Data Communications Final

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

____ is a packet-switched network that was designed for transmitting data over fixed lines.

NOT ATM

The protocol that resides at the ____ layer in the TCP/IP protocol suite is called Internet Protocol (IP).

NOT network NOT network access

The ____ is a regulation defined and enforced by credit card companies themselves, not by any government agency.

PCI DSS

____ replaces any repetitions of the same bit or byte that occur in a sequence of data with a single occurrence of the bit/byte and a run count, or simply with a run count.

Run-length encoding

A(n) ____ solution can evaluate the remote LAN's traffic as it makes decisions about which traffic should be transmitted on which WAN connection.

SD-branch

To provide secure remote login, one of the common services the Internet offers is ____.

SSH

The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection.

Sequence Number

____ is an important concept in accounting.

SoD

____ is implemented as a leased telephone line (or group of lines) that maintains a constant, all-digital data connection between two locations and can transfer either voice or data at speeds up to 1.544 Mbps.

T-1 Line

____ is a terminal emulation program for TCP/IP networks, such as the Internet, that allows users to log in to a remote computer.

Telnet

RIP has a ____ hops limit, unlike OSPF.

15

The number of hosts bits of a class C IPv4 address is ____ bits.

8

____ spread spectrum transmission bounces the signal around on seemingly random frequencies rather than transmit it on one fixed frequency.

Frequency hopping

____ satellites are found exactly 22,236 miles (35,786 kilometers) from the Earth and are always positioned over the same longitude at a point near the Earth's equator.

GEO

____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video).

H.323

____ is an encrypted form of HTTP.

HTTPS

Unlike OSPF, ____ can adapt to IPv6.

IS-IS

____ is a client/server protocol in which e-mail is received and held for you at your Internet server.

Internet Message Access Protocol (IMAP)

____ is the underlying technology behind applications such as GIF, PKZIP, WinZip, gzip, UNIX's compress utility, and Microsoft's compressed folders.

LZ77

In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____.

MILNET

In the context of multiplexing, ____ is sometimes used to send the same signal across multiple antennas.

MIMO

______ is a technique that is very commonly used to compress video images.

MPEG

The IPv4 ____ field enables the network to discard a datagram that has been traveling the Internet for too long.

Time to Live

A cable modem is a physical device that separates the computer data from the cable television video signal.

True

A digital signature is a security procedure that uses public-key cryptography.

True

A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.

True

Alarms and video captures are possible responses triggered by motion detection devices.

True

An IP packet is the combination of the IP header and its payload.

True

An asymmetric service is useful for an Internet connection in which the bulk of the traffic comes down from the Internet to the workstation.

True

Because there are so many devices in a WAN, and they are spread over large distances, using a LAN-type connection is not feasible.

True

CDM technology falls into two categories: frequency hopping and direct sequence.

True

Code division multiplexing is based upon a class of modulation techniques known as spread spectrum technology.

True

Every device connected to the Internet is assigned an IP address.

True

Every object on the Internet has a unique English-based address called its Uniform Resource Locator (URL).

True

GEO satellites are also known as high Earth orbit satellites.

True

LANs often are represented to the Internet as a single IP address by using NAT.

True

Most cable modems connect to a private network through a common Ethernet NIC.

True

RTP (Real-Time Protocol) is a public-domain network protocol that servers use to deliver streaming media.

True

Some attacks attempt to take advantage of bugs, loopholes, backdoors, or other software weaknesses.

True

Telephone systems were originally designed to transmit the human voice.

True

The Time to Live field indicates how long a particular datagram is allowed to live.

True

The basic way to perform compression is to look for some common pattern in the data and replace each data pattern with a symbol or symbols that will consume less space during transmission or storage.

True

The physical protection of a computer system or a computer network consists of protecting the equipment from physical damage.

True

The two leading attack methods for the last few years have been socially engineered attacks and exploiting known vulnerabilities in operating systems and in application software.

True

Unlike its counterpart IP, TCP uses port addresses to identify source and destination.

True

Using a distance-vector protocol, a router monitors each link and the number of hops from that link to network destinations.

True

WANs can cover large geographic distances, including the entire Earth.

True

When the user wants to send an e-mail message, the e-mail program takes the e-mail message and passes it to the transport layer of the software.

True

​The first routing algorithm used within the Internet was called a distance vector routing algorithm.

True

A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet.

Uniform Resource Locator (URL)

____ is a very fast format (up to 100 Mbps downstream and upstream) over very short distances (less than 300 meters).

VDSL

____ is an effective tool to increase privacy and security when using an insecure Wi-Fi network, such as when using an open Wi-Fi connection at a café or coffee shop.

VPN

____ is an advanced router (gateway) placed at each end of the tunnel to provide the necessary VPN security software.

VPN headend

The ____ field of an IP datagram contains the version number of IP being used, just in case a new version becomes available.

Version

The practice of making telephone calls over the Internet has had several different names, including packet voice, voice over packet, voice over the Internet, Internet telephony, and ____.

VoIP

____ uses different wavelength (frequency) lasers to transmit multiple signals at the same time over a single medium.

Wave division multiplexing

The first security protocol for wireless LANs was ____.

Wired Equivalency Protocol (WEP)

Many certificates conform to the ____ standard.

X.509

A(n) ____ connection has a faster downstream transmission speed than its upstream speed.

asymmetric

The ____ is the main telecommunications line through the network, connecting the major router sites across the country.

backbone

Each region covered by cellular service is broken down into adjacent ____.

cells

Many ____ conform to the X.509 standard created and supported by the ITU-T.

certificates

The device that is attached to the receiving end of the medium and splits off each signal to deliver it to the appropriate receiver is called the second multiplexor, or ____.​

demultiplexor

MPEG-1 and MPEG-2—or simply MPEG—are common examples of ____ compression.​

differential encoding

When routing tables adapt to network changes, the routing system is called ____.

dynamic

A(n) ____ is the computer program that converts plaintext into an enciphered form.

encryption algorithm

A technique that can be used to compress data when a ____ compression is necessary is the Lempel-Ziv technique.

lossless

Many people consider keylogger to be a kind of ____.

malware

A network that is connected in a ____ is one in which neighbors are connected only to neighbors.

mesh

A wide area network connects its workstations through the use of a ____ design and requires routing to transfer data across the network.

mesh

A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters according to an alphabetic string.

monoalphabetic

In ____, a web user seeking to visit a particular company's website is unknowingly redirected to a bogus website that looks exactly like that company's official website.

pharming

The concept of two keys, public and private, is called ____ cryptography.

public key

Under normal circumstances, the synchronous time division multiplexor maintains a simple ____ sampling order of the input devices.​

round-robin

With 1 to 2 Mbps for the downlink and 300 Kbs for uplink, ____ Internet works well when low-speed, asymmetrical service is sufficient for the customer's purposes.

satellite

Since time division multiplexing was introduced, it has split into two roughly parallel but separate technologies: synchronous time division multiplexing and ____ time division multiplexing.​

statistical

In the https://www.cengage.com/student URL what is the detailed path?

student

A(n) ____ connection is one in which the transfer speeds to download and upload are equal.

symmetric

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.

transposition-based

The standard called ____ was created by the MEF to allow the use of Ethernet for WANs.

Carrier Ethernet

Cable television is still one of the more commonly found applications of ____ multiplex technique.

FDM

​____ takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network.

Address Resolution Protocol (ARP)

During the late 1960s, a branch of the U.S. government titled the ____ created one of the country's first wide area packet-switched networks.

Advanced Research Projects Agency (ARPA)

A DOCSIS 3.1 modem might be capable of supporting speeds nearing 100 Gbps.

False

When used by 3G phone networks, the code division multiplexing is called ____.

CDMA

A(n) ____ is a list of certificates that have been revoked before their originally scheduled expiration date.

CRL

____ provides high-speed connections to the Internet profiting from television distribution infrastructure.

Cable modem

A firewall cannot limit users on the Internet from accessing certain portions of a corporate network.

False

AES encryption technique is less powerful than the triple-DES.

False

All system attacks need a user to open an e-mail or Web page.

False

Cable modem connections are typically symmetric.

False

Currently, almost all networks involved in the Internet use IP version 6.

False

MANs cannot be used to support high-speed disaster recovery systems and real-time transaction backup systems.

False

Most firewalls function primarily by monitoring the TCP or UDP ports of traffic crossing the firewall.

False

Routing Information Protocol is a link-state protocol.

False

The proximity of the fiber cable termination to its point of use does not impact the cost of fiber Internet.

False

Typically, FTTC represents a nearby fiber Internet service junction that serves a few hundred customers.

False

WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).

False

​The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site.

File Transfer Protocol (FTP)

____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values.

Direct Sequence


Ensembles d'études connexes

Sociology 1304, Chapters 9, 10, 12

View Set

Chapter 11 Questions - Muscle Tissue

View Set

Chapter 30: Management of Patients with Hematologic Neoplasms

View Set

Digestive system disorder, chapter 11

View Set

Tissue Organization (Quiz #3) A and P

View Set