CIS 321 Final Exam Questions

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

How many DNS root servers are there?

13

The UDP _____

-is unreliable and has checksum field

When a cloud client customer moves from one machine to another machine, ________.

-the same data files are avaliable -the same application software personalization is in effect

Convert decimal 8 to binary

10000

At What layer would you find frames ?

2

In the mask 255.255.255.0, how many 1s are there?

24

What is the maximum power for POE Plus in the standard?

25 watts

If your subnet part is 8 bits long, you can have ________ subnets.

254

At What layer would you find IP Addresses?

3

A 5-bit field can represent ________ alternatives or different combinations.

32

A mask has ____ bits

32

A mask has ________ bits.

32

The total length of an IPv4 address is ________ bits.

32

At What layer would you find packets?

4

Convert the binary number 100 to decimal.

4

Near-field communication has a maximum transmission distance of about ________.

4 cm/20 in

What type of copper wiring is widely used in Ethernet?

4-pair UTP

I wish to have a wireless LAN to serve my house. I will use ________.

802.11

What 802 Working Group creates Ethernet standards?

802.3

The most serious problem with wireless transmission in WLANs is ________.

Absorptive Attenuation

At which layer would you find standards for requesting videos from a video-sharing site such as YouTube?

Application

To transmit data very rapidly, you would want a ________ channel

broadband

A specific encryption method is called a ________.

cipher

In ________ file retrieval, your computer downloads a file from a server.

client/server

For human reading, IPv6 fields are separated by ________

colons

SNMPv1 uses ________ for authentication.

community names

The first step in the routing process involves ________.

comparing the packets destination IP address to all rows

When a firewall identifies an attack packet it _____

copies information about the packet into a log file

________ is the general name for proofs of identity in authentication.

credentials

At what layer do you find EUI-48 addresses?

data link

The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________.

destination host

When the source host transmits a packet, the packet is addressed to the ________.

destination host

Address Resolution Protocol is used to find the destination data link layer destination addresses of ________.

destination hosts and routers

Which of the following must be followed

standards

________ is the dominant firewall filtering method used on main border firewalls today.

stateful packet inspection

To use a leased line, the customer requires a(n) ________ at each site.

CSU/DSU

For their transmission medium, cable television companies primarily use ________.

Coaxial Cables

________ is a general naming system for the Internet

DNS

A TCP ________ segment is a request to close a connection.

FIN

Which of the following is used to define webpage bodies?

HTML

Which of the following is used to retrieve Web pages?

HTTP

Which has stronger security?

IPsec

60.49.7.254 is an ________.

IPv4 Address

Who are the most dangerous types of employees?

IT Security people

An EUI-48 address was formerly called a(n) ________ address

MAC

EUI-48 addresses were formerly called ________ addresses

MAC

The general name for evil software is ________

Malware

Which of the following is NOT a standards organization?

OSI

Which of the following provides end-to-end encryption?

PGP

Which of the following can be used within a firm?

Private and Public IP Addresses

The highest layer in SDN consists of ________.

SDN Applications

Which of the following is a processor-sharing application?

SETI@home

To use an access point, you need to know its ________.

SSID

Which is less expensive to implement?

SSL/TSL

Which type of service manages application software for users?

SaaS

The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.

Spyware

Malware programs that masquerade as system files are called ________.

Trojan Horses

E-mail bodies that have non-English text use ________.

UNICODE

Which of the following attach themselves to other programs?

Viruses

Antivirus software checks e-mail attachments for ________.

Viruses and Trojan Horses

Jitter is a problem for ________.

Voice over IP and Streaming Media

The Internet is a ________.

WAN

Who controls the internet?

no one

In tunnel mode, IPsec provides protection ________.

only between the IPsec servers

Mesh networking in 802.11 is likely to use _____

only wireless devices

For ADSL service, which of the following typically must be added to the telephone system?

a DSLAM

In distributed DoS attacks, the attacker sends messages directly to ________.

a command and control server

The ability to transmit in two directions simultaneously is ________.

a full-duplex communication

Which of the following is one of the three parts of an IPv4 address?

a subnet

".edu" is a ________.

a top level domain

What propagation problem is especially bad in moist air?

absorptive attenuation

In SNMP, the manager communicates directly with a(n) ________.

agent

Users are primarily concerned with the ________ layer.

application

The messages of VPNs ________.

are encrypted

Electronic signatures provide message-by-message ________.

authentication

Which of the following affects what throughput an individual user will receive?

being in a moving car and being far from cellsite

Transmission speed is normally measured in ________.

bits per second

In binary signaling there is (are) ________ state(s).

two

An SLA for speed should specify a ________.

minimum speed

The PSTN core is organized as a ________.

modified hierarchy

The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power.

BitTorrent

Which of the following was created for PANs?

Bluetooth

When a firewall identifies an attack packet, it ________.

discards the packet and copies information about the packet into a log file

________ is placing a message in the data field of another message.

encapsulation

Converting application messages into bits is called _______

encodining

Ethernet does ______

error detection

Firewall log files should be read ______

everyday

Which of the following is form of biometrics ?

facial recognition

Compared to normal routing, decision caching is ________.

faster

Compared to ADSL service, cable modem service typically is ________.

faster and more expensive

Which of the following is the easiest to understand?

firewall policies

Dividing an application message into a series of smaller message segments is called ________.

fragmentation

Skype offers ________

free calling among skype customers

A message always has a ________.

header

Which of the following tends to be more damaging to the victim?

identity theft

The SNMP manager stores the information it receives from Get commands ________.

in the MIB

BitTorrent's .torrent files are stored on the ________.

index server

If more users move to an access point, this decreases ________.

individual throughput

Standards tend to bring _____

interoperability

In VPNs designed to frustrate evil twin attacks, the shared secret ________.

is not transmitted

Which of the following is true about NAT?

it can enhance security and it presents problems for some protocols

Spread spectrum transmission is used in WLANs because ________.

it is required by regulators and is more reliable.

Why is Carrier Ethernet popular?

it uses familiar technology and it has attractive prices

Ethernet is inexpensive thanks to ________.

its hierarchical topology

When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________.

latency

At what layer(s) do you find single network standards?

layer 1 & 2

To defeat brute-force attacks, a password must be ________.

long and complex

SDN holds the promise of bringing ________

lower cost

Session keys are used to ______

make cryptanalysis more difficult

CSMA/CA+ACK usually is _____

mandatory

________ is a technique for preventing two wireless stations from transmitting at the same time and therefore interfering with each other.

media access control

An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________. (Select the most specific answer.)

phishing

Ethernet usually has a 100 meter distance limit for ________.

physical links

To determine if a host is reachable, you would send a(n) ________.

ping

RFC 822 and RFC 2822 standards govern ________.

plain text content of email messages

Which phase of the plan-protect-respond cycle takes the largest amount of work?

protect

A man in the middle attack ________.

reads traffic traveling between one host to another

The main promise of VoIP is to ________.

reduce cost

DoS attacks attempt to _____

reduce the availability of a computer

An unauthorized internal access point is a(n) ________ access point

rogue

The highest-level DNS servers are called ________.

root servers

What device connects different networks into an Internet?

router

Dynamic ________ protocols allow routers to transmit routing table information to one another.

routing

TCP Messages are called ________

segments

2.4 GHz and 5 GHz are ________.

service bands

Cells are used in cellular telephony to provide ________.

service for more customers

Physical layer standards govern ________.

signaling

SIP is a ________ protocol for VoIP.

signaling

Compared to network demand, network budgets are growing ________.

slower

Tricking users into doing something against their security interests is ________.

social engineering

Application message fragmentation is done on the ________.

source host

Unsolicited commercial e-mail is better known as ________.

spam

The main benefit of parallel transmission over serial transmission is ________.

speed

An internal router only connects different IP ________.

subnets

Typically, the most common way for an attacker to get extensive privileges on a computer is to ________.

take over an application program

Which of the following probably suffered the most financial damage from the Target breach?

target

Passive RFID chips are powered by ________.

the scanning unit

Throughput is ______

the speed a network actually provides to its users

How do WAN carriers typically get their trunk lines?

they lease them from telephone companies

Which of the following meets the definition of hacking ?

to intentionally use a computer resource without authorization

MIMO_____

transmits multiple signals in the same channel and increases throughput

WLANs normally use _____

unlicensed bands

IP is _____

unreliable

A lesson of XSS is that programmers should never trust ________

user input

DSL offeres ____

voice transmissions and data transmissions

Which is a problem with IPv4 addresses?

we have ran out of them

SSL/TSL used for _____

web applications

A policy specifies _____

what should be done

An SLA should specify the ________.

worst case

Vulnerability-based attacks that occur before a patch is available are called ________ attacks.

zero-day


Ensembles d'études connexes

connie mental health test 3, mental health exam 1

View Set

Financial Accounting Exam 1 Questions

View Set

The Executive Branch AND Presidential Power

View Set

MUS100: Chapter 46, Chapter 46. Poetry in Motion: Tchaikovsky and the Ballet, ch 45 quiz (3), Music Test 2

View Set

NS3 Naval Knowledge Superbowl Supplementary

View Set