BUS 441 Exam 1
give an example of a valid EUI-48 address
B2-CC-67-1D-5E-65
which of the following typically uses UDP? a. DNS b. ethernet c. wireless d. HTTP e. TCP
a. DNS
what is the well-known port number for HTTP traffic?
80
the business benefit of multiplexing is ______ a. higher speed b. lower cost c. avoiding the need to send many transmission links through narrow conduits d. security
b. lower cost
compared to priority, overprovisioning capacity can reduce _____ a. equipment loss b. mgmt labor c. neither A or B d. both A and B
b. management labor
ethernet has a Frame Check Sequence Field to check for errors. ethernet is ________ a. reliable b. unreliable c. both reliable and unreliable d. connection-oriented and reliable
b. unreliable
if you see a colleague's username and password on a Post-It note that anyone can see on a monitor, according to the definition, is it hacking if you use this information to log in? a. no b. yes c. we cannot say from the information
b. yes
in a coffee shop hot spot, the rated speed is 10 Mbps. throughput is about half the rated speed. there are 10 people using the hot spot. if you and three others are transmitting or receiving at the same time, what speed should you expect to get? a. 1 Mbps b. 3 Mbps c. 1.25 Mbps d. 10 Mbps
c. 1.25 Mbps
the transport layer on the destination host ______ a. reassembles the app message if it has been fragmented b. removes the transport header c. A and B d. none of these are correct
c. A and B
the mirai bots in the KrebsOnSecurity.com attack were _______ a. client hosts b. cisco routers c. server hosts d. IoT devices
d. IoT devices
Jitter is a problem for ________. a. voice over IP (VoIP) b. streaming media c. VoIP and streaming media d. e-mail
c. VoIP and streaming media
which layer(s) govern(s) transmission through a single network? a. data link b. physical c. data link AND physical d. neither data link or physical
c. data link AND physical
which is NOT in an IP packet? a. internet layer header b. transport layer header c. data link layer header
c. data link layer header
if a host cannot reach a DNS server, it ______ a. will need to use a DHCP server b. cannot have a host name c. is unlikely to be able to communicate with most server hosts d. will have to rely on host names
c. is unlikely to be able to communicate with most server hosts
if there are 10 routers between the source and destination hosts, how many internet layer processes will be involved on all devices? a. 10 b. 1 c. 2 d. 12
d. 12
how long is an IPv4 address?(bits)
32
my computer's physical address (MAC address) uses _____ bits
48
at what layer is the EUI-48 address added to an outgoing message? a. data link b. physical c. internet d. the EUI-48 is not added to a message, only the IP
a. data link
when using TCP, if a destination host does not receive a segment, it will ______ a. do nothing b. transmit an RSND segment c. transmit a NAC segment d. transmit an ACK segment
a. do nothing
in HTTP, which program may initiate communication? a. browser b. webserver program c. both A and B d. neither A or B
a. browser
the source socket is 60.171.18.22:2707. the source is a(n) ____________ a. client b. server c. well-known server d. ephemeral server
a. client
when a packet travels through a network, the time it takes to get from the sender to the receiver is called ______ a. latency b. jitter c. throughput d. output
a. latency
in general, what should an employer do whenever an employee leaves the firm? a. their accounts should be disabled instantly b. they should be given no prior notice that they are being released c. A and B d. their accounts should be disabled after a 30 day grace period
a. their accounts should be disabled instantly AND b. they should be given no prior notice that they are being released
what process adds a header in front of an application message or fragment a. transport b. internet c. application d. data link
a. transport
you accidentally discover that you can get into other e-mail accounts after you have logged in under your account and only spend a few minutes looking at another user's mail. according to the definition, is that hacking? a. yes b. we cannot say from the information given c. no
a. yes
Vulnerability-based attacks that occur before a patch is available are called ________ attacks a. zero-day b. stealth c. indefensible d. malware
a. zero-day
to handle momentary traffic peaks, which would you give higher priority to? a. e-mail b. VoIP c. both e-mail and VoIP d. the apps used most by the execs
b. VoIP (voice over IP)
flooding a host with traffic so that it cannot serve it legitimate users is a ________ attack a. malware b. virus c. DoS d. hacking
c. DoS
how does your computer get its EUI-48 address (MAC address) a. ARP b. DNS c. It is assigned by the manufacturer d. DHCP e. NAT
c. It is assigned by the manufacturer
source and destination port numbers are found in the header fields of __________ a. ethernet frames b. http GET requests c. IP packets d. TCP segments
d. TCP segments
T/F: HTTP is a reliable protocol
false
what process adds a header in front of a TCP segment? a. application b. transport c. data link d. internet
d. internet
which standards layer governs wires and cables? a. all layers govern this b. transport c. internet d. physical
d. physical
DDoS attacks attempt to ______ a. delete files on a computer b. steal info from a computer c. hack a computer d. reduce the availability of a computer
d. reduce the availability of a computer
a frame ends with a special bit called a Frame Check Sequence. what does it do? a. verifies the MAC address is correct b. cycles data across the network c. verifies the IP address is correct d. verifies the data arrived correctly
d. verifies the data arrived correctly
an attacker targets a victim host and learns the IP address of the victim. the attacker then creates an ICMP packet, but spoofs the source IP address to be the victim's. the packet is broadcast to every device on the network causing all devices to respond with a reply to the spoofed IP address. the victim/s computer is then flooded with too much traffic that becomes too slow or unresponsive. what is the name of this attack? a. master ping b. spoofing c. SYN flood d. broadcast e. smurf f. UDP flood
e. smurf
describe the DDoS attack known as a SYN flood
the attacker sends a series of SYN requests to the victim. the victim's system will set aside some memory for the connection, but the attacker will never respond. eventually the victim has no system memory left to answer legitimate requests.
based on HW1, what would you type into your command prompt application to learn about the route from your computer to www.whitehouse.gov?
tracert www.whitehouse.gov
T/F: the internet layer process checks for errors
true -IPv4 uses a header checksum that checks for errors in header -IPv6 does not do this *as written, this question can go either way*