 1 pts If an 802.11n client tries to use an 802.11ac access point, ________. they will not be able to communicate they will communicate using 802.11ac either they will communicate using 802.11n or they will communicate using 802.11ac they will communicate using 802.11n

they will communicate using 802.11n

1 / 1 pts In a single switched network with seven switches between a source and destination host, the source host addresses the frame ________. to the destination host to the first switch to the final switch to the first router

to the destination host

1 / 1 pts ".com" is a ________. None of these top-level domain second-level domain root domain

top-level domain

0 1 / 1 pts The main problem with the 60 GHz unlicensed band is that ________. transmission speed is low transmission distance is short it does not support MIMO it cannot be used outside

transmission distance is short Exam 3:

1 / 1 pts IETF standards are dominant in the OSI-TCP/IP layered standards architecture at the ________ layer. neither data link nor transport transport both data link and transport data link

transport

1 / 1 pts Which layer processes application message fragmentation? All of these transport application Internet

transport

What process adds a header in front of an application message or fragment? application data link internet transport

transport

1 / 1 pts TCP/IP standards are set at the ________. physical layer transport layer both physical layer and transport layer neither physical layer nor transport layer

transport layer

1 / 1 pts Which protects more of the original IP packet? tunnel mode Both provide the same protection to the IP packet. transport mode

tunnel mode Fixed

0 / 1 pts If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).

two

1 / 1 pts In binary signaling, there is (are) ________ state(s). two between three and ten one an infinite number of

two

1 / 1 pts Compared to wired transmission, propagation problems in radio transmissions are ________. worse better about as bad

worse

1 / 1 pts In unlicensed bands, ________. both you can use radios wherever you please and you can prevent nearby businesses from setting up access points in the same channel neither you can use radios wherever you please nor you can prevent nearby businesses from setting up access points in the same channel you can prevent nearby businesses from setting up access points in the same channel you can use radios wherever you please

you can use radios wherever you please

1 / 1 pts Vulnerability-based attacks that occur before a patch is available are called ________ attacks. indefensible stealth malware zero-day

zero-day


Kaugnay na mga set ng pag-aaral

Pathology of Thyroid Disease I- Dr. Vila

View Set

From scientific Revolution to Enlightenment

View Set

Quiz 3 Nurse Practice Act, ***Professionalism Tidwell Lecture, ***HESI RN Disaster Planning, ****Leadership and Management Test #3, Professionalism

View Set

Chapter 7: Digestive System Chapter 8: Urinary System

View Set