BUS4 111 FINAL EXAM
Enhanced Interior Gateway Protocol =
Cisco Systems
The IEEE calls 64-bit interface addresses ________.
Extended Unique Identifiers
A TCP ________ segment is a request to close a connection.
FIN
ADSL offers symmetric service.
False
By regulation, cellular systems must give almost the same throughput at different times during the day.
False
In IP subnet planning, having a large subnet part allows more hosts per subnet.
False
________ is used for supervisory messages at the internet layer.
ICMP
Which has stronger security?
IPsec
___ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm
NAT
What operates on the 13.56 MHz unlicensed service band
Near Field Communication (NFC)
Local loop access lines to business use which of the following transmission media?
Optical Fiber
In 802.11i ________, hosts must know a shared initial key.
PSK mode
Evil Twin Access Attacs can be prevented by
VPN
A company receives its domain name from ________.
a domain registrar
In SNMP, the manager communicates directly with a(n) ________.
agent
WAN optimization devices are deployed ________.
at the ends of leased lines
The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B
both A and B
To deliver an arriving packet to a destination host on a subnet connected to a router, the router needs to know the destination host's ________ before the router can send the packet on to the destination host. A) IP address B) data link layer address C) both A and B
both A and B
Which of the following can be used within a firm? A) private IP addresses B) public IP addresses C) both A and B D) neither A nor B
both A and B
Which of the following is true about NAT? A) It can enhance security. B) It presents problems for some protocols. C) both A and B D) neither A nor B
both A and B
In DNS, a group of resources under the control of an organization is called a ________.
domain
A Rogue access point is typically created by
employees
Express /24 in notation
255.255.255.0
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
32 bits
In IPv6, the interface ID must have ____ bits
64
In an IPv6 global unicast address, the interface ID is ________ bits long.
64
In Bluetooth, a master can have up to ________ slaves at any moment.
7
How many fields are there in an IPv6 address written for human reading?
8
In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
8
Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be?
8
If a firm has many access points, it should use ________ mode in 802.11i.
802.1x
If a reader sees 27: , it means ____
:0027
If there are two or more single-zero felds in sequence, you an shorten this by using
::
A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.
fffe
In IPv6, Groups of bits =
fields
Metropolitan area Ethernet is used primarily ________.
in MANs
Classic Bluetooth and Low Energy are
incompatible
What is the SNMP trap command
indicates abnormal error rate, detection of rogue access point, or dissociate messages that break connections (an attacker is committing a denial-of-service attack)
Signal analysis software
initial site survey must be done of the area to discover any dead spots
After selecting a row on a routing table, a router will send packets out to the ________.
interface
Router connectors are called ________.
interfaces
The routing prefix in IPv6 is like the ________ part in an IPv4 address.
network
The _________ identifies the host's recognized network on the Internet
network part
A border router's main job is to connect different _______.
networks
Master and slave =
piconet
NAT enhances security by ________
preventing sniffers from learning internal IP addresses
In initial planning for access points, it is recommended
provide coverage to all points within the building while reducing overlap as much as possible
Centralized WLAN management's ____________ is the only real way to manage WLAN security.
wireless intrusion detection functionality
In 802.11i pre-shared key mode, the passphrase must be at least ________________ long to generate a strong pre-shared key
20 characters
A mask has ________ bits.
32
IPv4 addresses are
32 bits long
For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access?
3G
HSPA+ is a ________ service.
3g
Which 802 working group created 802.11i?
802.11
The 802.11i was created by the _________
802.11 Working Group
What is the strongest security protocol for 802.11 today?
802.11i
The real work of authentication is done by the ________
802.1X authentication server
The _______________________ was created for corporations with many access points (strong but complex to implement)
802.1X initial authentication mode
In ADSL, the residential customer needs a(n) ________.
ADSL modem
These devices are involved in the 802.1X Initial Authentication Mode:
Access Point and Central 802.1X authentication server
A rogue access point ________. A) is an unauthorized internal access point B) often has very poor security C) often operates at high power D) All of the above are true.
All of the above are true.
An mobile telephone switching office (MTSO)
controls cellsites in a cellular system and links mobile users to wired telephone customers
Two-way amplifiers are needed for cable ________ service
data
802.1X authentication server checks against _________
database
The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________.
destination host
After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.
different session keys
A VPN provides
end-to-end security
ISPs are recognized organizations but not __________.
end-user organizations
Internet Control message Protocol (ICMP)
error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.
Classic Bluetooth has Two data rates
extended data rate speed of 2 Mbps and high speed rate of 24 Mbps
Compared to ADSL service, cable modem traditionally has been ________.
faster and more expensive
In NAT, the ________ creates new external source IP addresses and port numbers.
firewall
One-bit fields are called ________ fields.
flag
A firm uses a PSDN. It has four sites. How many leased lines will it need?
four
Near Field Communication (NFC)
has Low speeds of 434 kbps
For human reading, IPv6 address is written in ________ notation.
hexadecimal
Which form of Bluetooth has a typical transmission speed of about 24 Mbps?
high-speed bluetooth
The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.
higher cost
To use a leased line, the customer must have a(n) ________ at each site.
CSU/DSU
Which of the following does the carrier NOT own?
Customer Premises Equipment
The _______ specifies a particular host in a subnet.
host part
The part of an IPv6 global unicast address that designates the host is called the ________.
interface ID
By using NAT, firms can have many more _____________________
internal IP addresses than its ISP provides it
TCP/IP dominates the work of network professionals at the
internet and transport layers
In VPNs designed to frustrate evil twin attacks, the shared secret ________.
is not transmitted
A man-in-the-middle is difficult to detect because
it is transparent to both the wireless client and the access point
802.11i provides only
link security
A WAN is a network that ________.
links different sites together
A WAN is the network that ________.
links different sites together
All hex symbols are in
lowercase
When the NAT firewall at the border receives the packet, it __________.
makes up a new row.
Routers usually are connected in a ________ topology.
mesh
Routers can have ________ rows
multiple
Routers can take _____ paths
multiple
Radio frequency ID (RFID) has
no power at all and uses power of near field
Evil Twin Access Points are typically
notebook computers, has software to impersonate a real access point and operates at a high power
Which of the following would be an SNMP object?
number of rows in routing table and system uptime (since last reboot)
Ethernet switch can only take ____ path
one
Carrier access lines to residential buildings typically use ________.
one-pair voice-grade UTP
What transmission medium do ALL DSL services use?
one-pair voice-grade UTP
SONET/SDH lines use ________.
optical fiber
Ethernet standards are specified at the ________ layer(s).
physical and data link
Bluetooth always uses ______________ between a pair of devices
point-to-point communication
Leased lines are ________.
point-to-point lines
The __________________________ was created for homes with a single access router
pre-shared Key (PSK) Initial authentication mode
Access points and wireless hosts need to know the same ________________ for initial authentication
pre-shared session key
Anyone who knows the _________ can authenticate himself/herself to the access point
pre-shared session key
Traffic shaping reduces traffic by ________.
preventing certain undesirable traffic from entering the network and limiting the amount of certain undesirable traffic entering the network
A LAN is a network that ________.
provides service within a site
NAT __________________________
provides some security and allows a firm to have more internal addresses
The use of virtual circuits ________.
reduces costs
The highest-level DNS servers are called ________.
root servers
The total length of ____ and _______ is 64 bits
routing prefix and subnet ID
In the IPv6, there are three parts:
routing prefix, subnet ID, and interface ID
For 100,000 addresses, which will have fewer rows? A) a routing table B) an Ethernet switching table C) both will be about the same length.
routing table
Most corporations wish to have ________ domain names.
second-level
TCP messages are called ________.
segments
Zigbee ad-hoc wireless network is
self-organizing ; no need to create a complex design in the beginning and network adapts automatically to changes
The next time a client authenticates itself, it will receive a different ___________.
session key
all host IPv4 addresses from the same network ____________
share the same network
An attacker may be able to install a/an ________ beyond the corporation's NAT firewall. The ________ will be able to read all packets coming out of the firm.
sniff program
In ADSL, the customer should have ________
splitters and an ADSL modem
Open Shortest Path First (OSPF) offers
strong security and only does TCP/IP routing
The prefix-length in IPv6 is the equivalent of the _____________________
subnet mask in IPv4.
An internal router only connects different ______ within a network
subnets
Most large organizations further divide their network into smaller units called _________
subnets
LAN speeds are faster than WAN speeds. This is because of ________.
technological limitations
Using the Internet as a WAN is attractive because of ________.
the Internet's low cost per bit
The larger # of subnets, _______________
the fewer hosts there can be
Passive RFID chips are powered by ________.
the scanning unit
In 802.1X Initial Authentication Mode Operation, the wireless client is _____
the supplicant
The 802.11i standard protects communication between ____________
the wireless access point and wireless clients.
".com" is a ________.
top-level domain
".edu" is a ________.
top-level domain
Client PCs must have digital certificates in ________.
transport mode
If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).
two
Low-speed leased lines use ________ transmission lines to the customer premises.
two-pair data-grade UTP
After authentication using the pre-shared key, the wireless access point gives each authenticated device a new __________________ to use while communicating with the access point subsequently.
unshared pairwise session key
DSL offers ________.
voice transmission and data transmission
Which is a problem with IPv4 addresses?
we have ran out of them
________ is a general naming system for the Internet.
DNS
For ADSL service, which of the following typically must be added to the telephone system?
DSLAM
___________________ is not in the Internet Protocol
Decision Caching
Router first finds row with matching
Destination IP
Part of WPS weakness is caused by ________.
Dividing the 8 digit PIN into two 4 digit halves
A/An ____________ is located outside corporate's premises but connects through an unsecure access point within the site
Drive-By-Hacker
In ________, switching decisions are based on destination addresses.
Ethernet
Routers need fewer rows than
Ethernet Switch
____________ will establish a secure 802.11i connection with the wireless victim client (Security Connection 1) and uses Key Client- ET (VC-ET) for encryption
Evil Twin Access Points
____________ is a man-in-the-middle attack in which the evil twin intercepts traffic passing between a wireless host and a legitimate access point
Evil Twin Attack
Bluetooth Low Energy
Extremely low energy output Similar to classic but reduced power consumption Work for small classes like light switches
IF access points are placed too far,
Hosts far must drop lower transmission speeds (frames take longer to send and receive)
Which of the following standards permits central management?
IPsec
In IPv6, which of the three are fixed: routing prefix, subnet ID, and interface ID
Interface ID
In routers, ports are called
Interfaces
How does carrier Ethernet differ from traditional Ethernet?
It is offered by carriers instead of being installed and managed by the company using it and It is for MAN and WAN services.
IF access points are placed too closely, ____
It will increase co-channel interference (bad)
A company has more control over its ________ technology.
LAN
A network that runs on the customer premises is a ________.
LAN
Switched network and wireless networks =
Layer 1 and Layer 2
Which of the following usually offers higher speeds?
MANs
Which of the following is the most expensive to use?
MPLS (Multiprotocol Label Switching)
To prevent risks, companies uses ___ which uses external IP addresses that are different from internal IP addresses used within the firm
NAT
In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) Both A and B D) Neither A nor B
Neither A nor B
In IPv4, what are the three parts:
Network, Subnet, Host
___________ are unauthorized access points setup within a firm by an employee or department.
Rogue Access Points
Fiber to the home service is normally created by ________.
Running optical fiber to neighborhoods
Which is less expensive to implement?
SSL/TLS
In SNMP, companies are often reluctant to use ________ commands because of security dangers.
Set
What is Bluetooth
Short-range radio technology designed for personal area networks (PANs)
Which of the following are more widely used?
T1 lines
To prevent packets being misaddressed and being circulated endlessly to nonexistent destinations, the ____________ was created
Time to Live (TTL) Field
DSL throughput is typically sensitive to distance from the nearest switching building.
True
IPv6 has a number of known security weaknesses.
True
Some smart phones can act as wireless access points.
True
To use your smartphone as a wireless access point today generally will require you to pay a larger monthly fee.
True
When the subnet part is made larger, the host part must be smaller.
True
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
VPNs
The Internet is a ________.
WAN
Which of the following has more diversity in technologies?
WANs
Another name for 802.11i is
WPA2
What offers strong security?
WPA2
Service quality issues with the Internet can be addressed by using ________.
a single ISP
Dividing an organization's network into subnets allows it to be connected to the Internet with ________________
a single shared network address.
Combining multiple WAN technologies into a collectively managed system is called having ________.
a virtual WAN
Which of the following is a risk in 802.11i PSK mode? A) WPS can easily be cracked if it is used. B) Unauthorized sharing of the pre-shared key. C) A weak passphrase may be selected. D) all of the above
all of the above
IPsec protects ________ layer messages.
application
In a network mask, the bits in the network part of the mask ______________
are 1s, and the remaining bits are 0s
In a subnet mask, the bits of both the network and the subnet parts
are 1s, and the remaining bits are 0s.
Which of the following affects what cellular throughput an individual user will receive?
being in a moving car and being far from the cellsite
In tunnel mode, IPsec provides protection ________.
between IPsec servers
IP is reliable because of ________. A) echo and echo reply messages B) error advisement messages C) both A and B D) neither A nor B
both A and B
Near Field Communication (NFC)
cannot transfer much information
Which of the following receive rights of way for transmission beyond sites?
carriers
In cellular technology, a ________ is a small geographical area.
cell
A router might _____________ the decision it made for a destination IPv4 address
cheat or cache (remember)
For their transmission medium, cable television companies primarily use ________.
coaxial cable
A network on the Internet is a/an
collection of routers and data links owned by a recognized organization
NFC (Near Field Communication) chip can be used for
communication
Exterior Dynamic Protocol
communication outside organization's network
Companies use carriers for WAN transmission because ________.
companies lack right of way
The first step in the routing process involves ________.
comparing the packet's destination IP address to all rows
How many is in 255.255.255.0?
/24
A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________.
0
Ethernet Switching Table can only have
1 row
Which of the following already runs to nearly all customer premises?
1-pair VG UTP.
To support NAT, the IANA has created three sets of private IP address ranges that can only be used within firms:
10.x.x.x 192.168.x.x 172.16.x.x through 173.31.x.x.
How many bits are in total in IPv6
128
How many DNS root servers are there?
13
The Network has ______ IP 8-bit addresses
2
Network part in IPv4 has ________
2 bytes
If your subnet part is 8 bits long, you can have ________ subnets.
254
What are PANs
small groups of devices in a communication bubble around a person's desk or body
In a telephone system, the lines that connect customers to the nearest switch are called ________.
the local loop
Bluetooth is standardized by the ________.
Bluetooth Special Interest Group
In the United States, to get a speed of at least 2.5 Mbps, you would use a/an
Bonded T1s
An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) Both A and B
Both A and B
Label-switching routers provide ________. A) lower cost B) the ability to do traffic engineering C) Both A and B
Both A and B
Leased line switched WANs typically use ________. A) leased lines B) a router at each site C) Both A and B
Both A and B
Which of the following go from one customer site to another customer site? A) Leased lines. B) Access lines. C) Both A and B
Both A and B
Why is metro Ethernet popular? A) Familiarity. B) Rapid reprovisioning. C) Both A and B D) Neither A nor B
Both A and B
Which of the following DSL services tend to be symmetric in speed?
Business
Which of the following DSL services usually offers QoS guarantees?
Business