Data Communications Final
____ is a packet-switched network that was designed for transmitting data over fixed lines.
NOT ATM
The protocol that resides at the ____ layer in the TCP/IP protocol suite is called Internet Protocol (IP).
NOT network NOT network access
The ____ is a regulation defined and enforced by credit card companies themselves, not by any government agency.
PCI DSS
____ replaces any repetitions of the same bit or byte that occur in a sequence of data with a single occurrence of the bit/byte and a run count, or simply with a run count.
Run-length encoding
A(n) ____ solution can evaluate the remote LAN's traffic as it makes decisions about which traffic should be transmitted on which WAN connection.
SD-branch
To provide secure remote login, one of the common services the Internet offers is ____.
SSH
The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection.
Sequence Number
____ is an important concept in accounting.
SoD
____ is implemented as a leased telephone line (or group of lines) that maintains a constant, all-digital data connection between two locations and can transfer either voice or data at speeds up to 1.544 Mbps.
T-1 Line
____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer.
Telnet
RIP has a ____ hops limit, unlike OSPF.
15
The number of hosts bits of a class C IPv4 address is ____ bits.
8
____ spread spectrum transmission bounces the signal around on seemingly random frequencies rather than transmit it on one fixed frequency.
Frequency hopping
____ satellites are found exactly 22,236 miles (35,786 kilometers) from the Earth and are always positioned over the same longitude at a point near the Earth's equator.
GEO
____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video).
H.323
____ is an encrypted form of HTTP.
HTTPS
Unlike OSPF, ____ can adapt to IPv6.
IS-IS
____ is a client/server protocol in which e-mail is received and held for you at your Internet server.
Internet Message Access Protocol (IMAP)
____ is the underlying technology behind applications such as GIF, PKZIP, WinZip, gzip, UNIX's compress utility, and Microsoft's compressed folders.
LZ77
In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____.
MILNET
In the context of multiplexing, ____ is sometimes used to send the same signal across multiple antennas.
MIMO
______ is a technique that is very commonly used to compress video images.
MPEG
The IPv4 ____ field enables the network to discard a datagram that has been traveling the Internet for too long.
Time to Live
A cable modem is a physical device that separates the computer data from the cable television video signal.
True
A digital signature is a security procedure that uses public-key cryptography.
True
A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.
True
Alarms and video captures are possible responses triggered by motion detection devices.
True
An IP packet is the combination of the IP header and its payload.
True
An asymmetric service is useful for an Internet connection in which the bulk of the traffic comes down from the Internet to the workstation.
True
Because there are so many devices in a WAN, and they are spread over large distances, using a LAN-type connection is not feasible.
True
CDM technology falls into two categories: frequency hopping and direct sequence.
True
Code division multiplexing is based upon a class of modulation techniques known as spread spectrum technology.
True
Every device connected to the Internet is assigned an IP address.
True
Every object on the Internet has a unique English-based address called its Uniform Resource Locator (URL).
True
GEO satellites are also known as high Earth orbit satellites.
True
LANs often are represented to the Internet as a single IP address by using NAT.
True
Most cable modems connect to a private network through a common Ethernet NIC.
True
RTP (Real-Time Protocol) is a public-domain network protocol that servers use to deliver streaming media.
True
Some attacks attempt to take advantage of bugs, loopholes, backdoors, or other software weaknesses.
True
Telephone systems were originally designed to transmit the human voice.
True
The Time to Live field indicates how long a particular datagram is allowed to live.
True
The basic way to perform compression is to look for some common pattern in the data and replace each data pattern with a symbol or symbols that will consume less space during transmission or storage.
True
The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.
True
The two leading attack methods for the last few years have been socially engineered attacks and exploiting known vulnerabilities in operating systems and in application software.
True
Unlike its counterpart IP, TCP uses port addresses to identify source and destination.
True
Using a distance-vector protocol, a router monitors each link and the number of hops from that link to network destinations.
True
WANs can cover large geographic distances, including the entire Earth.
True
When the user wants to send an e-mail message, the e-mail program takes the e-mail message and passes it to the transport layer of the software.
True
The first routing algorithm used within the Internet was called a distance vector routing algorithm.
True
A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet.
Uniform Resource Locator (URL)
____ is a very fast format (up to 100 Mbps downstream and upstream) over very short distances (less than 300 meters).
VDSL
____ is an effective tool to increase privacy and security when using an insecure Wi-Fi network, such as when using an open Wi-Fi connection at a café or coffee shop.
VPN
____ is an advanced router (gateway) placed at each end of the tunnel to provide the necessary VPN security software.
VPN headend
The ____ field of an IP datagram contains the version number of IP being used, just in case a new version becomes available.
Version
The practice of making telephone calls over the Internet has had several different names, including packet voice, voice over packet, voice over the Internet, Internet telephony, and ____.
VoIP
____ uses different wavelength (frequency) lasers to transmit multiple signals at the same time over a single medium.
Wave division multiplexing
The first security protocol for wireless LANs was ____.
Wired Equivalency Protocol (WEP)
Many certificates conform to the ____ standard.
X.509
A(n) ____ connection has a faster downstream transmission speed than its upstream speed.
asymmetric
The ____ is the main telecommunications line through the network, connecting the major router sites across the country.
backbone
Each region covered by cellular service is broken down into adjacent ____.
cells
Many ____ conform to the X.509 standard created and supported by the ITU-T.
certificates
The device that is attached to the receiving end of the medium and splits off each signal to deliver it to the appropriate receiver is called the second multiplexor, or ____.
demultiplexor
MPEG-1 and MPEG-2—or simply MPEG—are common examples of ____ compression.
differential encoding
When routing tables adapt to network changes, the routing system is called ____.
dynamic
A(n) ____ is the computer program that converts plaintext into an enciphered form.
encryption algorithm
A technique that can be used to compress data when a ____ compression is necessary is the Lempel-Ziv technique.
lossless
Many people consider keylogger to be a kind of ____.
malware
A network that is connected in a ____ is one in which neighbors are connected only to neighbors.
mesh
A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network.
mesh
A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters according to an alphabetic string.
monoalphabetic
In ____, a web user seeking to visit a particular company's website is unknowingly redirected to a bogus website that looks exactly like that company's official website.
pharming
The concept of two keys, public and private, is called ____ cryptography.
public key
Under normal circumstances, the synchronous time division multiplexor maintains a simple ____ sampling order of the input devices.
round-robin
With 1 to 2 Mbps for the downlink and 300 Kbs for uplink, ____ Internet works well when low-speed, asymmetrical service is sufficient for the customer's purposes.
satellite
Since time division multiplexing was introduced, it has split into two roughly parallel but separate technologies: synchronous time division multiplexing and ____ time division multiplexing.
statistical
In the https://www.cengage.com/student URL what is the detailed path?
student
A(n) ____ connection is one in which the transfer speeds to download and upload are equal.
symmetric
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.
transposition-based
The standard called ____ was created by the MEF to allow the use of Ethernet for WANs.
Carrier Ethernet
Cable television is still one of the more commonly found applications of ____ multiplex technique.
FDM
____ takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network.
Address Resolution Protocol (ARP)
During the late 1960s, a branch of the U.S. government titled the ____ created one of the country's first wide area packet-switched networks.
Advanced Research Projects Agency (ARPA)
A DOCSIS 3.1 modem might be capable of supporting speeds nearing 100 Gbps.
False
When used by 3G phone networks, the code division multiplexing is called ____.
CDMA
A(n) ____ is a list of certificates that have been revoked before their originally scheduled expiration date.
CRL
____ provides high-speed connections to the Internet profiting from television distribution infrastructure.
Cable modem
A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.
False
AES encryption technique is less powerful than the triple-DES.
False
All system attacks need a user to open an e-mail or Web page.
False
Cable modem connections are typically symmetric.
False
Currently, almost all networks involved in the Internet use IP version 6.
False
MANs cannot be used to support high-speed disaster recovery systems and real-time transaction backup systems.
False
Most firewalls function primarily by monitoring the TCP or UDP ports of traffic crossing the firewall.
False
Routing Information Protocol is a link-state protocol.
False
The proximity of the fiber cable termination to its point of use does not impact the cost of fiber Internet.
False
Typically, FTTC represents a nearby fiber Internet service junction that serves a few hundred customers.
False
WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).
False
The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site.
File Transfer Protocol (FTP)
____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.
Direct Sequence
