Data Comm Midterm - Quizzes

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Network standards A. decrease equipment prices B. prevent growth of new features C. both D. none

A

SSL/TLS is used for A. Web applications B. Almost all applications C. A and B D. None

A

The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server

A

The supplicant claims to be A. the true party B. An imposter C. A or B D. None

A

Throughput is A. Speed a network actually provides to users B. Network's rated speed C. both D. none

A

____ is the percentage of time that a network is available for use A. availability B. Downtime C. QoS D. None

A

4-pair UTP terminates in a(n) ________ connector. A. USB B. RJ-45 C. SC D. Standard telephone

B

At what layer will you find standards for routers A. transport B. internet C. both D. none

B

Which type of firewall is more expensive per packet handled A. SPI B. NGFW C. Both D. neither

B

Fiber that has a core diameter of 8.3 microns is ________ A. multimode B. single-mode C. full duplex D. exceptionally fast

B (multimode --> WAN --> km) (single-mode --> LAN --> m)

"inter" in Internet means

Between

Antivirus programs are designed to detect A. viruses B. worms C. A and B D. neither

C

Compared to NGFWs, IDSs ________. A) look for different threats B) look for the same threats C) look for the same threats but do so differently D) none of the above

C

To determine if a host is reachable, you send a(n) ________ A. SNMP SET command B. MIB C. trap D. Ping

D

Transmission speed is normally measured in

bits per second

You accidentally discover that you can get into another email account after you have logged in under uour account and only spend a few minutes looking at another user's email. is this hacking?

yes

A firewall will drop a packet if it ________. A) is a definite attack packet B) is a probable attack packet C) Both A and B D) Neither A nor B

A

A local area network operates A. On a customer premises B. Between customer premises C. A and B D. None

A

At what layer is the 100BASE-TX standard? A) physical B) data link C) Internet D) physical and data link

A

Control is done on individual switches and routers in ________. A) traditional operation B) SDN C) both A and B D) neither A nor B

A

Electronic signatures provide message-by-message ____ A. authentication B. Confidentiality C. A and B D. None

A

Ethernet Messages are A. Frames B. Packets C. Segments D. None

A

Ethernet addresses were formally called A. MAC addresses B. EUI-48 Addresses C. A and B D. None

A

Ethernet became the dominant LAN technology because of ________ A. low cost B. high speed C. link reliability D. agility

A

Ethernet forwarding devices are ________. A. Switches B. Routers C. A and B D. None

A

If the destination internet process detects an error, it A. discards the packet B. sends back a segment notifying the sender C. both D. none

A

If two hosts are connected by 5 networks, how many packets will there be when one host sends a packet to the other A. 1 B. 2 C. 5 D. 7

A

In a four-step close, which side transmits a FIN segment A. Side that initiates the close B. side that does not initiate the close

A

In an HTTP, which one (browser or Webserver application program) transmits the message first? A. browser B. webserver

A

In authentication, ____ are the general name for proofs of identity A. credentials B. authorizations C. digital certificates D. All

A

In digital certificate authentication, the supplicant encrypts the challenge message with A. the supplicants private key B the verifiers private key C. the true party's private key D. none

A

In large Ethernet networks, there can be ________ possible data links between two hosts A. 1 B. 2 C. 3 D. many

A

In optical fiber, light travels through the A. core B. cladding C. both A and B

A

Internet standards are published as A. RFCs B. IETFs C. TCP/IPs D. internet protocols

A

NGFWs ________. A) can implement different rules for different applications B) can detect threats that span multiple packets C) both A and B D) neither A nor B

A

To manage their Ethernet networks, companies rely on ________ A. SNMP B. HTTP C. FTTH D. None

A

To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use ________ A. 802.1X B. SNMP C. VLANs D. 802.1AE

A

Trunk links connect switches to ________ switches. A) core B) workgroup C) both A and B D) neither A nor B

A

Users typically can eliminate a vulnerability in one of their programs by ________ A. Installing a patch B. Using an anti-virus program C. A and B D. None

A

When you use your tablet to access the Internet, the tablet is a A. client host B. server host C. both D. none

A

Which light wavelength dominates LANs A. 850 nm B. 1310 nm C. 1550 nm D. 1 Gbps

A

Which of the following attach themselves to other programs A. viruses B. worms C. A and B D. None

A

Which of the following is a connectionless protocol A. IP B. TCP C. both D. none

A

____ is a program that can capture passwords as you enter them A. Keystroke logger B. Data mining software C. A and B D. None

A

________ links connect users to workgroup switches. A. Trunk B. Long C. Access D. Workgroup

A

If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use? A. 4-pair UTP B. Multimode fiber C. single-mode fiber D. None

A (Always pick cheapest option)

Which core diameter is used in multimode fiber. A) 50 microns B) 8 microns C) 50 mm D) 8 mm

A (B is single mode)

At what layer will you find standards for switches A. application B. data link C. transport D. Internet

B

DoS attacks attempt to A. hack a computer B. reduce the availability of a computer C. steal info from a computer D. delete files on a computer

B

Ethernet has reliability issues because of its ________ A. too-simple switch operation B. hierarchical organization C. A and B D. Neither

B

ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B

B

In SDN, applications A. increase network management labor B. are required to make SDN work effectively C. A and B D. None

B

In a 4-pair UTP, what is twisted A. Individual wires B. Pairs of wires C. All eight wires D. none

B

In a DDoS attack, a ____ sends messages directly to the victim A. botmaster B. bot C. command and control server D. all

B

In binary signaling, there is/are ____ states A. one B. two C. Between 3 and 10 D. All of the above

B

The IETF primarily ________. A. Manages the internet B. creates internet standards C. coordinates the work of ISPs D. all

B

The distance between two corresponding points in adjacent cycles is the A. frequency B. wavelength C. bandwidth D. span

B

The path a message takes from the source to the destination device in an Ethernet network is a A. Physical link B. Data link C. Route D. Label-switched route

B

The range of port 1024 to port 4999 is the usual range for ________ port numbers. A. well-known B. ephemeral C. both D. none

B

To handle momentary traffic peaks, which would you give higher priority to? A. e-mail B. VoIP C. A and B D. none

B

Trunk lines in the Internet core are A. dedicated B. multiplexed C. Both D. None

B

What is the quality designator for multimode optical fiber? A. Cat B. OM C. both D. none

B

What type of copper wiring is widely used in Ethernet A. Optical fiber B. 4-pair UTP C. A and B D. None

B

Which layer governs wires A. Transport B. physical C. internet D. None

B

Which of the following sometimes uses direct propagation between computers A. Viruses B. Worms C. Trojan horses D. downloaders

B

Which of the following tells you the cumulative round-trip latency to each router along the route to the host A. ping B. traceroute C. both D. none

B

Which standards agency is especially important for transport processes A. ISo and ITU-T B. IETF C. Both A and B are equally important D. Neither

B

____ Are full programs A. viruses B. worms C. A and B D. None

B

Iris scanning is attractive because of its ________. A) low cost B) precision C) Both A and B D) Neither A nor B

B (Not at all cheap)

Advanced persistent threats are ___ A. inexpensive for the attacker B. extremely dangerous for the victim C. A and B D. None

B (Not inexpensive in the least)

An SLA specifies ________. A. best case B. worst case C. both D. none

B (would never wanna hear best case)

____ fiber is being sold today A. OM2 B. OM4 C. both D. none

B (OM2 not a thing --> OM3 and OM4)

ISPs A. carry traffic to internet B. connect users to internet C. both D. non

C

If two hosts are connected by five networks, how many frames will there be when one host sends a packet to the other host? A. 1 B. 2 C. 5 D. 6

C

In Ethernet, switches are organized in a ________ A. ring B. mesh C. hierarchy D. any

C

In a ___ attack, the attacker encrypts the victim's hard drive A. Virus B. DoS C. Ransom D. Lock

C

In digital certificate authentication, the verifier decrypts the challenge message with A. the supplicants private key B. the true party's private key C. the true party's public key D. the supplicants public key

C

Jitter is a problem for ________. A) voice over IP (VoIP) B) streaming media C) both A and B D) neither A nor B

C

Marai bots in the KrebsOnSecurity.com attack were A. Client hosts B. server hosts C. IoT devices D. neither

C

Most servers are A. Mainframes B. Windows PCs C. rack servers D. routers

C

Physical layer standards govern A. Signaling B. Physical connectors C. A and B D. None

C

QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above

C

TCP messages are called A. frames B. packets C. segments D. fragments

C

The KrebsOnSecurity.com attack ________. A) was a denial of service attack. B) used IoT devices to attack the site C) both A and B D) neither A nor B

C

The damage of momentary traffic peaks can be addressed by ________. A) using priority B) adding more capacity C) both A and B D) neither A nor B

C

The longest transmission distances are possible with ________ A. USB B. UTP C. Single-mode fiber D. Multimode fiber

C

The two tag frames provide information about ________ A. transmission media B. length of Jumbo packets C. priority D. all

C

Using RSTP to provide backup links in Ethernet ________ A. automatic B. is simple C. is challenging D. is impossible

C

What 802 Working Group creates Ethernet standards?A. 802.1 B. 802.2 C. 802.3 D. 802.11

C

When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________. A) drops the packet B) drops the packet and notifies an administrator C) passes the packet D) passes the packet, but notifies an administrator

C

When a user attempts to plug into an Ethernet switch protected by 802.1X_____ A. Switch will freeze B. User port will freeze C. user will be required to authenticate themselves D. None

C

Which layer governs transmission through a single network A. data link B. physical C. both D. none

C

Which of the following provides security in Ethernet A. RSTP B. SNMP C. VLANs D. all

C

_____ is the dominant firewall filtering method used on main border firewalls today A. ACL filtering B. Application content filtering C. Stateful packet inspection D. NGFW

C

________ can be addressed by using priority A. chronic lacks of capacity B. Momentary traffic peaks C. A and B D. None

C

From which standards architectures do organizations typically take their standards? A) OSI B) TCP/IP C) both A and B D) neither A nor B

C (A - layers 1 and 2) (b - layers 3 and 4)

SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B

C (SDN - Software defined networks)

Guarantees for quality of service are called A. QoS-G B. Qos metrics C. SLAs D. Qos guarantees

C (Service level agreements)

A sending host will retransmit a TCP segment if it ________. A) receives an ACK segment B) receives an NAC segment C) receives an RPT segment D) none of the above

D

ARP cache poisoning is A. A DoS attack B A DDoS attack C. an illegal login attack D. man in the middle attack

D

After an ARP cache poisoning attack, the ARP cache gives the ________ A. IP address of the router the user wishes to send to B. EUI-48 address of the router the user wishes to send to C. Ip address of the router of the MITM attacker D. EUI-48 address of the router of the MITM attacker

D

Depicting the Internet as a cloud symbolizes ________. A) the Internet is amorphous B) the Internet today is too complex to be understandable by humans C) the Internet is too complex for anyone to depict D) users do not have to know how the Internet operates

D

Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack. A. hacking B. virus C. malware D. DoS

D

For analysis, network administrators usually interact primarily with ________. A. agents B. MIB C. network management program D. network visualization program

D

If a destination host receives a TCP segment with an error, it will transmit A. an ACK B. an NAC C. a RSND D. nothing

D

If a host cannot reach a DNS server, it ________. A) cannot have a host name B) will have to rely on host names C) will need to use a DHCP server D) is unlikely to be able to communicate with most server hosts

D

Malware programs that masquerade as system files are called ________ A. Viruses B. scripts C. root malware D. trojan horses

D

Optical fiber cords use two strands ________ A. for reliability through redundancy B. to form a complete electrical loop C. to double transmission speed D. for full-duplex (2 way) transmission

D

The Target attackers probably first broke into Target using the credentials of a(n) ________ A. Low-Level target employee B. Target IT employee C. Target security employee D. Employee in a firm outside Target

D

To prevent an unauthorized user from sending supervisory commands to switches, companies use ________ A. 802.1X B. SNMP C. VLANs D. 802.1AE

D

To span distance between two switches, why is adding an intermediate switch not an attractive choice? A. latency B. errors C. speed restrictions D. expense

D

What type of switch connects switches to other switches A. Trunk switches B. Core switches C. Workgroup switches D. None

D

What type of switch connects users to the network A. User switches B. Core switches C. Access switches D. Workgroup Switches

D

Which of the following is constantly leading to new applications A. Increasing speed B. increasing reliability C. increasing availability D. all

D

Which standards layer governs the WWW A. data link B. transport C. Internet D. none

D

which of the following is a host when connected to a network A. client PC B. server C. mobile phone D. All

D

T/F All ethernet switches are manageable

F

T/F Server program is always a webserver program

F

T/F The switch knows the type of device it is forwarding a frame to

F (doesn't care)

T/F A switch knows the entire data link between the source and destination hosts

F (knows only next host/switch/router)

Which of the following protocols is reliable

Just TCP

The general term for evil software is

Malware

You click on a link expecting to go to a legitimate website but are directed to a website that contains information you are not authorized to see. You exit without looking around. is that hacking?

No

Who owns the internet

No one

A packet sent from one host to another over the Internet will ALWAYS pass through ________. x ISPs

None (no predetermined number)

Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment.

SYN/ACK

not making all protocols reliable

Saves money

In QoS, S stands for

Service

Hacking is defined as using a computer resource without authorization or in excess of authorization.

T

T/F If you change a standard at one layer you are not required to change standards at other layers

T

Biometrics, and other new authentication methods, are being created with the goal of getting rid of reusable passwords

True

Debit card is secure because it requires two credentials for authentication. This is also called ________.

Two factor authentication

If you add one bit to an alternatives field, you can have ________. x more options

twice as many options


Ensembles d'études connexes

Chapter 2 - The Project Management and Information Technology Context

View Set

Bio- Chapter 1-8 (emphasis on 8)

View Set

Chapter 2- The Resolution of Private Disputes

View Set

Microbiology: Quiz 2 (Practice for Exam 1)

View Set

21 CFR 312 Investigational New Drug Regulations

View Set

FL 214 Principles of Life Insurance (units 7-17)

View Set

Ethics True False - Textbook Chapters

View Set

Porth's PrepU PathoPhysiology assignment 2

View Set