IS302 Exam 2 Ch 6-10
Why is low speed and short distance good in the Internet of Things?
"Slow and close" communication extends battery life.
What three operational security threats must PSK users consider?
(1) Change the pre-shared key when a person leaves a company (2) Create a guest account to provide temporary access to outsiders as appropriate. (3) Create a strong pass-phrase
Distinguish between evil twin access points and rogue access points.
(1) Evil twin access points are typically laptops with software to impersonate a real access point. (2) A rogue access point is an unauthorized access point set up within a firm which typically has poor or no security
Compare the relative benefits of the two types of Classic Bluetooth.
(1) Extended Data Rate (EDR) @ 3Mbps provides good performance at modest power (2) High Speed (HS) @ 24Mbps provides brief high-speed transfers at modest power ( good form occasional file transfers )
Distinguish between link security and end-to-end security.
(1) Link security on the link between the wireless client and the wireless access point. (2) End-to-end security all the way between the wireless client and the server on the wired LAN (or a server on the Internet).
How does near field communication differ from normal radio communication?
(1) Radio communication - transmits out by producing electromagnetic waves that propagate away ( and do not come back ) (2) Near Field Communication - pulses waves outward a very short distance, then they are reabsorbed back into the antenna ( Waves Surges Out and then Back - in radio they do not surge back )
How are VPNs able to defeat evil twin attacks? Explain in detail.
(1) the client and server encrypt all communications within a pre-shared VPN key that is never transmitted ( it is pre-shared). (2) When the client transmits it first encrypts its message with the VPN key. (3) The evil twin intercepts the message, but since it never gets the the pre-shared VPN key, it cannot decrypt the message, so it cannot read it.
high speed bluetooth
-2 to 3 Mbps -capable to switch on the high speed connection for downloading any webpage etc. -second ratio in high speed bluetooth has a speed of about 24 Mbps -uses radio transmission technology to cover greater distance -runs on one-to-one mode, cannot use access points
What use was 802.11i PSK (pre-shared key) mode created for?
-home use -business use (single access point)
What devices know the unshared session key?
-host machine -access point
Advantages of Carrier Ethernet
-low cost-familiarity of the technology-high speeds-speed agility
Why is WPS desirable?
-simplifies the configuration of wireless clients in making the connection easier with access points -user has to only know the pin,8 digits long -WPS is a default turned on at access points
Classic bluetooth
-speeds up to 2 or 3 Mbps -satisfactory speed for wireless mice and other devices -satisfactory speed for voice communication -covers distance of about 10 meters -batteries run a long time
How does centralized management provide for the detection of rogue access points?
1) By sending SNMP traps when it detects the signal of a nearby unauthorized access point. (2) By asking an access point for the EUI-48 addresses of nearby access points. It can see one if these is not authorized.
Describe the process by which access point locations are determined.
1) Determine how far signals should travel to find the radius of service around each access point. (2) Use architecture drawings to lay out 10 meter circles that cover all points in the building. (3) Make adjustments for thick walls, filing cabinets, or other obstructions
What cryptographic protections do 802.11i provide?
1. initial authentication 2. message-by-message confidentiality/integrity/authentication
1 Watt represents a dBm value of about ________.
30
A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels.
9
A router will discard a packet if the TTL value reaches ________. A) 0 B) 1 C) 128 D) 256
A) 0
If there is an access point that serves eight wireless hosts, on how many channels will these devices transmit and receive during the course of an hour or two? A) 1 B) 2 C) 8 D) 9
A) 1
In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches? A) 1 B) 47 C) 30,451 D) The default row.
A) 1
If the sending host does not do MTU discovery, the largest packet it can send is ________. A) 1,280 octets B) 65,536 octets C) 65,536 octets minus the 40 octets of the main headers D) None of the above. The sending host must do MTU discovery.
A) 1,280 octets
Many "T1" lines that carriers provide today use ________ in the local loop. A) 1-pair voice-grade UTP B) 2-pair voice-grade UTP C) 1-pair data-grade UTP D) 2-pair data-grade UTP
A) 1-pair voice-grade UTP
There is an access point that serves eight wireless hosts. On how many channels will these devices transmit during the course of an hour or two? A) 1. B) 2 (one in each direction). C) 7. D) 8. E) 9.
A) 1.
Which of the following is in Frame Relay's speed range? A) 10 Mps. B) 100 Mbps. C) Both A and B D) Neither A nor B
A) 10 Mps.
Which of the following is a private IP address range? A) 10.x.x.x. B) 128.171.x.x. C) Both A and B D) Neither A nor B
A) 10.x.x.x.
If you have a subnet part of 7 bits, how many subnets can you have? A) 126 B) 254 C) 510 D) none of the above
A) 126
Which of the following is a fractional T1 line speed? A) 128 kbps. B) 1 Mbps. C) Both A and B D) Neither A nor B
A) 128 kbps.
In the mask /14, how many 1s are there? A) 14 B) 16 C) 24 D) None of the above
A) 14
Which unlicensed band is defined the same way in most countries around the world? A) 2.4 GHz. B) 5 GHz. C) Both A and B D) None of the above.
A) 2.4 GHz.
Which unlicensed band provides greater propagation distance for a given level of power? A) 2.4 GHz. B) 5 GHz. C) Both A and B allow about the same propagation distance.
A) 2.4 GHz.
T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps
A) 250 kbps
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /14 and the reliability metric 10. Which row will the router choose if both are matches? A) 2707. B) 4400. C) Either A or B D) The router will choose the default row.
A) 2707
Row 2707 has the mask /16 and the speed metric 20. Row 4400 has the mask /16 and the speed metric 10. Which row will the router choose if both are matches? A) 2707. B) 4400. C) Either A or B D) The router will choose the default row.
A) 2707
The network part of an IP address is ________ bits long. A) 8 B) 16 C) 32 D) We cannot say.
A) 8
I wish to have a wireless LAN to serve my house. I will use ________. A) 802.11 B) Bluetooth C) either A or B
A) 802.11
Which of the following can use access points? A) 802.11 B) Bluetooth C) both A and B D) neither A nor B
A) 802.11
Which of the following is a reason that 802.11a is more efficient than 802.11g when both operate at the same data rate? A) 802.11a does not have to support legacy devices B) 802.11a devices can handle more data C) 802.11a equipment is more sophisticated and expensive D) 802.11a encoding is more efficient
A) 802.11a does not have to support legacy devices
Which of the following can operate in the 5 GHz band? A) 802.11ac B) 802.11g C) Both A and B D) Neither A nor B
A) 802.11ac
What is the strongest security protocol for 802.11 today? A) 802.11i B) 802.11s C) 802.11X D) WPA
A) 802.11i
In what mode of 802.11i operation is a central authentication server used? A) 802.1X mode B) PSK mode C) both A and B D) neither A nor B
A) 802.1X mode
For ADSL service, which of the following typically must be added to the telephone system? A) A DSLAM. B) A transmission line to the customer premises. C) Both A and B D) Neither A nor B
A) A DSLAM.
When two devices communicate using NFC, how close must they be? A) A few inches B) Up to 50 feet C) Up to 5 feet D) Up to 10 feet
A) A few inches
What propagation problem becomes worse as frequency increases? A) Absorptive attenuation. B) Electromagnetic interference. C) Both A and B D) Neither A nor B
A) Absorptive attenuation.
Which of the following is more efficient and faster? A) CSMA/CA+ACK. B) RTS/CTS. C) Both are about equally efficient.
A) CSMA/CA+ACK.
Which of the following are usually given dynamic IP addresses? A) Clients. B) Servers. C) Both A and B D) Neither A nor B
A) Clients.
802.11i 802.1X initial authentication mode was created for ______ A) Corporations with multiple access points B) Corporations with less than eight access points C) Residences with a single access point D) Residences with more than eight access points
A) Corporations with multiple access points
In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B
A) E-Line
In ________, switching decisions are based on destination addresses. A) Ethernet B) PSDNs that use virtual circuits C) Both A and B D) Neither A nor B
A) Ethernet
A(n) ________ must find the best-matching row in its ________ table by comparing several row matches. A) Ethernet switch, switching B) router, routing C) Both A and B D) Neither A not B
A) Ethernet switch, switching
The IEEE calls 64-bit interface addresses ________. A) Extended Unique Identifiers B) Interface IDs C) Both A and B
A) Extended Unique Identifiers
A TCP ________ segment is a request to close a connection. A) FIN B) ACK C) Close D) Disconnect
A) FIN
Four-way closes use ________ segments. A) FIN B) RST C) Both A and B D) Neither A nor B
A) FIN
Which of the following segments is not acknowledged? A) FIN. B) RST. C) Both of the above are acknowledged. D) Neither A nor B is acknowledged.
A) FIN
Which of the following offers speeds that match speed range of greatest corporate demand for WAN transmission? A) Frame Relay. B) ATM. C) Both A and B D) Neither A nor B
A) Frame Relay.
In SNMP, companies are often reluctant to use ________ commands because of security dangers. A) Get B) Set C) Neither A nor B
A) Get
Which of the following standards provides for central management? A) IPsec. B) SSL/TLS. C) Both A and B D) Neither A nor B
A) IPsec
Which of the following allows routers to check for errors in the header when a packet arrives? A) IPv4. B) IPv6. C) Both A and B D) Neither A nor B
A) IPv4
Which of the following permits fragmentation by routers along a packet's route? A) IPv4. B) IPv6. C) Both A and B D) Neither A nor B
A) IPv4
The neighbor advertisement protocol message was created to give the ________ address of the host sending the message. A) IPv6 B) IPv4 C) Both A and B D) Neither A nor B
A) IPv6
The downside of unlicensed bands is potential _____ A) Interference from others B) Less-developed standards C) Speed loss D) Loss of flexibility
A) Interference from others
What does a router do with ARP request messages? A) It broadcasts them. B) It sends them directly to the destination host. C) Both A and B D) Neither A nor B
A) It broadcasts them.
A company has more control over its ________ technology. A) LAN B) WAN
A) LAN
A network that runs on the customer premises is a ________. A) LAN B) WAN C) Both A and B D) Neither A nor B
A) LAN
Which of the following usually offers higher speeds? A) LANs. B) WANs. C) Both A and B are about equal in typical speeds.
A) LANs.
Today's dominant cellular technology is ________. A) LTE B) 3G C) HSPA+ D) MTSO
A) LTE
According to the ITU, which of the following can be advertised as 4G? A) LTE. B) HSPA+. C) Both A and B D) Neither A nor B
A) LTE.
Wireless LAN standards come from ________. A) OSI B) TCP/IP C) both A and B D) neither A nor B
A) OSI
Wireless network standards come from ________. A) OSI B) TCP/IP C) Both A and B D) Neither A nor B
A) OSI
________ is an interior dynamic routing protocol. A) OSPF B) BGP C) both A and B D) neither A nor B
A) OSPF
A group of devices on a desk that communicate wirelessly is called a ____ A) PAN B) MAN C) WAN D) LAN
A) PAN
A customer's leased line to its ISP connects to the ISP's ________. A) POP B) NAP C) CSU/DSU D) interface
A) POP
Which TCP/IP interior dynamic routing protocol is good for small internets if security is not a serious concern? A) RIP. B) BGP. C) OSPF. D) Both A and C
A) RIP
________ is an interior dynamic routing protocol. A) RIP B) BGP C) Both A and B D) Neither A nor B
A) RIP
Which of the following DSL services does not offer QoS guarantees? A) Residential. B) Business. C) Both A and B D) Neither A nor B
A) Residential.
For 100,000 addresses, which will have fewer rows? A) Router table. B) Ethernet switch table. C) Both will be about the same length.
A) Router table.
Which is less expensive to implement? A) SSL/TLS. B) IPsec. C) Both cost about the same to implement.
A) SSL/TLS.
Which of the following is one of the three parts of an IP address? A) Subnet part. B) Mask. C) Both A and B D) Neither A nor B
A) Subnet part
Which of the following are more widely used? A) T1 lines. B) SONET lines. C) Both are used about equally.
A) T1 lines.
Which of the following can handle an application message that is one megabyte in size? A) TCP. B) UDP. C) Both A and B D) Neither A nor B
A) TCP
Which of the following is reliable? A) TCP. B) UDP. C) Both A and B D) Neither A nor B
A) TCP
Which of the following is reliable? A) TCP B) IP C) Both A and B D) Neither A nor B
A) TCP
What aspect of 802.11 standards affects interference between nearby access points? A) The number of possible nonoverlapping channels. B) The standard's minimum spacing parameter. C) RTS/CTS. D) All of the above.
A) The number of possible nonoverlapping channels.
What happens if two nearby access points use the same channel? A) They will interfere with each other. B) They will be bonded for joint operation automatically. C) They will be bonded for joint operation automatically if they use CSMA/CA+ACK. D) They will be bonded for joint operation automatically if they use RTS/CTS.
A) They will interfere with each other.
As a wireless host moves farther from a wireless access point, it is likely to transition to a slower modulation method. A) True. B) False.
A) True.
CSMA/CA+ACK is reliable. A) True. B) False.
A) True.
In 802.11 WLANs, the terms handoff and roaming mean the same thing. A) True. B) False.
A) True.
Individual throughput falls as the number of wireless hosts using an access point increases. A) True. B) False.
A) True.
The signal strength at 20 meters is 90 mW the signal strength at 60 meters would be 10 mW. A) True. B) False.
A) True.
When a wireless NIC receives a frame correctly, it immediately sends back a reply without listening for traffic. A) True. B) False.
A) True.
Which of the following is not true in regard to upgrading to Wi-Fi 6? A) Upgrading Wi-Fi routers and access points is a must B) Supports faster speeds C) Compatible with previous versions of wi-fi D) There are not additional infrastructure upgrades required
A) Upgrading Wi-Fi routers and access points is a must
Wi-Fi is a term used by the ________. A) Wi-Fi Alliance B) IEEE C) both A and B D) neither A nor B
A) Wi-Fi Alliance
If a radio transmission is easily blocked by obstacles, then you need to maintain ________. A) a clear line of sight B) spread spectrum transmission integrity C) broadband transmission D) deep transmission E) shadow zone transmission
A) a clear line of sight
In caching, ________. A) a message may not have to be transmitted B) messages are cached at the transmitting end of the line C) both A and B D) neither A nor B
A) a message may not have to be transmitted
Service quality issues with the Internet can be addressed by using ________. A) a single ISP B) multiple ISPs
A) a single ISP
What propagation problem is especially bad in moist air? A) absorptive attenuation B) electromagnetic interference C) multipath interference D) inverse square law attenuation
A) absorptive attenuation
In 802.11i, protection is provided between the client and the ________. A) access point B) switch C) router D) server
A) access point
A rogue access point is created by ________. A) an employee B) an external attacker C) the IT security department D) an evil twin
A) an employee
Cellular telephony uses ________. A) an omnidirectional antenna B) a dish antenna C) Both A and B D) Neither A nor B
A) an omnidirectional antenna
WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the PSDN carrier
A) at the ends of leased lines
Leased lines standards are most different around the world at speeds ________. A) below about 50 Mbps B) above about 50 Mbps C) Leased line speeds around the world are about equally different in both speed ranges.
A) below about 50 Mbps
One-bit fields are called ________ fields. A) binary B) flag C) ACK D) None of the above
A) binary
In CSMA/CA, CS means ________. A) carrier sense B) carriage suspension C) cancel sending D) counter-source
A) carrier sense
In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B
A) cell
In the 60 GHz service band, ________. A) channel bandwidth can be very wide B) signals travel farther C) Both A and B D) Neither A nor B
A) channel bandwidth can be very wide
To handle multiple conversations in radio transmission, you use multiple ________. A) channels B) frequencies C) service bands D) UWBs E) wires
A) channels
Which form of Bluetooth has a typical transmission speed of less than 3 Mbps? A) classic Bluetooth B) high-speed Bluetooth C) personal Bluetooth D) none of the above
A) classic Bluetooth
SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above
A) community names
SNMPv1 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of these
A) community names
Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) Both A and B D) Neither A nor B
A) companies lack rights of way
Smart antennas can ________. A) direct signal strength at individual wireless hosts B) transmit multiple spatial data streams in the same channel C) Both A and B D) Neither A nor B
A) direct signal strength at individual wireless hosts
Breaking into WLANs from outside the premises is ________. A) drive-by hacking B) war driving
A) drive-by hacking
In MPLS, the interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) on the basis of the previous packet going to the packet's IP address. D) None of the above
A) during the router's routing process
Pinging sends ICMP ________ messages to the target host. A) echo B) error advisement C) Both A and B D) Neither A nor B
A) echo
To see if a target host can be reached, you normally would send it an ICMP ________ message. A) echo B) error advisement C) Both A and B D) Neither A nor B
A) echo
To see if a target host can be reached, you normally would send it an ICMP ________ message. A) echo request B) error advisement C) either echo request or error advisement D) neither echo request nor error advisement
A) echo request
The Wi-Fi Alliance calls 802.1X mode ________ mode. A) enterprise B) personal C) WEP D) WPA
A) enterprise
A notebook computer configured to act like a real access point is a(n) ________. A) evil twin access point B) rogue access point
A) evil twin access point
Leased lines offer ________ service. A) fast B) any-to-any C) rapid-connection D) none of the above
A) fast
Compared to normal routing, decision caching is ________. A) faster B) less dangerous C) Both A and B D) Neither A nor B
A) faster
Compared to ADSL service, cable modem service typically is ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive
A) faster and more expensive
According to the IETF standards, if a router receives a series of packets from the same IP address to the same IP address, it should ________. A) go through the entire process for each packet B) cache the decision made for the first packet and use this decision on subsequent packets C) skip the first step in the routing process but go through other steps for each subsequent packet D) None of the above
A) go through the entire process for each packet
The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B
A) higher speed
Metropolitan area Ethernet is used primarily ________. A) in MANs B) to link sites in distant cities C) Both A and B D) Neither A nor B
A) in MANs
MIMO ________. A) increases throughput B) lowers propagation distance C) Both A and B D) Neither A nor B
A) increases throughput
If more users move to an access point, this decreases ________. A) individual throughput B) aggregate throughput C) Both A and B D) Neither A nor B
A) individual throughput
A company is free to select whatever ________ dynamic routing protocol it wishes. A) interior B) exterior C) both interior and exterior D) neither interior nor exterior
A) interior
An autonomous system is free to select whatever ________ dynamic routing protocol it wishes. A) interior B) exterior C) Both A and B
A) interior
Spread spectrum transmission is used in WLANs because ________. A) it is required by regulators B) it offers strong security C) Both A and B D) Neither A nor B
A) it is required by regulators
Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B
A) leased lines
Interference is minimized in ________. A) licensed bands B) unlicensed bands
A) licensed bands
A WAN is a network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) All of the above
A) links different sites together
Session keys are used to ________. A) make cryptanalysis more difficult B) improve authentication C) both A and B D) neither A nor B
A) make cryptanalysis more difficult
In SNMP, the ________ creates commands. A) manager B) agent C) Both A and B D) Neither A nor B
A) manager
Companies are moving to the 5 GHz band because there is ________ than in the 2.5 GHz band. A) more bandwidth B) less absorptive attenuation C) both A and B D) neither A nor B
A) more bandwidth
In an extended service set, each access point ________. A) must have the same SSID B) must have different SSIDs C) must have coordinated SSIDs D) none of the above
A) must have the same SSID
The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) Both A and B
A) network
In a network mask, the 1s correspond to the ________. A) network part B) subnet part C) host part D) None of the above
A) network part
Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
A) northbound APIs
Carrier access lines to residential buildings typically use ________. A) one-pair voice-grade UTP B) two-pair voice-grade UTP C) two-pair data-grade UTP D) four-pair UTP
A) one-pair voice-grade UTP
Mesh networking in 802.11 is likely to use ________. A) only wireless devices B) wireless devices and the site's wired LAN C) Both A and B
A) only wireless devices
SONET/SDH lines use ________. A) optical fiber B) high-quality forms of data-grade UTP C) Both A and B D) Neither A nor B
A) optical fiber
Leased lines are ________. A) point-to-point lines between two premises B) always on C) Both A and B D) Neither A nor B
A) point-to-point lines between two premises
The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is ________. A) protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B
A) protection over only part of the route
MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces
A) reduces
SDN ________. A) reduces CapEx B) increases OPEx C) both A and B D) neither A nor B
A) reduces CapEx
The use of virtual circuits ________. A) reduces costs B) improves reliability C) Both A and B D) Neither A nor B
A) reduces costs
CSMA/CA+ACK usually is ________. A) required B) optional C) not important D) efficient
A) required/mandatory
When a cellular customer moves from one city to another, this is ________. A) roaming B) a handoff C) Both A and B D) Neither A nor B
A) roaming
The highest-level DNS servers are called ________. A) root servers B) top-level servers C) Both A and B D) Neither A nor B
A) root servers
Dynamic _____ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) none of the above
A) routing
Dynamic ________ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) None of the above
A) routing
When a router forwards incoming packets closer to their destination hosts, this is ________. A) routing B) switching C) bridging D) hopping
A) routing
Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) Both A and B D) Neither A nor B
A) running optical fiber to neighborhoods
Wireless access points typically link wireless clients to ________. A) servers on the wired network B) wireless servers C) both A and B
A) servers on the wired network
Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater speed D) All of the above
A) service for more customers
NAT enhances security by preventing ________. A) sniffers from learning internal IP addresses B) encryption C) Both A and B D) Neither A nor B
A) sniffers from learning internal IP addresses
An internal router only connects different IP ________. A) subnets B) networks C) Both A and B D) Neither A nor B
A) subnets
LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) the slow corporate adoption of newer WAN technologies D) economics
A) technological limitations
Using the Internet as a WAN is attractive because of ________. A) the Internet's low cost per bit B) the Internet's service quality C) Both A and B D) Neither A nor B
A) the Internet's low cost per bit
In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manager
A) the SDN controller
Wireless network standards operate at ________. A) the data link layer B) the internet layer C) Both A and B D) Neither A nor B
A) the data link layer. The data link layer and the physical layer.
Which of the following uses an access point? A) traditional Wi-Fi B) Wi-Fi Direct C) both A and B D) neither A nor B
A) traditional Wi-Fi
Control functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B
A) traditional routing
MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on
A) transparent to
Client PCs must have digital certificates in ________. A) transport mode B) tunnel mode C) Both A and B D) Neither A nor B
A) transport mode
Which mode of IPsec may be more expensive if a company has a large number of computers? A) transport mode B) tunnel mode C) Both transport mode and tunnel mode are equally expensive.
A) transport mode
In stateless autoconfiguration, providing the address of DNS servers is ________. A) unnecessary B) mandatory C) optional D) impossible
A) unnecessary
In unlicensed bands, ________. A) you can use radios wherever you please B) you can prevent nearby businesses from setting up access points in the same channel C) Both A and B D) Neither A nor B
A) you can use radios wherever you please
The DNS ________ record is for the host name's ________ address
A, IPv4
Southbound APIs
APIs between the controller and forwarding devices
If someone says that a 1-bit flag is set, this means that it is given the value ________. A) 0 B) 1 C) Either of the above
B) 1
Which of the following already runs to nearly all customer premises? A) 4-pair UTP. B) 1-pair VG UTP. C) 1-pair DG UTP. D) None of the above
B) 1-pair VG UTP.
E1 leased lines run at a speed of about ________. A) 250 kbps B) 2 Mbps C) 34 Mbps D) 45 Mbps
B) 2 Mbps
A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission? A) 1. B) 2. C) 3. D) 4. E) There will be one frame for each switch along the way.
B) 2.
If your subnet part is 8 bits long, you can have ________ subnets. A) 128 B) 254 C) 256 D) 64
B) 254
The 2.4 GHz band supports ________ nonoverlapping channels. A) 1 B) 3 C) 7 D) 11 E) more than 11
B) 3
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits. B) 32 bits. C) 64 bits. D) We cannot say.
B) 32 bits.
The main version of Internet Protocol in use today is IP version ________. A) 1 B) 4 C) 5 D) 6
B) 4
802.11g has a rated speed of ________. A) 11 Mbps B) 54 Gbps C) 300 Mbps D) 1 Gbps
B) 54 Gbps
In an IPv6 global unicast address, the interface ID is ________ bits long. A) less than 32 B) 64 C) 128 D) We cannot say.
B) 64
Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? A) 6 B) 8 C) 7 D) 5
B) 8
802.1X requires security between the supplicant and the authenticator in ________. A) Ethernet B) 802.11 C) both A and B D) neither A nor B
B) 802.11
Which of the following brings gigabit speeds to clients? A) 802.11n B) 802.11ac C) 802.11g D) None of the above
B) 802.11ac
If an 802.11n access point and an 802.11g client communicate, they communicate using ________. A) 802.11n B) 802.11g C) Either A or B D) Neither A nor B
B) 802.11g
Which offers stronger security? A) WPA B) 802.11i C) Both A and B offer equally strong security.
B) 802.11i
If a firm has many access points, it should use ________ mode in 802.11i. A) PSK B) 802.1X C) IPsec D) PEAP
B) 802.1X
In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) Both A and B D) Neither A nor B
B) ADSL modem
Which of the following was created for PANs? A) 802.11 B) Bluetooth C) both A and B D) neither A nor B
B) Bluetooth
Which of the following DSL services tend to be symmetric in speed? A) Residential. B) Business. C) Both A and B D) Neither A nor B
B) Business.
Which of the following DSL services usually offers QoS guarantees? A) Residential. B) Business. C) Both A and B D) Neither A nor B
B) Business.
If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with ________. A) traditional cellular technology B) CDMA C) Both A and B D) Neither A nor B
B) CDMA
The PSDN technology that is growing rapidly today is ________. A) Frame Relay B) Carrier Ethernet C) the Internet D) No PSDN technology is growing rapidly today.
B) Carrier Ethernet
To handle multiple conversations in 802.11 transmission, you normally use multiple A) Service bands B) Channels C) Frequencies D) Wires
B) Channels
Which of the following does the carrier NOT own? A) The network core. B) Customer premises equipment. C) Both A and B D) Neither A nor B
B) Customer premises equipment.
Clients normally get their IP addresses from ________. A) DNS servers B) DHCP servers C) directory servers D) identity servers
B) DHCP servers
________ is a general naming system for the Internet. A) NAT B) DNS C) Both A and B D) Neither A nor B
B) DNS
Which of the following can route non-IP packets? A) OSPF B) EIGRP C) both OSPF and EIGRP D) neither OSPFA nor EIGRP
B) EIGRP
Which of the following can route non-IP packets? A) OSPF. B) EIGRP. C) Both A and B D) Neither A nor B
B) EIGRP
There is a row for each address in a(n) ________. A) Router table B) Ethernet switch table C) Both of the above D) Neither A nor B
B) Ethernet switch table
Access points take frames from wireless devices and send these frames on to devices on the wired LAN. They also do the converse. A) True. B) False.
B) False.
An access point and a host it serves can transmit to each other simultaneously. A) True. B) False.
B) False.
Radio has more reliable transmission than UTP. A) True. B) False.
B) False.
Spread spectrum transmission is used in commercial WLANs for security reasons. A) True. B) False.
B) False.
The most rapidly growing 802.11 LAN standard today is 802.11g. A) True. B) False.
B) False.
The most widely used 802.11 LAN standard today is 802.11n. A) True. B) False.
B) False.
The terms channel and service band mean roughly the same thing. A) True. B) False.
B) False.
There is less interference in the 2.4 GHz band than in the 5 GHz band. A) True. B) False.
B) False. More interference
In SNMP, the manager can create ________. A) traps B) GET commands C) Both A and B D) Neither A nor B
B) GET commands
When actively connected and using a WLAN while roaming in an ESS, the process of connecting to a new AP and disconnecting from another AP in one's path is called ______________. A) MIMO B) Handoff C) Switching D) Nomadic
B) Handoff
Which of the following is connectionless? A) TCP B) IP C) Both A and B D) Neither A nor B
B) IP
________ operates at the internet layer. A) TCP B) IP C) Both A and B D) Neither A nor B
B) IP
Which has stronger security? A) SSL/TLS. B) IPsec. C) Both have about equal security.
B) IPsec.
On what full 4G standard are carriers converging? A) LTE. B) LTE Advanced. C) HSPA+. D) None of the above
B) LTE Advanced.
Which of the following offers true 4G speeds? A) LTE. B) LTE Advanced. C) HSPA+. D) All of the above
B) LTE Advanced.
________ is the processing of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) None of the above
B) NAT
Local loop access lines to business use which of the following transmission media? A) 1-pair data-grade UTP. B) Optical fiber. C) Both A and B D) Neither A nor B
B) Optical fiber.
In 802.11i ________, hosts must know a shared initial key. A) 802.1X mode B) PSK mode C) both A and B D) neither A nor B
B) PSK mode
The 802.11e amendment made a change to the MAC layer to enable WLAN traffic to be prioritized. This is generally referred to as___________. A) RSNA B) QoS C) VoWLAN D) WPA2
B) QoS
Which of the following is usually optional in access point operation? A) CSMA/CA+ACK. B) RTS/CTS. C) Both A and B D) Neither A nor B
B) RTS/CTS.
To use an access point, you need to know its ________. A) BSSID B) SSID C) Wi-Fi ID D) ESSID
B) SSID
What is the main problem the 802.11ax standard of Wi-Fi 6 addresses? A) Ease of use B) Security C) Large number of devices D) Speed
B) Security
When a wireless NIC wishes to transmit, it listens for traffic. If there is traffic, it waits. If there is no traffic, it may transmit. A) True. B) Sometimes true. C) False.
B) Sometimes true.
How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.
B) They lease them from telephone companies.
Which mode of IPsec is more expensive? A) Transport mode. B) Tunnel mode. C) Both A and B are equally expensive.
B) Tunnel mode.
Which of the following is connectionless? A) TCP. B) UDP. C) Both A and B D) Neither A nor B
B) UDP
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? A) VLANs B) VPNs C) PEAP D) 802.1X mode
B) VPNs
The Internet is a ________. A) LAN B) WAN C) Both A and B D) Neither A nor B
B) WAN
Which of the following has more diversity in technologies? A) LANs. B) WANs. C) Both A and B are about equal in diversity of technologies.
B) WANs.
Compared to wired transmission, propagation problems in radio transmissions are _____ A) Better B) Worse C) About as bad
B) Worse
The other wireless device is far away in a known direction. You should use ________. A) an omnidirectional antenna B) a dish antenna C) Both A and B D) Neither A nor B
B) a dish antenna
When a cellular customer moves from one cell in a city to another cell in the same city, this is ________. A) cell switching B) a handoff C) cell hopping D) roaming
B) a handoff
In SNMP, the ________ creates responses. A) manager B) agent C) Both A and B D) Neither A nor B
B) agent
In SNMP, the ________ creates traps. A) manager B) agent C) Both A and B D) Neither A nor B
B) agent
In SNMP, the manager communicates directly with a(n) ________. A) managed device B) agent C) Both A and B D) Neither A nor B
B) agent
An 802.11g access point has an actual speed of 30 MHz. This is ________. A) the rated speed B) aggregate throughput C) channel bandwidth
B) aggregate throughput
A router's load-balancing process is determined by ________. A) the SDN controller B) an SDN application C) the router D) any of the above
B) an SDN application
Which of the following is usually set up by a hacker outside the building? A) a rogue access point B) an evil twin access point C) both A and B D) neither A nor B
B) an evil twin access point
IPsec protects ________ layer messages. A) data link B) application C) Both A and B D) Neither A nor B
B) application
DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B
B) asymmetric speed
In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above
B) before the packet arrives
To connect two sites at 2.8 Mbps, I would use ________. A) a T1 line B) bonded T1 lines C) a T2 line D) a T3 line
B) bonded T1 lines
To transmit data very rapidly, you would want a ________ channel. A) narrowband B) broadband C) single-frequency band D) Any of the above.
B) broadband
Bluetooth is for ________. A) large WLANs B) cable replacement C) both A and B D) neither A nor B
B) cable replacement
In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier
B) cellsite
The first Step in the Routing process involves ________. A) selecting the best match row B) comparing the packet's destination IP address to all rows C) comparing the packet's destination IP address to matching rows D) selecting an interface
B) comparing the packet's destination IP address to all rows
UDP is ________. A) connection-oriented B) connectionless C) Both A and B D) Neither A nor B
B) connectionless
The creation of routing tables for a router is an example of ________. A) forwarding B) control C) both A and B D) neither A nor B
B) control
Two-way amplifiers are needed for cable ________ service. A) television B) data C) Both A and B D) Neither A nor B
B) data
In IPv6, the payload length gives the number of octets in the ________. A) entire packet B) entire packet minus the main header C) entire packet minus the main and extension headers D) entire packet minus the extension headers
B) entire packet minus the main header
In NAT, the ________ creates new external source IP addresses and port numbers. A) router B) firewall C) source host D) destination host
B) firewall
In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) Both A and B D) Neither A nor B
B) first label-switching router
In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B
B) first label-switching router
The router advertisement protocol may ________. A) give the client an IPv6 address B) forbid the use of stateless autoconfiguration C) Both A and B D) Neither A nor B
B) forbid the use of stateless autoconfiguration
Wireless radio transmission usually is expressed in terms of ________. A) wavelength B) frequency C) Both A and B D) Neither A nor B
B) frequency
Access to a router is needed to create a ________. A) link local IPv6 address B) global unicast IPv6 address C) Both A and B D) Neither A nor B
B) global unicast IPv6 address
If a host to be able to communicate via IPv4 and IPv6, it is said to ________. A) be bilingual B) have a dual stack C) be IPv6 ready D) be fully compliant
B) have a dual stack
Frequency is measured in terms of ________. A) nanometers B) hertz C) Both A and B D) Neither A nor B
B) hertz
For human reading, IPv6 address are written in ________. A) decimal B) hexadecimal C) binary D) Elvish
B) hexadecimal
Which form of Bluetooth has a typical transmission speed of about 24 Mbps? A) classic Bluetooth B) high-speed Bluetooth C) enterprise Bluetooth D) none of the above
B) high-speed Bluetooth
The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________. A) that it provides protection over only part of the route B) higher cost C) Both A and B D) Neither A nor B
B) higher cost
In packet fragmentation and reassembly, the ________ field is used. A) version B) identification C) protocol D) Diff-Serv
B) identification
CSMA/CA+ACK is ________. A) efficient B) inefficient
B) inefficient
The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) We cannot say.
B) interface ID
Label-switching routers base their decisions on a packet's ________. A) IP address B) label number C) Both A and B D) Neither A nor B
B) label number
MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B
B) label number
For human reading, in IPv6 addresses, letters should be written in ________. A) uppercase B) lowercase C) Both A and B D) Neither A nor B
B) lowercase
In the Shannon Equation, C is the ________. A) actual speed of transmission in a channel B) maximum possible speed of transmission in a channel C) minimum possible speed of transmission in a channel D) channel bandwidth E) signal-to-noise ratio
B) maximum possible speed of transmission in a channel
Routers usually are connected in a ________ topology. A) point-to-point B) mesh C) hierarchical D) bus
B) mesh
Spread spectrum transmission is used in WLANs for ________. A) higher transmission speed B) more reliable transmission C) greater security D) All of the above.
B) more reliable transmission
Wi-Fi normally uses a(n) ________. A) dish antenna B) omnidirectional antenna C) both A and B D) neither A nor
B) omnidirectional antenna
Today, it is problematic to have ________. A) only a single IPv4 stack B) only a single IPv6 stack C) a dual stack D) All of the above
B) only a single IPv6 stack
In tunnel mode, IPsec provides protection ________. A) all the way between the two hosts B) only between the IPsec servers C) Both A and B D) Neither A nor B
B) only between the IPsec servers
Access points take ________ from wireless devices and send them on to devices on the wired LAN. They also do the converse. A) frames B) packets
B) packets
Attenuation with distance is faster with ________. A) UTP transmission B) radio transmission C) Both A and B D) Neither A nor B
B) radio transmission
Centralized access point management ________. A) increases management costs but provides better control B) reduces management costs
B) reduces management costs
An unauthorized internal access point is a(n) ________ access point. A) evil twin B) rogue C) shadow D) counterfeit
B) rogue
For a given volume of traffic, which are more expensive? A) switches. B) routers. C) Both of the above are about equally expensive.
B) routers
DHCP ________ are configurable parameters that determine which subnets the DHCP server will serve. A) ranges B) scopes C) spans D) domains
B) scopes
Corporations most wish to have ________ domain names. A) top-level B) second-level C) third-level D) None of the above
B) second-level
Most corporations wish to have ________ domain names. A) top-level B) second-level C) third-level D) None of these
B) second-level
Traditional MIMO can ________ A) send signals to two different clients at the same time B) send multiple signals in the same channel C) Both A and B D) Neither A nor B
B) send multiple signals in the same channel
After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key. A) VPN B) session C) 802.1X D) preshared
B) session
OpenFlow can be used to standardize ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
B) southbound APIs
Signals usually ________. A) travel at a single frequency B) spread over a range of frequencies
B) spread over a range of frequencies
Servers are normally given ________ IP addresses. A) well-known B) static C) dynamic D) None of the above
B) static
Fragmentation is ________. A) very common B) suspicious because it is often used by hackers C) Both A and B D) Neither A nor B
B) suspicious because it is often used by hackers
The use of options in IP is ________. A) very common B) suspicious because they are often used by hackers C) Both A and B D) Neither A nor B
B) suspicious because they are often used by hackers
At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master? A) the Bluetooth phone B) the Bluetooth headset C) Both are simultaneously masters and slaves.
B) the Bluetooth headset
Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B
B) the Internet
".com" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above
B) top-level domain
".edu" is a ________. A) root domain B) top-level domain C) second-level domain D) None of the above
B) top-level domain
A(n) ________ is a message sent by an agent to let the manager know about a condition the agent has detected. Select the name used in the SNMP standard. A) command B) trap C) alarm D) All of the above
B) trap
If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s). A) one B) two C) four D) 16
B) two
WLANs normally use ________. A) licensed bands B) unlicensed bands
B) unlicensed bands
Frame Relay frames contain ________. A) destination addresses B) virtual circuit numbers C) Both A and B
B) virtual circuit numbers
To drive around a city looking for working access points that are unprotected is ________. A) drive-by hacking B) war driving
B) war driving
IEEE 802.11ac can use channels with a bandwidth of up to ___________ in order to achieve data rates of up to 6.9 Gbps A) 20 MHz B) 40 MHz C) 160 MHz D) 80 MHz
C) 160 MHz
A 100/1 increase in power corresponds to approximately ________ decibels. A) 6 B) 10 C) 20 D) none of the above
C) 20
In 802.11i PSK mode, the pass phrase should be at least ________ characters long. A) 8 B) 12 C) 20 D) 128
C) 20
In 802.11, channel bandwidth usually is ________. A) 20 GHz B) 40 GHz C) 20 MHz D) 40 MHz
C) 20 MHz
In the mask 255.255.255.0, how many 1s are there? A) 8 B) 16 C) 24 D) None of the above
C) 24
Deciding how to send the packet back out is Step ________ in the routing process. A) 1 B) 2 C) 3 D) 4
C) 3
What speed does the LTE Advanced standard require downstream? A) 3 Mbps B) 30 Mbps C) 3 Gbps D) 30 Gbps
C) 3 Gbps
1 Watt represents a dBm value of about ________. A) 10 B) 20 C) 30 D) We cannot say because only one power is given.
C) 30
802.11n may offer a rated speed of about ________. A) 11 Mbps B) 54 Mbps C) 300 Mbps D) 3 Gbps
C) 300 Mbps
A mask has ________ bits. A) 8 B) 16 C) 32 D) We cannot say.
C) 32
The total length of an IP address is ________ bits. A) 8 B) 16 C) 32 D) We cannot say.
C) 32
HSPA+ is a ________ service. A) 1G B) 2G C) 3G D) 4G
C) 3G
For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access? A) 1G. B) 2G. C) 3G. D) 4G.
C) 3G.
A firm uses a PSDN. It has four sites. How many leased lines will it need? A) None B) 1 C) 4 D) None of the above
C) 4
For human reading, symbols in IPv6 addresses are written in groups of ________. A) 1 B) 2 C) 4 D) 16
C) 4
Near-field communication has a maximum transmission distance of about ________. A) 400 cm/200 in B) 40 cm/20 in C) 4 cm/2 in D) The devices must be physically touching.
C) 4 cm/2 in
Each frequency channel in an 802.11a WLAN is 20MHz wide and is divided into ___________ subcarriers that are modulated with data. A) 56 B) 114 C) 52 D) 48
C) 52
The maximum mandatory rate of an IEEE 802.11a WLAN, according to the standard, is ____________. A) 11 Mbpsb B) 24 Mbpsc C) 54 Mbpsd D) 108 Mbps
C) 54 Mbpsd
In the 5 GHz band, how many channels can you have with 802.11ac with 80 GHz channels? A) 1 B) 12 C) 6 D) 24
C) 6
In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be? A) 6 B) 7 C) 8 D) None of the above
C) 8
Which 802 working group created 802.11i? A) 802.1 B) 802.3 C) 802.11 D) It was not an 802 working group. It was the Wi-Fi Alliance
C) 802.11
Wireless LAN standards are created by the ________ Working Group. A) 802.1 B) 802.3 C) 802.11 D) 802.3W
C) 802.11
For wireless backup, which of the following is adequate? A) 802.11g B) 802.11n C) 802.11ac D) All of the above
C) 802.11ac
Which of the following can offer speeds of about a gigabit per second? A) 802.11g. B) 802.11n. C) 802.11ac. D) None of the above.
C) 802.11ac.
In ________, the authenticator is the ________. A) 802.1X, wireless access point B) 802.11i, switch C) 802.11i, wireless access point D) 802.1X, central authentication server
C) 802.11i, wireless access point
For which standard is 300 Mbps a typical rated speed? A) 802.11ad. B) 802.11ac. C) 802.11n. D) 802.11g.
C) 802.11n.
A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels. A) 3 B) 6 C) 9 D) none of the above
C) 9
A radio that has a power of 8 mW represents a ratio of about ________ dBm. A) 2 B) 8 C) 9 D) 10
C) 9
Bluetooth is standardized by the ________. A) 802.11 Working Group B) Wi-Fi Alliance C) Bluetooth Special Interest Group D) none of the above
C) Bluetooth Special Interest Group
In the United States, to get a leased line of at least 2.5 Mbps. Your access line would be ________. A) T1 B) Fractional T1 C) Bonded T1s D) None of the above
C) Bonded T1s
58) Which of the following is contributing to the exhaustion of IPv4 addresses? A) The growing number of hosts in Asia. B) The growing number of mobile devices. C) Both A and B D) Neither A nor B
C) Both A and B
802.11 standards are being developed to work in the ________ unlicensed band. A) 2.4 GHz B) 5 GHz C) Both A and B D) None of the above.
C) Both A and B
802.11ad will ________. A) operate in the 60 GHz radio band B) have short propagation distance C) Both A and B D) Neither A nor B
C) Both A and B
802.11n is designed to operate in the ________ unlicensed band. A) 2.4 GHz B) 5 GHz C) Both A and B D) Neither A nor B
C) Both A and B
802.11n is faster than 802.11g because 802.11n ________ A) is designed to use wider channels B) can send multiple signals (spatial transmission speeds) in a single channel C) Both A and B D) Neither A nor B
C) Both A and B
802.11n will be superior to current 802.11 standards by ________. A) offering wider channels B) sending multiple spatial data streams in a single channel between wireless access points and wireless NICs C) Both A and B D) Neither A nor B
C) Both A and B
ARP is used to find the destination data link layer destination addresses of ________. A) destination hosts B) routers C) Both A and B D) Neither A nor B
C) Both A and B
An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) Both A and B D) Neither A nor B
C) Both A and B
Beamforming can ________. A) direct signal strength at individual wireless hosts B) transmit multiple spatial data streams in the same channel C) Both A and B D) Neither A nor B
C) Both A and B
Beamforming can allow an access point to ________. A) send signals to two different clients at the same time B) direct power to individual clients C) Both A and B D) Neither A nor B
C) Both A and B
In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) Both A and B D) Neither A nor B
C) Both A and B
In TCP/IP, routing means ________. A) the process that routers use to forward incoming packets B) the process that routers use to exchange routing table information C) Both A and B D) Neither A nor B
C) Both A and B
Leased line switched WANs typically use ________. A) leased lines B) a router at each site C) Both A and B D) Neither A nor B
C) Both A and B
MIMO increases ________. A) throughput B) propagation distance C) Both A and B D) Neither A nor B
C) Both A and B
Media access control governs transmission by ________. A) access points B) wireless NICs C) Both A and B D) Neither A nor B
C) Both A and B
The default row ________. A) always has the mask /32 B) will always match the IP address of an incoming packet C) Both A and B D) Neither A nor B
C) Both A and B
The encapsulating security protocol can be used in ________. A) IPv4 B) IPv6 C) Both A and B D) Neither A nor B
C) Both A and B
The encapsulating security protocol offers ________. A) confidentiality B) authentication C) Both A and B D) Neither A nor B
C) Both A and B
To deliver an arriving packet to a destination host on a subnet connected to router, the router needs to know the destination host's ________ before the router can send the packet on to the destination host. A) IP address B) data link layer address C) Both A and B D) Neither A nor B
C) Both A and B
What propagation problem becomes worse as frequency increases? A) Absorptive attenuation. B) Shadow zones. C) Both A and B D) Neither A nor B
C) Both A and B
When a host moves from one wireless access point to another in a WLAN, this is ________. A) a handoff B) roaming C) Both A and B D) Neither A nor B
C) Both A and B
Which of the following go from one customer site to another customer site? A) Leased lines. B) Access lines. C) Both A and B
C) Both A and B
Which of the following is true? A) An 802.11n host can work with an 802.11g access point. B) An 802.11g host can work with an 802.11n access point. C) Both A and B D) Neither A nor B
C) Both A and B
Which of the following uses OFDM? A) 802.11g. B) 802.11n. C) Both A and B D) Neither A nor B
C) Both A and B
Why is metro Ethernet popular? A) Familiarity. B) Rapid reprovisioning. C) Both A and B D) Neither A nor B
C) Both A and B
Why is metro Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) Both A and B D) Neither A nor B
C) Both A and B
________ operates at the transport layer. A) TCP B) UDP C) Both A and B D) Neither A nor B
C) Both A and B
To configure itself, a client PC running IPv6 can configure itself using ________. A) DHCP B) stateless autoconfiguration C) Both A and B D) Neither A nor B
C) Both A and B, DHCP & stateless autoconfiguration
Which of the following is true about NAT? A) It can enhance security. B) It presents problems for some protocols. C) Both A and B D) Neither A nor B
C) Both A and B, It can enhance security & presents problems for some protocols
The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) Both A and B D) Neither A nor B
C) Both A and B, a way to find a host's IP addresses if your computer only knows the host's host name & a general naming system for the Internet
Stateless autoconfiguration can be used to ________. A) change all subnet IDs in a network B) change all routing prefixes in a network C) Both A and B D) Neither A nor B
C) Both A and B, change all subnet IDs & all routing prefixes in a network
The router advertisement protocol may ________. A) give the client a routing prefix B) give the client a subnet ID C) Both A and B D) Neither A nor B
C) Both A and B, gives the client a routing prefix & a subnet ID
Label-switching routers provide ________. A) lower cost B) the ability to do traffic engineering C) Both A and B D) Neither A nor B
C) Both A and B, lower cost & the ability to do traffic engineering
Which of the following would be an SNMP object? A) Number of rows in routing table. B) System uptime (since last reboot). C) Both A and B D) Neither A nor B
C) Both A and B, number of rows in routing table & system uptime (since last reboot)
Which of the following can be used within a firm? A) Private IP addresses. B) Public IP addresses. C) Both A and B D) Neither A nor B
C) Both A and B, private & public addresses
IPsec is used for ________ VPNs. A) remote-access B) site-to-site C) Both A and B D) Neither A nor B
C) Both A and B, remote-access & site-to-site
To use a leased line, the customer requires a(n) ________ at each site. A) switch B) router C) CSU/DSU D) modem
C) CSU/DSU
LANs are ________. A) single networks B) internets C) Either A or B D) Neither A nor B
C) Either A or B
WANs are ________. A) single networks B) internets C) Either A or B D) Neither A nor B
C) Either A or B
The management information base (MIB) is a(n) ________. A) schema B) actual database C) Either A or B D) Neither A nor B
C) Either A or B, schema or actual database
Most wireless systems operate in the ________ range. A) hz B) kHz C) GHz D) MHz
C) GHz
Which is not one of the three parts of a public IPv6 unicast address? A) Subnet ID. B) Routing prefix. C) Host part. D) All of the above ARE parts in a public IPv6 unicast address.
C) Host part.
An IPv4 packet's protocol field value is 1. The data field contains a(n) ________ message. A) TCP B) UDP C) ICMP D) DNS
C) ICMP
An access point can transmit to more than one wireless client at a time with A) MIMO B) CSMC/CA+ACK C) Multiuser MIMO D) Bonding
C) Multiuser MIMO
Which form of spread spectrum transmission divides the channel into many smaller channels called subcarriers? A) DSSS. B) FHSS. C) OFDM. D) All of the above. E) None of the above.
C) OFDM.
Which interior dynamic routing protocol is good for large internets? A) RIP. B) BGP. C) OSPF. D) Both A and C
C) OSPF
What transmission medium do ALL DSL services use? A) One-pair data-grade UTP. B) Two-pair data-grade UTP. C) One-pair voice-grade UTP. D) Two-pair voice-grade UTP.
C) One-pair voice-grade UTP.
Bluetooth use ______operation. A) Point-to-multipoint B) One-to-all C) One-to-one D) All-to-all
C) One-to-one
In a PSDN, companies connect to the network core at ________. A) NAPs B) Public/Private access points C) POPs D) DSLAMs
C) POPs
In a PSDN, customers connect to the network core at ________. A) NAPs B) public/private access points C) POPs D) DSLAMs
C) POPs
How does WPA3 help keep devices on a public, open network secure? A) It requires a facial recognition scan at the access point B) It requires users to establish physical connections with the network C) WPA3 individually encrypts each device that connect to the network D) WPA3 will require a fee in Dogecoin to use the network
C) WPA3 individually encrypts each device that connect to the network
SNMPv3 uses ________ for authentication. A) community names B) digital certificates and digital signatures C) a different password for each manager-agent pair D) All of the above
C) a different password for each manager-agent pair
A company receives its domain name from ________. A) the IETF B) its ISP C) a domain registrar D) None of the above
C) a domain registrar
Combining multiple WAN technologies into a collectively managed system is called having ________. A) SNMP B) network visibility C) a virtual WAN D) WAN optimization
C) a virtual WAN
In the Shannon Equation, if you quadruple the bandwidth in a channel while the signal-to-noise ratio remains the same, you can transmit ________. A) Log2(1+4) times as fast B) Log2(1+1/4) times as fast C) about 4 times as fast D) about 1/4 as fast E) at the same speed, but more reliably
C) about 4 times as fast
In 802.11 networks, the speed I receive on my portable devices is a(n) ________. A) individual throughput B) rated speed C) aggregate throughput D) None of the above
C) aggregate throughput
In CSMA/CD+ACK, when a wireless NIC wishes to transmit, it listens for traffic. If there is traffic, it waits. When the traffic stops, it may transmit immediately. A) always true B) sometimes true C) always false
C) always false
The PSDN transport core normally is drawn as a cloud ________. A) because it has no internal structure B) for security reasons C) because customers do not need to care about what is inside it D) All of the above
C) because customers do not need to care about what is inside it
802.11i provides ________. A) confidentiality B) message integrity C) both A and B D) neither A nor B
C) both A and B
An extended service set (ESS) is a group of BSSs that ________. A) are connected to the same distribution system B) have the same SSID C) both A and B D) neither A nor B
C) both A and B
DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B
C) both A and B
Forwarding functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B
C) both A and B
Managed access points should ________. A) allow access point power to be adjusted remotely B) provide constant transmission quality monitoring C) both A and B D) neither A nor B
C) both A and B
Managed access points should ________. A) identify rogue access points B) be able to push updates out to access points C) both A and B D) neither A nor B
C) both A and B
SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B
C) both A and B
The messages of VPNs ________. A) are encrypted B) share the public network like Internet C) both A and B D) neither A nor B
C) both A and B
Traffic shaping ________. A) limits the amount of some types of traffic B) does not admit some types of traffic C) both A and B D) neither A nor B
C) both A and B
WAN optimization provides ________. A) network protocol acceleration B) caching C) both A and B D) neither A nor B
C) both A and B
Which of the following affects what throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B
C) both A and B
Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B
C) both A and B
Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B
C) both A and B
Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B
C) both A and B
The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B D) neither A nor B
C) both A and B, a way to find a host's IP addresses if your computer only knows the host's host name & a general naming system for the Internet
For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP
C) coaxial cable
The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________. A) default router B) local next-hop router C) destination host D) None of the above
C) destination host
Part of WPS weakness is caused by ________. A) 802.1X mode B) WPA2 preshared key mode C) dividing the 8 digit PIN into two 4 digit halves D) IPsec
C) dividing the 8 digit PIN into two 4 digit halves
Stateless autoconfiguration makes more sense for ________. A) single-stack IPv4 hosts B) single-stack IPv6 hosts C) dual-stack hosts D) It makes equal sense for all of the above.
C) dual-stack hosts
Pinging is to send ICMP ________ messages to the target host. A) ping B) error advisement C) echo request D) echo
C) echo request
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center. A) the interface ID B) the subnet ID C) fffe D) 0000
C) fffe
Which Bluetooth profile would a desktop use with a Bluetooth keyboard? A) Bluetooth input profile B) Bluetooth I/O profile C) human interface device profile D) none of the above
C) human interface device profile
Routers send packets out ________. A) ports B) connections C) interfaces D) plugs
C) interfaces
IPsec is a(n) ________ layer standard. A) physical B) data link C) internet D) All of the above
C) internet
In VPNs designed to frustrate evil twin attacks, the shared secret ________. A) is transmitted in the clear B) is transmitted with cryptographic protections C) is not transmitted D) Any of the above.
C) is not transmitted
In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path
C) label-switched path
The PSTN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop
C) modified hierarchy
A LAN is a network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) All of the above
C) provides service within a site
TCP messages are called ________. A) frames B) packets C) segments D) fragments
C) segments
A channel has more bandwidth than is necessary given data transmission speeds requirements in ________ transmission. A) normal radio B) reliable commercial C) spread spectrum transmission D) licensed E) None of the above.
C) spread spectrum transmission
In the TJX breach, attackers first got into the network through ________. A) spear phishing B) an inside conspirator C) the use of weak wireless encryption D) all of the above
C) the use of weak wireless encryption
MIMO ________. A) uses a single spatial stream but multiple signals B) bonds channels for higher speed C) transmits multiple signals in the same channel D) is used in all forms of 802.11
C) transmits multiple signals in the same channel
Low-speed leased lines use ________ transmission lines to the customer premises. A) one-pair voice-grade UTP B) one-pair data-grade UTP C) two-pair data-grade UTP D) four-pair UTP
C) two-pair data-grade UTP
Using unused transmission channels in a service band is called using ________. A) dark spectrum B) opportunistic agility C) white space D) a smart antenna
C) white space
What cryptographic protections does 802.11i provide?
Confidentiality, Integrity, and Authentication (acronym = CIA).
How many DNS root servers are there? A) 1. B) 2. C) 10. D) 13.
D) 13.
65) If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________. A) 2001:0000:0000:00fe::::cdef B) 2001:::00fe:0000:0000:0000:cdef C) 2001::00fe::::cdef D) 2001:::00fe::cdef
D) 2001:::00fe::cdef
Most end-office switches are Class ________ switches. A) 1 B) 2 C) 3 D) 5
D) 5
The new version of Internet Protocol that is coming into use is IP version ________. A) 1 B) 4 C) 5 D) 6
D) 6
Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have? A) 8 B) 16 C) 254 D) 65,534
D) 65,534
How many modulation and coding sets are defined in 802.11n? A) 10 B) 27 C) None, 802.11n does not define any MCSs D) 77
D) 77
The most widely used 802.11 standard today is ________. A) 802.11a B) 802.11b C) 802.11e D) 802.11g E) 802.11n
D) 802.11g
Which of the above is NOT an element in a network management system? A) The manager. B) Agents. C) Objects. D) All of the above ARE elements in network management systems.
D) All of the above ARE elements in network management systems
A rogue access point ________. A) is an unauthorized internal access point B) often has very poor security C) often operates at high power D) All of the above are true.
D) All of the above are true.
________ servers provide ________ IP addresses to clients. A) DNS, static B) DNS, dynamic C) DHCP, static D) DHCP, dynamic
D) DHCP, dynamic
________ is used for supervisory messages at the internet layer. A) TCP B) DNS C) DHCP D) ICMP
D) ICMP
Because 802.11ac uses essentially the same transmission technology as 802.11n, which of the following is the main reason for its increased throughput? A) A more efficient protocol B) The signal strength is higher C) It does not suffer from interference at all D) It can use wider frequency channels divided into more subcarriers
D) It can use wider frequency channels divided into more subcarriers
________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time. A) Creating extended service sets B) The distribution system C) Roaming D) Media access control
D) Media access control
802.11a supports ________ nonoverlapping channels. A) 1 B) 3 C) 7 D) More than 10
D) More than 10
ATM ________. A) offers speeds in the range of greatest corporate demand B) is relatively inexpensive C) Both A and B D) Neither A nor B
D) Neither A nor B
According to the ITU, which of the following offers true 4G speeds? A) LTE. B) HSPA+. C) Both A and B D) Neither A nor B
D) Neither A nor B
For which of the following is 100 meters a typical service distance? A) 802.11n. B) 802.11g. C) Both A and B D) Neither A nor B
D) Neither A nor B
IP is made reliable through ________. A) echo and echo reply messages B) error advisement messages C) Both A and B D) Neither A nor B
D) Neither A nor B
In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) Both A and B D) Neither A nor B
D) Neither A nor B
TCP is ________. A) connectionless B) unreliable C) Both A and B D) Neither A nor B
D) Neither A nor B
Two wireless devices communicate via Wi-Fi Direct using ________. A) an access point that lets them talk directly B) an Ethernet network to connect their access points C) Either A or B D) Neither A nor B
D) Neither A nor B
What propagation problem becomes worse as frequency increases? A) Inverse square law attenuation. B) Electromagnetic interference. C) Both A and B D) Neither A nor B
D) Neither A nor B
Which of the following is a draft standard, according to the book? A) 802.11n. B) 802.11g. C) Both A and B D) Neither A nor B
D) Neither A nor B
Which of the following is a full, according to the book? A) 802.11ac. B) 802.11ad. C) Both A and B D) Neither A nor B
D) Neither A nor B
Wider channel bandwidth ________. A) allows more channels to be used in a service band B) decreases transmission speed C) Both A and B D) Neither A nor B
D) Neither A nor B (it increases transmission speed)
Are all devices able to use WPA3? A) Only devices made before 2018 B) Yes, all devices will be able to support WPA3 C) Only devices made after 2014 D) No, most devices will require replacement or firmware update
D) No, most devices will require replacement or firmware update
In DNS servers, the IPv6 address of a host is contained in the ________ record. A) IPv6 B) IPv4+ C) A D) None of the above
D) None of the above
The version number field in IPv6 has the value ________. A) 0001 B) 0100 C) 0101 D) None of the above
D) None of the above (0110)
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 14 B) 16 C) 256 D) None of the above
D) None of the above (254 hosts)
If your subnet part is 8 bits long, you can have ________ subnets. A) 64 B) 128 C) 256 D) None of the above
D) None of the above (254 subnets)
The 802.11 standard for mesh networking is ________. A) 802.11r B) 802.11m C) 802.11ac D) None of the above
D) None of the above (is 802.11s)
A channel extends from 55 MHz to 60 MHz. Its bandwidth is ________. A) 60 MHz B) 55 MHz C) 65 MHz D) None of the above.
D) None of the above. (5MHz)
In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait. A) CSMA/CA+ACK B) CSMA/CA C) CSMA/CD D) RTS/CTS
D) RTS/CTS
The highest layer in SDN consists of ________. A) switches B) routers C) the SDN controller D) SDN applications
D) SDN applications
Wi-Fi operates in the 2.4GHz and 5GHz _____ A) Spectrums B) Frequencies C) Channels D) Service bands
D) Service bands
In a routing table, Rows 47, 3,497, and 30,451 match the destination IP address of an arriving packet's IP address. Which row will the router look at last when trying to find matches? A) 1 B) 37 C) 30,451 D) The default row
D) The default row
Which of the following has a dangerous vulnerability that is causing problems today? A) PEAP B) 802.11i C) WPA D) WPS
D) WPS
In the IPv4 address 1.2.3.4, what is the network part? A) 1 B) 1.2 C) 1.3 D) We cannot say.
D) We cannot say.
The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes ________. A) a frequency spectrum B) a broadband C) a channel D) a service band E) All of the above.
D) a service band
At 10 meters, a signal has a strength of 100 mW. About how strong will it be at 40 meters? A) about 0.5 mW B) about 5 mW C) about 25 mW D) about 6 mW
D) about 6 mW
Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) quality of service D) all of the above
D) all of the above
Which of the following is a risk in 802.11i PSK mode? A) WPS can easily be cracked if it is used. B) Unauthorized sharing of the pre-shared key. C) A weak passphrase may be selected. D) all of the above
D) all of the above
Which of the following would be an SNMP object? A) number of rows in routing table B) system uptime (since last reboot) C) both number of rows in routing table and system uptime (since last reboot) D) neither number of rows in routing table nor system uptime (since last reboot)
D) both number of rows in routing table and system uptime (since last reboot)
Channels with wide bandwidths are called ________ channels. A) single-mode B) multimode C) full-duplex D) broadband E) modulated
D) broadband
After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. A) the preshared key B) an 802.1X key C) WPS keys D) different session keys
D) different session keys
In DNS, a group of resources under the control of an organization is called a ________. A) network B) subnet C) scope D) domain
D) domain
The frequency range from 500 megahertz to 10 gigahertz is called the ________. A) frequency spectrum B) commercial mobile service band C) UWB region D) golden zone E) unlicensed band
D) golden zone
In the telephone system, the lines that connect customers to the nearest switch are called the ________. A) access lines B) local lines C) access loop D) local loop
D) local loop
The most serious problem with wireless transmission in WLANs is ________. A) inverse square law attenuation B) absorptive attenuation C) shadow zones D) multipath interference
D) multipath interference
For post-authentication communication with an access point, the client in 802.11i PSK mode will ________ for subsequent communication. A) always use the same preshared key each time it is connected B) always use the same session key each time it is connected C) both A and B D) neither A nor B
D) neither A nor B
In which frequency band does NFC operate? A) 2.4 GHz B) 5 GHz C) both A and B D) neither A nor B
D) neither A nor B
IP is reliable because of ________. A) echo and echo reply messages B) error advisement messages C) both echo and echo reply messages and error advisement messages D) neither echo and echo reply messages nor error advisement messages
D) neither echo and echo reply messages nor error advisement messages
An 8/1 increase in power corresponds to approximately ________ decibels. A) 3 B) 6 C) 20 D) none of the above
D) none of the above
In Bluetooth, a master can have up to ________ slaves at any moment. A) 1 B) 3 C) 12 D) none of the above
D) none of the above
Passive RFID chips are powered by ________. A) a battery B) the sun C) body temperature D) none of the above
D) none of the above
Which is the correct formula for decibels? A) 10 * P2/P1 B) 10 * (P2/P1)2 C) Log10(P2/P1) D) none of the above
D) none of the above
In an IPv4 packet, the ________ field value tells the type of message contained in the IP packet's data field. A) data B) next-hop C) next-header D) protocol
D) protocol
In IPsec, agreements about how security will be done are called ________. A) tranches B) security contracts C) service-level agreements D) security associations
D) security associations
The main benefit of IPv6 over IPv4 is ________. A) two more bits in the IP address B) two more bytes in the IP address C) the ability to have quality-of-service guarantees D) the ability to support more possible hosts
D) the ability to support more possible hosts
Passive RFID chips are powered by ________. A) a battery B) the sun C) body temperature D) the scanning unit
D) the scanning unit
IPsec provides protection in two modes of operation; one of these two modes is ________. A) data link mode B) 802.1X mode C) network mode D) transport mode
D) transport mode
A router must use the ARP process ________. A) when a new router comes online B) when a router goes offline C) whenever it forwards an IP packet D) whenever it forwards an IP packet to a host that is not in its ARP cache
D) whenever it forwards an IP packet to a host that is not in its ARP cache
To transmit very rapidly in RADIO, you need ________. A) single-frequency transmission B) single-mode transmission C) multimode transmission D) wide bandwidth E) narrow bandwidth
D) wide bandwidth
In 802.1x mode, why is no security necessary between the authenticator and the host before authentication is done?
Difficult for someone to tap the wired access line between the computer and the switch.
The frequency spectrum extends ________. A) into the megahertz range B) into the gigahertz range C) into the visible light range D) into the ultraviolet range E) to infinity
E) to infinity
Which of the following is more widely used?
ESP
Why is a short transmission range not a protection against eavesdroppers?
Eavesdroppers with highly directional antennas and amplifiers can intercept signals over much longer distances.
Carrier Ethernet (CE)
Ethernet for WAN service offered by carriers; was originally limited to metropolitan area network, so it was originally called metro Ethernet
".UK" is a generic top-level domain.
FALSE
A router has to go through the ARP process each time it needs to send a packet to a destination host or to a next-hop router.
FALSE
A row in a routing table has the destination 10.8.0.0 and the mask /24. It is a match for 10.8.6.7.
FALSE
ADSL offers symmetric service.
FALSE
An autonomous system can freely select the exterior dynamic routing protocol it will use.
FALSE
Border router's main job is to connect different subnets in the same network.
FALSE
By regulation, cellular systems must give almost the same throughput at different places in their service areas.
FALSE
By regulation, cellular systems must give almost the same throughput at different times during the day.
FALSE
Human interface functionality is defined by the SNMP standard.
FALSE
ICMP error advisement messages add reliability to IP.
FALSE
IPsec operates at the data link layer.
FALSE
If I use Channel3 in a cell, I can reuse that same channel in an adjacent cell with traditional cellular technology.
FALSE
If two products both comply with 802.11 ac, they should have close to the same performance.
FALSE
In IP subnet planning, having a large subnet part allows more hosts per subnet.
FALSE
In SNMP, "object" is another name for "managed device."
FALSE
In SNMP, the agent can create commands.
FALSE
In SNMP, the manager communicates directly with the managed device.
FALSE
In SNMP, the manager creates both commands and responses.
FALSE
In a routing table, a row is a route for a single IP address.
FALSE
In cellular technology, a cellsite is a small geographical area.
FALSE
In the Domain Name System, there is a single root server.
FALSE
In tunnel mode, IPsec provides protection all the way between the two hosts.
FALSE
NAT works automatically with all protocols.
FALSE
Routers know the difference between network and subnet masks.
FALSE
Servers are normally given dynamic IP addresses.
FALSE
Stateless autoconfiguration will give an IPv6 host most or all of the configuration information it needs to operate effectively.
FALSE
The default row will never be selected as the best match row.
FALSE
The slowest offered SONET/SDH leased lines run at about 50 Mbps.
FALSE
To be protected by IPsec, applications must be IPsec-aware.
FALSE
UDP is reliable.
FALSE
UTP transmission is normally limited to about 100 meters.
FALSE
WAN prices are closely related to carrier costs.
FALSE
All 5 GHz bands are available for use by WLANs worldwide.
False
In a Wi-Fi LAN, wireless hosts generally send frames directly to one another
False
Nearly all public Wi-Fi hotspots encrypt your transmissions
False
n NFC, an attacker several meters away cannot read the transaction.
False
Two WLAN products that conform to the same standard will have almost equal performance. (True or False)
False Will not have equal performance.
________ is used for supervisory messages at the internet layer. A) DNS B) DHCP C) TCP D) ICMP
ICMP
SA protections are applied in the ________.
IPsec protection
Why does the host and authenticator need security BEFORE 802.1x authentication?
In order to encrypt the authentication data being sent from host to authenticator.
Comment on the cost of central access point management.
It's expensive, but it greatly reduces management labor, so there should be considerable net savings from its use
What is the state of NFC standards?
NFC standards are still in flux. (1) All NFC protocols use transmission in the 13.56 MHz unlicensed service band created and Its technical standards are largely set. (2) However, for applications such as point-of-sale payments, there are competing application standards
Do public hot spots protect your transmissions?
No
Northbound APIs
SDN APIs between applications and controllers
".edu" is a generic top-level domain.
TRUE
39) DSL throughput is typically sensitive to distance from the nearest switching building.
TRUE
After creating a link local IPv6 address, a host doing IPv6 stateless autoconfiguration should use the neighbor discovery protocol.
TRUE
All SONET/SDH leased lines run faster than 50 Mbps.
TRUE
Cellular carriers are happy when flat fee users use a corporate 802.11 LAN to place calls instead of using the carrier network.
TRUE
Cellular technology was created to support more customers in a single area.
TRUE
Clients can send a DHCP request message to multiple DHCP servers.
TRUE
Converting networks to support IPv6 is relatively simple and inexpensive.
TRUE
IPsec is used for site-to-site VPNs.
TRUE
IPsec protects all layers above the internet layer.
TRUE
IPv6 has a number of known security weaknesses.
TRUE
If the ACK bit is set, the acknowledgment number field MUST have a value.
TRUE
In IPv6, routers usually only have to consider the hop-by-hop options extension header.
TRUE
In SNMP, Set commands tell the agent to change a parameter on the managed device.
TRUE
In SNMP, the time-to-live value for a router interface is the value for an object.
TRUE
In transport mode, IPsec provides security over the internal networks.
TRUE
Label-switching routers do NOT look at the IP address of each arriving packet.
TRUE
Metro Ethernet offers relatively high speeds and low costs.
TRUE
NAT can multiply the number of IP addresses available to the firm by over a thousand.
TRUE
NAT operates transparently to the two hosts.
TRUE
NAT provides security.
TRUE
Private IP address ranges are only used within a firm.
TRUE
Servers have static IP addresses so that clients can find them easily.
TRUE
Some smart phones can act as wireless access points.
TRUE
Stateless autoconfiguration can be used to change all routing prefixes and subnet IDs in a network.
TRUE
The first stage in IPv6 stateless autoconfiguration is to create an address that can only be used on the host's single network.
TRUE
The general name for a company that is given rights of way to lay wires through public areas is carrier.
TRUE
The next-hop router in the default row is called the default router.
TRUE
The time to live field in IPv4 has the same basic function as the hop limit field in IPv6.
TRUE
To deliver signals to individual residences, cable television companies primarily use coaxial cable.
TRUE
To handle internetwork transmission control tasks that the IP protocol cannot handle, the IETF created TCP.
TRUE
To use your smartphone as a wireless access point today generally will require you to pay a larger monthly fee.
TRUE
When a network mask is applied to any IP address on the network, the result is the IP address' network part followed by zeros.
TRUE
When a packet arrives, the router should look for matches in ALL rows in the routing table.
TRUE
When the subnet part is made larger, the host part must be smaller.
TRUE
What does it mean that Bluetooth uses one-to-one operation?
There is are only two devices (1:1) connected per single bluetooth connection. However a device can have multiple bluetooth connections.
Passive RFID chips have no batteries. How can they transmit when queried?
They use the power of the near field itself to modulate the near field to send information.
Although such devices as 2.4 GHz cordless phones, microwave ovens, and Bluetooth devices may cause interference problems with802.11b networks in the 2.4 GHz ISM band, they are not a problem with 802.11a.
True
If a wireless client only has two MIMO antennas, an access point with three MIMO antennas will produce better performance than an access point with two MIMO antennas. (True or False)
True
The Federal Communications Commission (FCC) has segmented the 555 MHz of the original U-NII spectrum into four segments or bands.
True
The presence of a client that is distant from the access point reduces the individual throughput of other clients served by that access point. (True or False)
True
Another name for beamforming is having a smart antenna. (True or False)
True.
As a station moves away from an access point, the access point transmits more slowly to it.(True or False)
True.
MIMO allows you to transmit two signals in the same channel. (True or False)
True.
Why would you not want to use high-speed Bluetooth all the time?
Uses too much battery life
Can a Bluetooth device be both a master and a slave simultaneously?
Yes
Can a Bluetooth master have multiple slaves?
Yes, a master can have up to seven slaves simultaneously.
How is the access point used in Wi-Fi Direct?
You do not need Access Points in Wi-Fi direct ( Wi-Fi Direct allows for device-to-device communication, without a centralized network )
What other ad hoc networking protocol is widely used?
Z-Wave
In what radio band or bands does Z-Wave operate?
Z-Wave only operates in the 800/900 MHz ISM bands.
A company has a domain name. What else must it have before it can make a website available to the public?
a DNS server to host its domain name and the website itself
Head End
a central distribution; signals travel out to neighborhoods via optical fiber
Channel Reuse
a channel can be reused in multiple cells so the carrier can serve more customers
E-Line
a site-to-site service; competes directly w/ leased lines but offers other benefits
WAN Core
actual operation of WAN ex. switched networks
NAT ______________.
allows a firm to have more internal IP addresses and provides some security
How long must passphrases be to generate strong pre-shared keys?
at least 20 characters long
Cellsite
building w/ cellular equipment (in each cell)
PSDN Core
carrier Ethernet; switches that forward data
CSU/DSU Interface
changes the signal format
Leased Lines
companies sign contracts w/ carriers; dedicated lines; fast, point-to-point, akways-on connections; physical transmission lines
Wide Area Networks (WANs)
connect different sites within an organization or between organizations
Metropolitan Area Networks (MANs)
connect sites in a city and its suburbs
End Office Switch
connected to each customer
Point of Presence (POP)
connects the different sites to the PSDN core
Mobile Telephone Switching Office (MTSO)
controls cell sites & connects mobiles to the PTSN
Public Switched Data Network (PSDN)
different sites that are associated w/ points (POP)
Asymmetric Digital Subscriber Line (DSL)
downstream data is faster & the upstream data is slower, that's why it is asymmetric
Ping is for ________ messages
error advisory
E-LAN
essentially extends the LAN to the wide area
Local Area Networks (LANs)
exist within a company's site
Carrier Ethernet
extends site Ethernet LANs to the corporation (Layer 2)
Coaxial Cable
from neighborhood splitters, signals travel through this
Cell
geographical region
Handoff
if you travel between cells, you will be handed off to a new cell site in the new cell
Speed Agility
increased in speed can be provisioned rapidly
Software Defined Networking (SDN)
may permit a vast expansion in our ability to manage entire corporate networks
What kind of network is Zigbee used for?
network of IoT devices
Corporate WANs
offer the required QoS; mostly for transmission between a corporation's sites
Fractional T1
offered by carriers
The Public Switched Telephone Network (PSTN)
old telephone lines that are already installed; modified hierarchy w/ the possibility of bypass lines
Fiber to the Home (FTTH)
running optical fiber from the end office switch to residential households
Splitter
separates the data signal & the voice signal
DSL Access Multiplexer (DSLAM)
similar to the splitter; data goes to data WAN & voice goes to PTSN
One-Pair Voice-Grade (1PVG) UTP
single unshielded pair was created for voice, not data
Application Program Interfaces (APIs)
standards are implemented through this
Multiprotocol Label Switching (MPLS)
strong traffic for high QoS; routers identify the best route for a range of IP addresses before sending data
At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master?
the Bluetooth headset
What Bluetooth profile would you use for a game joystick, based on information in the text?
the Human Interface Device (HID) Profile ( the same one used for mice and keyboards ).
Drop Cable
the access line to individual homes is a thin coaxial cable called this
An advantage of using DHCP to configure clients is that ________.
the configuration information will be up-to-date
Frame Relay
this and leased line date networks each accounted for about 40% of WAN traffic
Cable Modem Service
two-way data service; popular in the U.S.; not popular in most countries
Synchronous DSL
upstream & downstream speeds are the same
Asynchronous Digital Subscriber Line (ADSL)
uses old phone lines to transport data; 1-pair voice grade UTP; inexpensive
Co-Axial Cable Service
was created to bring television to homes that had poor over-the-air reception; now also offers two-way data service called cable modem service
ATM
was created to replace the core of the public switched telephone network; it offers very high speeds and many expected it to replace Frame Relay as WAN speeds increased
Digital Subscriber Line (DSL)
when the telephone company transmits digital signals over it
Label Switched Path
when two hosts start to converse, an MPLS network first determines the best path for the packets
Customer Premises Equipment (CPE)
your mobile device