Data Comm 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

​The TCP header ____ field contains a 32-bit value that counts bytes and indicates a packet's data position within the connection.

Sequence Number

​____ involves the continuous download of a compressed audio or video file, which can then be heard or viewed on the user's workstation.

Streaming audio and video

One of the most popular and successful plans currently used by businesses today is the ____.

Systems development life cycle (SDLC)

A ____ service is an all-digital connection that can transfer either voice or data at speeds up to 1.544 Mbps.

T-1

​____ is the most expensive ATM class of service.

Constant bit rate (CBR)

​One of the biggest changes to affect the Internet will be the continuing adoption of a new version of the Internet Protocol, version ____.

IPv6

A(n) ____________________ is a TCP/IP network inside a company that allows employees to access the company's information resources through an Internet-like interface.

Intranet

​____ are permanent direct connections between two specified points.

Tie lines

MPLS on Internet routers and VPNs (virtual private networks) are gaining in popularity in the data network market.

True

One of the inherent problems with protecting a single key is that it means that only one key is used to both encode and decode the message.​

True

One of the most common ways to control access to a system is to require user IDs and passwords.​

True

The File Transfer Protocol, or FTP, was one of the first services offered on the Internet.

True

The Time to Live field indicates how long a particular datagram is allowed to live.

True

The UDP header contains only four fields—Source Port, Destination Port, Length, and Checksum.

True

Types of listserv software include mailserv, majordomo, and almanac.

True

The ____ field of an IP datagram contains the version number of IP being used, just in case a new version becomes available.

Version

​A ____ is a bundle of VCCs that have the same endpoints.

Virtual Path Connection (VPC)

Many certificates conform to the ____ standard.​

X.509

Real-Time Streaming Protocol (RTSP) is a(n) ____ layer protocol.

application

​A(n) ____ connection has a faster downstream transmission speed than its upstream speed.

asymmetric

____________________ is the study of creating and using encryption and decryption techniques.​

cryptography

​The local loop commonly consists of either four or ____ wires.

eight

Perhaps the most common form of protection from unauthorized use of a computer system is the ____.​

password

​____ means that a user calling into a company telephone system provides some form of data by speaking into the telephone, and a database query is performed using this spoken information.

integrated voice recognition and response

____ involves generating system statistics under a controlled environment and then comparing those statistics against known measurements.

Benchmarking

____________________ techniques that observe and record some aspect of the user, such as voiceprints, fingerprints, eyeprints, and faceprints, appear to be the wave of the future to replace passwords.​

Biometric

____________________ lines and tie lines are leased telephone lines that require no dialing.

Call filtering

​____ means that users can specify telephone numbers that are allowed to get through.

Call filtering

In a payback analysis, the ____ values are the running sums of the Time-Adjusted Benefits over all the years.

Cumulative Time-Adjusted Benefits

IP ____________________ is essentially another name for a data packet

Datagram

The ____________________ portion of the URL specifies a particular server at a particular site that contains the requested item.

Domain Name

​The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site.

FTP

All system attacks need a user to open an e-mail or Web page.​

False

Cable modem connections are typically symmetric.

False

The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.​

False

When calculating a computer system benefits, you do not need to include intangible benefits.

False

​Current estimates suggest that there are more than 40 million hosts (computer sites that store and deliver Web pages) connected to the Internet.

False

​Subscriber loops usually transmit digital signals, which require amplifiers every few kilometers.

False

​The Internet recognizes URLs directly.

False

____ cable represented a major improvement in the ability of transmission media to secure sensitive data.​

Fiber-optic

_________________________ allows a user to see if people are currently logged in on the network and, if they are, to send them short messages in real time.

IM

The ____________________ provides a connectionless data transfer service over heterogeneous networks by passing and routing IP datagrams.

IP

​____ is the capability of a network server to transmit a data stream to more than one host at a time.

IP multicasting

____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer.

IPsec

____ is a set of protocols created to support the secure transfer of data at the IP layer.​

IPsec (IP security)

​The practice of making telephone calls over the Internet has had a number of different names, including packet voice, voice over packet, voice over the Internet, Internet telephony, and ____.

Voice over IP (VoIP)

The TCP header ____________________ field contains a sliding window value that provides flow control between the two endpoints.

Window

​The ____ allows the customer to exceed the committed information rate by a fixed amount for brief moments of time.

burst rate

A(n) ____________________ is a high-speed communications service that allows high-speed access to wide area networks such as the Internet via a cable television connection.

cable modem

​A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company's central (local) office are offered to business users, so that they don't need to purchase their own facilities.

central office exchange service

_________________________ bombard a computer site with so many messages that the site is incapable of performing its normal duties.​

denial of service attacks

A(n) ____ is the computer program that converts plaintext into an enciphered form.​

encryption algorithm

A packet filter firewall is a computer running proxy server software, whose function is much like that of a librarian who controls access to books in a library's rare books room.​

false

Baseline studies are most effective when they are initiated during a time when the network is experiencing severe problems

false

Expensive computer systems should always be placed in the basements of buildings.​

false

WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).​

false

A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file.​

file infector

A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.​

monoalphabetic

The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers.​

packet filter

When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password, the type of attack is termed ____________________.​

phishing

A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.​

ping

____ scanning works by recognizing the unique pattern of a virus.​

signature-based

A(n) ____________________ is a precise identification of a particular application on a particular device.

socket

When no splitter is used to separate the DSL signal from the POTS signal, then the service is called ____.

splitterless DSL

If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.​

spoofing

____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth.​

spread spectrum

____ may be considered a form of physical protection.​

surveillance

The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt.​

symmetric

A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.​

true

It is possible to become certified on a particular type of network operating system.

true

The two leading attack methods for the last few years have been socially engineered attacks and exploited known vulnerabilities in operating systems and in application software.​

true

​A(n) ____________________ does not have a telephone number associated with it, because it can carry hundreds of voice and data channels.

trunk

A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.​

virus

A computer ____________________ is a program that copies itself from one system to another over a network, without the assistance of a human being.​

worm

​____ is a popular format that transmits the downstream data at a faster rate than the upstream rate.

ADSL

The Hypertext Transfer Protocol, or HTTP, is a transport layer protocol.

False

When the user wants to send an e-mail message, the e-mail program takes the e-mail message and passes it to the transport layer of the software.

True

​Only two wires are required to complete a telephone circuit.

True

​Telephone systems were originally designed to transmit the human voice.

True

​____ is capable of sending traffic that may experience bursts of data, but there are no promises as to when the data may be sent.

Unspecified bit rate (UBR)

​When a VCC transmits user-to-network control signaling, the connection is called the _________________________.

User-Network Interface

​The ____ standard is a 56,000-bps dial-up modem standard approved by a standards-making organization rather than a single company.

V.90

​The ATM _________________________ class of service is used for traffic that may experience bursts of data, and whose bandwidth range is roughly known, such as that of a corporate collection of leased lines.

ABR

During the late 1960s, a branch of the U.S. government titled the ____ created one of the country's first wide area packet-switched networks.

Advanced Research Projects Agency (ARPA)

​In the older classful addressing scheme of IP addresses, how many class A addresses existed?

128

​Given the IPv4 address 162.48.128.0/24, how many addresses are available for the hosts?

256

IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.​

802.11i

​A(n) ___________________________________ is a geographic area such as a large metropolitan area or part of a large state and determines whether a telephone call is local or long distance.

LATA

​After the 1984's Modified Final Judgment, the local telephone companies became known as ______________________________.

LECs

In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____.

MILNET

​_______________ is the term for the convergence of real-time and non-real-time communications services such as telephony, instant messaging, video conferencing, speech recognition, voice mail, and email into a single interface.

Unified communications

____ are used to select unique documents from anywhere in the world.

Uniform Resource Locators (URLs)

____ analysis is a common financial analysis technique that involves determining a proposed system's costs and benefits.

Payback

A mobile malicious code is also known as ____________________ because it is hiding inside a harmless-looking piece of code.​

Trojan Horse

A company that wishes to have its own in-house telephone system will often buy or lease a PBX.

True

An asymmetric service is useful for an Internet connection in which the bulk of the traffic comes down from the Internet to the workstation.

True

Convergence has had a particularly noticeable impact on the telecommunications market.

True

Frame relay was originally designed and used to transfer packets of data between two sites more cost effectively than leased lines could.

True

HTML pages are simple, static text documents that browsers read, interpret, and display on the screen.

True


संबंधित स्टडी सेट्स

Cardiovascular NCLEX-PN 6th Edition

View Set

Personal and Family Finance-Chapter 6

View Set

Taxes, Retirement, and other Insurance Concepts QUIZ

View Set

Term 2 Chem 1120 Chapter 3&4 Review

View Set