Chapter9, 11

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

103) The neighbor advertisement protocol message was created to give the ________ address of the host sending the message. A) IPv6 B) IPv4 C) Both A and B D) Neither A nor B

A

11) NAT enhances security by preventing ________. A) sniffers from learning internal IP addresses B) encryption C) Both A and B D) Neither A nor B

A

15) Which of the following is a private IP address range? A) 10.x.x.x. B) 128.171.x.x. C) Both A and B D) Neither A nor B

A

17) VoIP uses ________ switching. A) circuit B) packet C) Either A or B

A

21) Which of the following is likely to dominate in VoIP? A) SIP. B) H.323.

A

22) SIP is a ________ protocol for VoIP. A) signaling B) transport C) Both A and B D) Neither A nor B

A

23) VoIP users have ________ in their phones or on their computers. A) media gateways B) codecs C) Both A and B D) Neither A nor B

A

26) The highest-level DNS servers are called ________. A) root servers B) top-level servers C) Both A and B D) Neither A nor B

A

3) Users are primarily concerned about the ________ layer. A) application B) transport C) internet D) physical

A

30) Which of the following is used to retrieve Web pages? A) HTTP. B) HTML. C) RTP. D) SQL.

A

31) Which of the following is used in webpage bodies? A) HTTP. B) HTML. C) Both A and B D) Neither A nor B

A

33) Which of the following are usually given dynamic IP addresses? A) Clients. B) Servers. C) Both A and B D) Neither A nor B

A

35) In HTTP, keywords usually are followed by a ________. A) colon (:) B) carriage return/line feed C) blank line D) space

A

76) In BitTorrent, a(n) ________ is a server that coordinates the file transfer. A) swarm B) index C) tracker D) None of the above

C

78) Which of the following is a security risk associated with BitTorrent? A) Danger caused by opening TCP ports on the firewall. B) Danger that an employee may download an infected file. C) Both A and B D) Neither A nor B

C

83) Which element of the Skype network is in charge of signaling? A) The login server. B) Host nodes. C) Super nodes. D) Media gateways.

C

83) Which is not one of the three parts of a public IPv6 unicast address? A) Subnet ID. B) Routing prefix. C) Host part. D) All of the above ARE parts in a public IPv6 unicast address.

C

86) Which of the following steps in Skype is done P2P? A) Signaling. B) Transport. C) Both A and B D) Neither A nor B

C

89) A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000

C

90) To configure itself, a client PC running IPv6 can configure itself using ________. A) DHCP B) stateless autoconfiguration C) Both A and B D) Neither A nor B

C

10) Mail servers communicate with each other by using ________. A) POP B) HTTP C) RFC 2822 D) SMTP

D

102) In DNS servers, the IPv6 address of a host is contained in the ________ record. A) IPv6 B) IPv4+ C) A D) None of the above

D

2) The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture

D

20) In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain

D

26) Variability in time delays between successive packets in a transport stream is called ________. A) a timing error B) a warble C) a SIP violation D) jitter

D

28) How many DNS root servers are there? A) 1. B) 2. C) 10. D) 13.

D

29) Codec data comes after the ________ header in VoIP transport frames. A) IP B) TCP C) UDP D) RTP

D

3) If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) None of the above

D

1) A networked application is an application that requires a network to operate.

TRUE

10) NAT provides security.

TRUE

100) Stateless autoconfiguration can be used to change all routing prefixes and subnet IDs in a network.

TRUE

12) NAT can multiply the number of IP addresses available to the firm by over a thousand.

TRUE

13) Private IP address ranges are only used within a firm.

TRUE

2) When the subnet part is made larger, the host part must be smaller.

TRUE

23) ".edu" is a generic top-level domain.

TRUE

32) Servers have static IP addresses so that clients can find them easily.

TRUE

36) Clients can send a DHCP request message to multiple DHCP servers.

TRUE

42) In SNMP, the time-to-live value for a router interface is the value for an object.

TRUE

46) Utility computing is usually offered as a pay-as-you-go service.

TRUE

5) If a hacker takes over an application, he or she gets all the privileges of the application on the computer.

TRUE

52) In SNMP, Set commands tell the agent to change a parameter on the managed device.

TRUE

52) Virtualization has contributed to the popularity of cloud computing.

TRUE

54) In virtualization, each virtual machine acts like a stand-alone computer to its users.

TRUE

55) When deciding whether to use cloud computing, a company must consider security risk.

TRUE

59) Label-switching routers do NOT look at the IP address of each arriving packet.

TRUE

60) SOAs are language-independent.

TRUE

61) In SOAs, a program written in C++ can communicate with a program written in Java.

TRUE

66) IPsec protects all layers above the internet layer.

TRUE

71) In transport mode, IPsec provides security over the internal networks.

TRUE

74) In BitTorrent file sharing, you download parts of the file simultaneously from multiple peers.

TRUE

76) IPsec is used for site-to-site VPNs.

TRUE

9) NAT operates transparently to the two hosts.

TRUE

91) The detailed method of Skype's encryption for confidentiality is unknown.

TRUE

91) The first stage in IPv6 stateless autoconfiguration is to create an address that can only be used on the host's single network.

TRUE

92) After creating a link local IPv6 address, a host doing IPv6 stateless autoconfiguration should use the neighbor discovery protocol.

TRUE

99) IPv6 has a number of known security weaknesses.

TRUE

4) The advance that made the client/server application architecture possible was ________. A) the Internet B) client processing power C) application sophistication D) input/output methods

A

40) In cloud ________, the user accesses the software over the Internet, often with a browser. A) SaaS B) utility computing

A

45) In ________, a company offloads server processing work to another company at a remote site. A) utility computing B) Software as a Service C) None of the above

A

46) In SNMP, the ________ creates commands. A) manager B) agent C) Both A and B D) Neither A nor B

A

48) Which of the following is an attraction of cloud utility computing? A) Flexibility. B) Control over operations. C) Both A and B D) Neither A nor B

A

54) In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) Neither A nor B

A

55) SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above

A

57) In MPLS, the interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) on the basis of the previous packet going to the packet's IP address. D) None of the above

A

62) ________ use ________ that provide services to customers using WWW interaction standards. A) Web services, service objects B) Service objects, web services

A

69) Which of the following is true? A) Web service is one way to implement a SOA. B) SA Web service is one way to implement SOAP. C) Both A and B D) Neither A nor B

A

7) RFC 822 and RFC 2822 standards govern ________. A) plain text content of e-mail messages B) HTTP page contents C) HTML commands and content D) plain text, graphic, and video content of e-mail messages

A

70) The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. A) protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B

A

71) Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures? A) Underutilized processing capacity of client PCs. B) Potential for essential data/services to become unavailable as a device is turned off. C) Both A and B D) Neither A nor B

A

72) Transient client presence tends to be a problem in ________. A) P2P applications B) client/server applications C) Both A and B D) Neither A nor B

A

74) Client PCs must have digital certificates in ________. A) transport mode B) tunnel mode C) Both A and B D) Neither A nor B

A

77) In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________. A) swarm B) index C) tracker D) None of the above

A

78) Which of the following standards provides for central management? A) IPsec. B) SSL/TLS. C) Both A and B D) Neither A nor B

A

79) The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power. A) BitTorrent B) client/server C) Both A and B D) Neither A nor B

A

79) Which is less expensive to implement? A) SSL/TLS. B) IPsec. C) Both cost about the same to implement.

A

80) Skype offers ________. A) free calling among Skype customers B) free calling to and from Public Switched Telephone Network customers C) Both A and B D) Neither A nor B

A

84) The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) Both A and B

A

88) The IEEE calls 64-bit interface addresses ________. A) Extended Unique Identifiers B) Interface IDs C) Both A and B

A

98) In stateless autoconfiguration, providing the address of DNS servers is ________. A) unnecessary B) mandatory C) optional D) impossible

A

11) If you are using a Web-enabled e-mail system ________. A) you have to install a special Web-enabled e-mail client to access your e-mail B) you access and send mail by using a Web browser C) you are more likely to be susceptible to viruses being introduced on your computer D) you are unable to send/receive e-mail messages containing information other than letters or numbers

B

12) Which of the following allows you to read your e-mail easily on an Internet cafés computer? A) POP. B) Web-enabled e-mail. C) Both A and B D) Neither A nor B

B

15) Which of the following offers more reliable antivirus protection? A) Antivirus software on user PCs. B) Antivirus software on the mail server. C) Both A and B are about equally reliable.

B

16) According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s). A) 1 B) 2 C) 3 D) 4

B

19) ________ is a general naming system for the Internet. A) NAT B) DNS C) Both A and B D) Neither A nor B

B

21) ".com" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above

B

22) ".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above

B

25) Corporations most wish to have ________ domain names. A) top-level B) second-level C) third-level D) None of the above

B

25) For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) codec standards D) IP

B

27) RTP supports ________. A) faster transmission speed B) jitter control C) Both A and B D) Neither A nor B

B

28) Which header comes SECOND in a VoIP transport packet? A) RTP. B) UDP. C) TCP. D) Application.

B

30) Servers are normally given ________ IP addresses. A) well-known B) static C) dynamic D) None of the above

B

33) How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A) 3 B) 4 C) 88 D) 91

B

34) Clients normally get their IP addresses from ________. A) DNS servers B) DHCP servers C) directory servers D) identity servers

B

34) In HTTP, fields normally are ended by a ________. A) colon (:) B) carriage return/line feed C) blank line D) space

B

36) The code "200" may be found in HTTP ________ messages. A) request B) response C) Both A and B D) Neither A nor B

B

37) DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve. A) ranges B) scopes C) spans D) domains

B

39) In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) Both A and B D) Neither A nor B

B

4) In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) None of the above

B

48) In SNMP, the ________ creates responses. A) manager B) agent C) Both A and B D) Neither A nor B

B

50) In SNMP, the ________ creates traps. A) manager B) agent C) Both A and B D) Neither A nor B

B

51) In SNMP, the manager can create ________. A) traps B) GET commands C) Both A and B D) Neither A nor B

B

53) A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard. A) command B) trap C) alarm D) All of the above

B

53) In virtualization, the real computer's capacity is divided among a number of ________. A) hypervisors B) virtual machines C) Neither A nor B

B

60) Label-switching routers base their decisions on a packet's ________. A) IP address B) label number C) Both A and B D) Neither A nor B

B

61) In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) Both A and B D) Neither A nor B

B

65) IPsec protects ________ layer messages. A) data link B) application C) Both A and B D) Neither A nor B

B

65) In SOA, SOAP messages are encoded in ________. A) HTML B) XML C) Both A and B D) Neither A nor B

B

68) In tunnel mode, IPsec provides protection ________. A) all the way between the two hosts B) only between the IPsec servers C) Both A and B D) Neither A nor B

B

7) ________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) None of the above

B

72) Which mode of IPsec is more expensive? A) Transport mode. B) Tunnel mode. C) Both A and B are equally expensive.

B

73) In ________ file retrieval, your computer downloads a file from a server. A) P2P B) client/server C) BitTorrent D) None of the above

B

73) The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________. A) that it provides protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B

B

75) In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files. A) swarm B) index C) tracker D) None of the above

B

8) In NAT, the ________ creates new external source IP addresses and port numbers. A) router B) firewall C) source host D) destination host

B

80) Which has stronger security? A) SSL/TLS. B) IPsec. C) Both have about equal security.

B

81) If a host to be able to communicate via IPv4 and IPv6, it is said to ________. A) be bilingual B) have a dual stack C) be IPv6 ready D) be fully compliant

B

81) Which of the following is not one of the main elements of the Skype network? A) Login server. B) Proxy server. C) Host node. D) Super node.

B

82) In Skype, ________ is the process where a Skype application looks up the username and IP address of the party it wants to contact. A) login B) directory search C) transport D) signaling

B

82) Today, it is problematic to have ________. A) only a single IPv4 stack B) only a single IPv6 stack C) a dual stack D) All of the above

B

84) Which element of the Skype network is in charge of transport? A) The login server. B) Host nodes. C) Super nodes. D) Media gateways.

B

85) If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits. B) 32 bits. C) 64 bits. D) We cannot say.

B

85) Which of the following steps in Skype is done P2P? A) Login. B) Signaling. C) Both A and B D) Neither A nor B

B

86) The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) We cannot say.

B

87) In an IPv6 global unicast address, the interface ID is ________ bits long. A) less than 32 B) 64 C) 128 D) We cannot say.

B

88) Signaling is done using servers (not P2P) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B

B

93) Access to a router is needed to create a ________. A) link local IPv6 address B) global unicast IPv6 address C) Both A and B D) Neither A nor B

B

93) The Skype protocol is relatively ________ for corporate firewalls to filter. A) easy B) difficult

B

94) The router advertisement protocol may ________. A) give the client an IPv6 address B) forbid the use of stateless autoconfiguration C) Both A and B D) Neither A nor B

B

94) Which of the following is a processor-sharing application? A) BitTorrent. B) SETI@home. C) SIP. D) Skype.

B

101) Stateless autoconfiguration can be used to ________. A) change all subnet IDs in a network B) change all routing prefixes in a network C) Both A and B D) Neither A nor B

C

13) Antivirus software checks e-mail attachments for ________. A) viruses B) Trojan horses C) Both A and B D) Neither A nor B

C

14) Which of the following can be used within a firm? A) Private IP addresses. B) Public IP addresses. C) Both A and B D) Neither A nor B

C

16) Which of the following is true about NAT? A) It can enhance security. B) It presents problems for some protocols. C) Both A and B D) Neither A nor B

C

18) The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) Both A and B D) Neither A nor B

C

20) A media gateway translates ________ transmissions. A) signaling B) transport C) Both A and B D) Neither A nor B

C

24) Speech codecs vary with respect to ________. A) compression B) voice quality C) Both A and B D) Neither A nor B

C

29) A company receives its domain name from ________. A) the IETF B) its ISP C) a domain registrar D) None of the above

C

38) In HTTP response messages, the attached file is preceded by a ________. A) colon (:) B) space C) blank line D) None of the above

C

39) SaaS software vendors may make an application available by ________. A) hosting it on their own webservers B) allowing the application to be downloaded to the consumer device C) Both A and B D) Neither A nor B

C

43) The management information base (MIB) is a(n) ________. A) schema B) actual database C) Either A or B D) Neither A nor B

C

45) Which of the following would be an SNMP object? A) Number of rows in routing table. B) System uptime (since last reboot). C) Both A and B D) Neither A nor B

C

47) If a company runs its own data center, it might face problems with ________. A) overprovisioning B) underprovisioning C) Both A and B D) Neither A nor B

C

50) Which of the following is not an issue for cloud utility computing? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Very high costs. D) Security concerns.

C

51) Which of the following is a factor that has contributed to the popularity of cloud computing? A) The Internet. B) Web services. C) Both A and B D) Neither A nor B

C

56) SNMPv3 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above

C

58) In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path

C

58) SOAs are attractive because of ________. A) reuse B) language independence C) Both A and B D) Neither A nor B

C

59) In SOA, what language can be used to create service objects? A) Java. B) C++. C) Both A and B D) Neither A nor B

C

6) Having all privileges on a computer is known as having ________. A) all access B) total control C) root privileges D) All of the above

C

62) Label-switching routers provide ________. A) lower cost B) the ability to do traffic engineering C) Both A and B D) Neither A nor B

C

63) IPsec is a(n) ________ layer standard. A) physical B) data link C) internet D) All of the above

C

66) The purpose of ________ is to allow a calling program to understand how to use a service object. A) SOAP B) XML C) WDSL D) UDDI

C

68) Which of the following is true? A) A Web service is one way to implement a SOA. B) SOAP is one way to implement a Web service. C) Both A and B D) Neither A nor B

C

75) IPsec is used for ________ VPNs. A) remote-access B) site-to-site C) Both A and B D) Neither A nor B

C

95) If most P2P applications use facilitating servers, why do we still call them peer-to-peer? A) We accept sloppy terminology. B) We do NOT still call them peer-to-peer. C) User computers do most of the work. D) P2P applications do NOT use servers.

C

95) The router advertisement protocol may ________. A) give the client a routing prefix B) give the client a subnet ID C) Both A and B D) Neither A nor B

C

96) Stateless autoconfiguration makes more sense for ________. A) single-stack IPv4 hosts B) single-stack IPv6 hosts C) dual-stack hosts D) It makes equal sense for all of the above.

C

32) How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A) 1 B) 2 C) 3 D) None of the above

D

35) ________ servers provide ________ IP addresses to clients. A) DNS, static B) DNS, dynamic C) DHCP, static D) DHCP, dynamic

D

37) ________ is a standard to describe a file's format type. A) RFC 2822 B) SMTP C) HTML D) MIME

D

38) Which of the above is NOT an element in a network management system? A) The manager. B) Agents. C) Objects. D) All of the above ARE elements in network management systems.

D

42) Which of the following is an attraction of cloud SaaS? A) Potential lowered costs in hardware and personnel. B) Mobility. C) Collaboration. D) All of the above

D

43) Which of the following is not an issue for cloud Software as a Service? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Security concerns. D) All of the above are issues for cloud Software as a Service.

D

49) Which of the following is not an issue for cloud utility computing? A) The possibility of losing access. B) The possibility of getting locked into proprietary software. C) Security concerns. D) All of the above are issues for cloud utility computing.

D

5) Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have? A) 8 B) 16 C) 254 D) 65,534

D

57) In SOA, calls are placed to ________. A) programs B) subprograms C) subroutines D) service objects

D

6) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 14 B) 16 C) 256 D) None of the above

D

67) The purpose of ________ is to help someone to find an appropriate service object. A) SOAP B) XML C) WDSL D) UDDI

D

77) In IPsec, agreements about how security will be done are called ________. A) tranches B) security contracts C) service-level agreements D) security associations

D

8) E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) POP D) UNICODE

D

87) Login is done P2P (instead of using servers) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B

D

89) Transport is done using servers (not P2P) in ________. A) Skype B) traditional VoIP C) Both A and B D) Neither A nor B

D

9) A traditional e-mail user sending messages to his or her mail server would most likely use ________. A) the IMAP standard B) the POP standard C) either the IMAP or POP standard D) the SMTP standard

D

1) In IP subnet planning, having a large subnet part allows more hosts per subnet.

FALSE

14) If companies place antivirus software on all of their client PCs, this will stop almost all virus infections.

FALSE

17) NAT works automatically with all protocols.

FALSE

18) Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.

FALSE

19) A media gateway connects a client computer or VoIP phone to the VoIP network.

FALSE

24) ".UK" is a generic top-level domain.

FALSE

27) In the Domain Name System, there is a single root server.

FALSE

31) Servers are normally given dynamic IP addresses.

FALSE

40) In SNMP, the manager communicates directly with the managed device.

FALSE

41) An organization that provides cloud services is called a cloud ISP.

FALSE

41) In SNMP, "object" is another name for "managed device."

FALSE

44) Human interface functionality is defined by the SNMP standard.

FALSE

44) Utility computing is a new phenomenon.

FALSE

47) In SNMP, the agent can create commands.

FALSE

49) In SNMP, the manager creates both commands and responses.

FALSE

56) A service-oriented architecture is an application architecture in which a few large programs interact to provide a unified service.

FALSE

63) The terms SOA and Web services mean the same thing.

FALSE

64) By definition, Web services are implemented using SOAP.

FALSE

64) IPsec operates at the data link layer.

FALSE

67) To be protected by IPsec, applications must be IPsec-aware.

FALSE

69) In tunnel mode, IPsec provides protection all the way between the two hosts.

FALSE

70) To be considered a peer-to-peer application architecture, there can be no dedicated servers included on the network.

FALSE

90) Skype's security protocols have been publically studied and approved.

FALSE

92) Skype requires people to prove their identity before they specify a username.

FALSE

97) Stateless autoconfiguration will give an IPv6 host most or all of the configuration information it needs to operate effectively.

FALSE


Ensembles d'études connexes

Ch 36 Management of Patients with Musculoskeletal Disorders

View Set

OSU Microbiology 4000: Lab Practical. Everything.

View Set

Cardiovascular Physiology Lab Questions

View Set

Connect Chapter 11: The International Monetary System

View Set

Jersey College Peds Exam 2/Final

View Set