Exam 2 IST 220

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

B) binds a public key (certificate) to an entity (user)

1. A certificate authority (CA) A) keeps copies of the private keys of all entities (users) B) binds a public key (certificate) to an entity (user) C) publishes the private keys of all entities (users) D) gives each pair of users wishing to communicate a private key they can use as a session key

D) is a new protocol to translate data between systems of different types

1. ASN.1 A) is based on the X.25 protocol, much like Windows Active Directory B) completely replaces SNMP C) is Asynchronous System Nomenclature D) is a new protocol to translate data between systems of different types

C) resolve the problems of streaming stored content out to lots of simultaneous users by using distributed servers

1. Content distribution networks A) resolve the issue of network consumption by using a peer-to-peer approach B) resolve the issue of network bandwidth by using UDP instead of TCP C) resolve the problems of streaming stored content out to lots of simultaneous users by using distributed servers D) resolve the issue of serving videos across the network with geographically centralized servers

D) object types in a module

10. The SNMP MIB is a collection of A) host systems in a network B) users in a domain C) IP addresses in a subnet D) object types in a module

AES

128 bit blocks 128, 192, 256 bit keys

A) isolates an organization's internal network from the larger internet

2. A firewall A) isolates an organization's internal network from the larger internet B) never allows packets to flow outward unless they are requested from the outside network C) always allows packets to flow inward D) is all that is ever needed for a secure network

A) hosts communicate only to the base station (wireless AP)

2. In an infrastructure mode wireless network A) hosts communicate only to the base station (wireless AP) B) hosts communicate to each other directly C) hosts route amongst themselves D) hosts transmit to the central router

C) SNMP can be secured with DES

2. Regarding SNMP security A) SNMP can be secured with WPA2 B) SNMP cannot be secured C) SNMP can be secured with DES D) SNMP can be secured with quadruple DES (4DES)

C) is a protocol standard for real-time telephony over the Internet

2. The SIP protocol A) allows bandwidth consumption in small amounts, like SIPping coffee B) has the vision of people being represented by IP addresses or telephone numbers instead of names or email addresses C) is a protocol standard for real-time telephony over the Internet D) requires the caller to be on a wired internet connection with a static IP address

802.11b

2.4-5 GHz 11 MBpS Indoor: 10-30 m

802.11n antenna

2.4-5 GHz 200 MBpS Indoor: 10-30m

802.11g

2.4-5 GHz 54 MBpS All: 10m-200km

A) mathematical methods that are impossible to crack without long periods of time

3. A modern crypto system relies on A) mathematical methods that are impossible to crack without long periods of time B) a secret code that only the sender and receiver know C) Bob and Alice not sharing their passwords D) Trudy being dumb

D) but UDP is often blocked by default firewall configuration for security reasons

3. Multimedia networking generally uses the UDP protocol A) this increases playout delay which decreases network jitter B) this makes the video and audio streaming faster C) because UDP means Un-Delayed Protocol D) but UDP is often blocked by default firewall configuration for security reasons

A) informs a manager of an event

3. The SNMP Trap A) informs a manager of an event B) is a message from a manager to an agent setting a value C) is a message from an agent to a manager setting a value D) is a message from a manager to an agent asking for a value

C) all of the answers here are valid

3. Wireless links are different from wired links A) wireless signals can reflect off of the ground and other objects B) they have decrease signal strength over distance and through matter C) all of the answers here are valid D) the suffer from interference from other wireless noise generators

A) nodes communicate to other nodes directly

4. In ad-hoc mode A) nodes communicate to other nodes directly B) nodes can transmit to any other node in the network, including ones that are beyond their communications link range C) nodes need a router to determine the route to other nodes D) network nodes need a base station to communicate

D) a management console to which managed devices report

4. In terms of network management, a managing entity is A) The head of the IT department B) a host computer like a workstation or laptop C) a network device like a router or switch D) a management console to which managed devices report

A) conduct deep packet inspection to alert on potentially harmful traffic

4. Intrusion detection systems A) conduct deep packet inspection to alert on potentially harmful traffic B) often result in "false alerts" that require system administrators to investigate C) operate on the TCP/IP headers only D) take corrective action to prevent malware from infecting routers

D) bursty data traffic can interfere with multimedia traffic, even if the multimedia only needs a very small amount of bandwidth

4. When combining mutlimedia over a network A) the network will automatically prefer data traffic over multimedia traffic B) bursty data traffic will wait, allowing any multimedia traffic to go first C) the network will automatically prefer mutlimedia traffic over data traffic D) bursty data traffic can interfere with multimedia traffic, even if the multimedia only needs a very small amount of bandwidth

802.11a

5-6 GHz 54 MBpS All: 10m-200km

A) the Real Time Protocol (RTP) runs on top of the UDP transport protocol, which determines packet structure, time stamping and sequencing

5. For multimedia On TCP/IP networks, A) the Real Time Protocol (RTP) runs on top of the UDP transport protocol, which determines packet structure, time stamping and sequencing B) bandwidth consumption is managed with a strict quality of service (QoS) algorithm offering CBR and VBR contracts on connections C) there are no protocols available to manage multimedia over TCP/IP D) bandwidth consumption is guaranteed by the Real Time Protocol (RTP) on top of the TCP transport protocol

C) provides a secure API between the application layer and transport layer

5. SSL (Secure Sockets Layer) A) requires the user to enter their special SSL password B) secures the communication at the data-link layer C) provides a secure API between the application layer and transport layer

A) The 802.11 a range uses 2.4 GHz range and up to 11 Mbps

5. The following are correct matches to wifi standards except A) The 802.11 a range uses 2.4 GHz range and up to 11 Mbps B) 802.11b uses 2.4 GHz range and up to 11 Mbps C) 802.11n uses both the 2.4 and 5.5 GHz ranges and combines for up to 200 Mbps D) 802.11a uses the 5.5 GHz range and up to 54 Mbps

A) request/response mode and trap mode

5. Two modes that are used to convey SNMP data A) request/response mode and trap mode B) request mode and response mode C) trap mode and free mode D) sand mode and trap mode

A) 802.11p

6. Personal Area Networks include all except A) 802.11p B) Zigbee C) Bluetooth D) 802.15 networks

C) has a syntax that is defined and defines specific basic data types

6. SMI, as the data definition language of SNMP A) requires the network administrator to be able to speak this language to other network administrators B) requires the use of semi-colons at the end of each statement C) has a syntax that is defined and defines specific basic data types D) can be translated into human languages like Chinese or English

C) variable network delays such as jitter, requiring buffering at the client/receiver end

6. Streaming video has the main issue of A) immediate replay of the data that has been encoded B) reservation of sufficient bandwidth to send the audio stream C) variable network delays such as jitter, requiring buffering at the client/receiver end D) real-time bi-directional audio being played back as echo

C) know Bob or Alice's private key

6. We must assume that Trudy can do all of these except A) evesdrop or intercept messages between Bob and Alice B) hijack or take over a connection between Bob and Alice C) know Bob or Alice's private key D) attempt to impersonate either Bob or Alice

C) are rules configured by network administrators that firewalls use to determine what traffic is allowed

7. Access control lists (ACLs) A) blocks viruses from getting into the network B) prevent malware from infecting computers C) are rules configured by network administrators that firewalls use to determine what traffic is allowed D) prevent all traffic except what is desired

A) 11 channels in the 2.4 to 2.485 GHz spectrum

7. In the United States, 802.11 wireless uses A) 11 channels in the 2.4 to 2.485 GHz spectrum B) 13 channels in the 2.4 to 2.485 GHz spectrum C) 1 channel that covers the entire 2.4 to 2.485 GHz spectrum D) 3 channels in the 2.4 to 2.485 GHz spectrum

C) antivirus and anti-malware applications

7. SNMP contains four (4) key parts. They include all of these below except A) management information base (MIB) B) security, administration capabilities C) antivirus and anti-malware applications D) structure of Management Information (SMI)

D) text messaging and web page downloads (live, real-time texting and data transfer)

7. The following are types of multi-media networking applications except A) streaming, stored audio and video (YouTube, Netflix, Hulu) B) conversational voice/video over IP (Skype, Polycom, H.323) C) streaming live audio, video (live sporting events, live view of security cameras) D) text messaging and web page downloads (live, real-time texting and data transfer)

D) is broadcast in a beacon frame

8. In 802.11, the wireless network SSID A) is provided via DHCP B) is never disclosed to provide network security C) is broadcast only over channel 1 so every host can find it D) is broadcast in a beacon frame

C) a host computer (workstation or laptop) or a network device (router, switch, etc).

8. In terms of network management, a managed device is A) a person like a network administrator B) the software on the management console C) a host computer (workstation or laptop) or a network device (router, switch, etc). D) a management console to which managed devices report

C) need end-to-end delay of <150 ms

8. Voice over IP (VoIP) telephony services A) don't have to worry about 911 services because all 911 centers use VoIP by law B) have to resolve telephone numbers to IP address somehow C) need end-to-end delay of <150 ms D) need end-to-end delay of >400 ms

C) Is a flawed security protocol that was poorly designed

8. WEP (wired equivalency protocol) A) uses a 56 bit key over a 64 bit packet, and encrypts 3 times B) is more secure than the AES standard C) Is a flawed security protocol that was poorly designed D) is better than WPA

D) Uses protocols like IPSec to provide security at the network layer

9. A VPN (Virtual Private Network) A) uses WEP to secure the wireless channel B) requires the user to set up a virtual circuit to the other endpoint C) provides a secure tunnel between a website and a client browser between the application layer and transport layer D) Uses protocols like IPSec to provide security at the network layer

A) a central Skype server handles login and supernodes (SNs) share IP addresses of users

9. For Skype calls A) a central Skype server handles login and supernodes (SNs) share IP addresses of users B) all audio and video goes to a centralized Skype Server C) an open-source protocol is used D) audio and video is sent directly between hosts, who call each other via IP address

D) SNMP - Simple network management protocol

9. The de-facto standard protocol for network management is A) Microsoft Windows B) OSI CMIP - Common Management Information Protocol C) SPNM - Standard Protocol for Network Managment D) SNMP - Simple network management protocol

D) all of the above

9. the following things can interfere with an 802.11 network transmission A) cordless telephone B) microwave oven C) steel and concrete walls D) all of the above

voice over IP

<150 msec good >400 msec bad loss tolerance between 1%-10%

Multi Path Propagation

A problem in wireless where reflection of radio waves off objects creating signal arrival at slightly different times

Wireless access point or cell tower

A wireless base station can include either

44,100

Audio signals are sampled for CD-quality sound at ____ samples per second

400 ms

Bi-directional (conversational) voice/video needs to have a delay no more that _____ milliseconds

Laptops, smart phones, desktop computers

Examples of wireless hosts include

64,000

If a signal is sampled at 8,000 samples per second and uses 256 quantized values, how many bits per second is required to transmit it?

SNMP Request And SNMP Response

In SNMP, if a managing entity REQUIRES a response from a managed device, it should send a _____ and expect a _____

SNMP Trap

In SNMP, there are two kinds of messages. This kind of message is only sent from a managed device to a managing entity when an "exceptional" event has occurred.

Jitter

Jitter is the result of variable network delay

Two 1 Private Key 1 Public Key

Public Key Encryption uses ___ keys per person/entity

One Key used for encryption and decryption

Symmetric Key Encryption uses ___ keys between a sender and receiver that is used for _____

56 bit key 64 bit block of plaintext

The DES encryption standard uses ___ bit key and a ___ bit block

UDP (Transport) And Real-Time Protocol RTP (Application)

The _____ transport layer protocol and _____ application layer protocol are used for real-time multi-media

Confidentiality Integrity Availability

The three goals of security are represented by the letters C-I-A

Signal strength Interference Multipath propagation

These three common issues prevent wireless signal transmission and reception

AES - Advanced Encryption Standard

This encryption standard is a block cipher over a 128 bit plaintext input and can use a 128, 192 or 256 bit key

Network Administrator or Manager

This is a human worker who is in charge of managing a network

Managed device

This is a networked device that sends/receives network management messages

Managing Entity

This is the hardware and software system that is used to communicate network management messages

DASH: dynamic adaptive streaming over HTTP

This multi-media protocol is used to manage audio/video at different bitrates from a streaming media server (like YouTube) using TCP

ASN.I

This protocol is used as a presentation layer between different kinds of SNMP systems

802.11g

This wireless standard has a range of 10-30m and bandwidth of up to 54 Mbps

4G LTE/WiMAX

This wireless standard has a range of up to 20 km and a bandwidth of about 10 Mbps

D) 3G/4G that provides up to 100 Mbps worth of bandwidth

Two types of wireless network technologies include all below except: A) 802.11n that provides up to 200 Mbps worth of bandwidth B) 2G/3G/4G cellular networks that range from 20m-20km C) 802.11 for networks that range from 10-30m D) 3G/4G that provides up to 100 Mbps worth of bandwidth

SIP or H.323

Voice over IP generally uses one of these two protocols

Buffering

____ is the method of storing and delaying playout of audio and video to compensate for network delay and jitter

active scanning

broadcasting a probe frame that will be received by all Aps within range

802.15

evolved from bluetooth specification 2.4-5 Ghz 721 kbps includes Zigbee, Bluetooth and 802.15 networks

analog signal sample rates

telephone: 8,000 samples/sec CD music: 44,100 samples/sec


संबंधित स्टडी सेट्स

TX PACT science 4-8: Domain I & II- Scientific Instruction & Scientific process

View Set

TEST 1 COMBINED ABNORMAL PSYCHOPATHOLOGY

View Set

Anatomy 2 Test 2: Ch 19 Blood Vessels Part 1

View Set

Personal Finacial Statements And Personal Balance Sheets

View Set

Utilisation de tests psychométriques (MEV-3900)

View Set

NCLEX questions: Perioperative Nursing

View Set

Life Insurance Policies part A - 20%

View Set