IS 435 FINAL
In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packets IP address. Which row will the router look at first when trying to find matches? 1 47 3497 the default row
1
T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps
1 Mbps
Which of the following already runs to nearly all customer premises? A) 4-pair UTP B) 1-pair VG UTP C) 1-pair DG UTP D) none of the above
1 pair VG UTP
Many "T1" lines that carriers provide today use ________ in the local loop. A) 1-pair voice-grade UTP B) 2-pair voice-grade UTP C) 1-pair data-grade UTP D) 2-pair data-grade UTP
1 pair voice grade UTP
If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef 2001:::fe::::cdef 2001::fe::::cdef
2001:::fe::::cdef
In the Mask 255.255.255.0 how many 1s are there? 8 16 24 Cant say
24
Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. Which row will the router choose if both are matches? 2707 4400 either The default row
2707
According to the principle of defense in depth, antivirus filtering should be done in at least ________ location(s). A) 1 B) 2 C) 3 D) 4
3
What speed does the LTE Advanced standard require downstream? A) 3 Mbps B) 30 Mbps C) 3 Gbps D) 30 Gbps
3 GBPS
A firm uses a PSDN. It has four sites. How many leased lines will it need? A) 0 B) 1 C) 4 D) none of the above
4
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A) 3 B) 4 C) 88 D) 91
4
Most end-office switches are Class ________ switches. A) 1 B) 2 C) 3 D) 5
5
The new version of the internet protocol that is coming into use is IP version _____ 1 2 4 6
6
Your firm has an 8 bit network part. If you need at least 250 subnets, what must your subnet part size be? 5 6 7 8
8
In what ode of 802.11i operation is a central authentication server used? 802.1X mode PSK mode Both Neither
802.1X
In caching, ________. A) a message may not have to be transmitted B) messages are cached at the transmitting end of the line C) both A and B D) neither A nor B
A message may not have to be transmitted
In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B
ADSL modem
The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture
AN application architecture
Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) quality of service D) all of the above
All of the above
Which of the following is a risk in 802.11i PSK mode? WPS can easily be cracked if its used Unauthorized sharing of the preshared key A weak passphrase may be selected All of the above
All of the above
A router's load-balancing process is determined by ________. A) the SDN controller B) an SDN application C) the router D) any of the above
An SDN application
In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above
Before the packet arrives
The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power. A) BitTorrent B) client/server C) both A and B D) neither A nor B
BitTorrent
Which of the following was created for PANs? 802.11 Bluetooth Both neither
Bluetooth
To connect two sites at 2.8 Mbps, I would use ________. A) a T1 line B) bonded T1 lines C) a T2 line D) a T3 line
Bonded T1 lines
802.11i provides _______ confidentiality message integrity both neither
Both
A media gateway translates ________ transmissions. A) signaling B) transport C) both A and B D) neither A nor B
Both
An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B
Both
Antivirus software checks e-mail attachments for ________. A) viruses B) Trojan horses C) both A and B D) neither A nor B
Both
DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B
Both
Forwarding functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B
Both
In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) both A and B D) neither A nor B
Both
SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B
Both
Speech codecs vary with respect to ________. A) compression B) voice quality C) both A and B D) neither A nor B
Both
The SIP invite is transmitted to the ________. A) called party's SIP proxy server B) called party's VoIP phone or computer C) both A and B D) neither A nor B
Both
The domain name system ________ a way to find a host IP addresses if your computer only knows the hosts host name general naming system for the internet both neither
Both
Traffic shaping ________. A) limits the amount of some types of traffic B) does not admit some types of traffic C) both A and B D) neither A nor B
Both
WAN optimization provides ________. A) network protocol acceleration B) caching C) both A and B D) neither A nor B
Both
Which of the following affects what throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B
Both
Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B
Both
Which of the following is a security risk associated with BitTorrent? A) danger caused by opening ports on the firewall B) danger that an employee may download an infected file that cannot be rejected by filtering C) both A and B D) neither A nor B
Both
Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B
Both
Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B
Both
Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B
Business
Which of the following DSL services usually offers QoS guarantees? A) residential B) business C) both A and B D) neither A nor B
Business
Two-way amplifiers are needed for cable ________ service. A) television B) data C) both A and B D) neither A nor B
Data
After two wireless clients authenticate themselves via PSK to an access point, they will use _______ to communicate with the access point. preshared key 802.1X key WPS keys different session keys
Different session keys
In Skype, ________ is the process where a Skype application looks up the username and IP address of the party it wants to contact. A) login B) directory search C) transport D) signaling
Directory search
In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B
E-Line
LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons
Economic reasons
LANs are ________. A) single networks B) local internets C) either A or B D) neither A nor B
Either A or B
WANs are ________. A) single networks B) internets C) either A or B D) neither A nor B
Either A or B
A traditional e-mail user retrieving messages from his or her mail server could use ________. A) IMAP standard B) POP standard C) either IMAP or POP standard D) SMTP standard
Either IMAP or POP standard
A media gateway connects a client computer or VoIP phone to the VoIP network. TRUE/FALSE
FALSE
If companies place antivirus software on all of their client PCs, this will stop almost all virus infections. TRUE/FALSE
FALSE
Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software. TRUE/FALSE
FALSE
A TCP _______ segment is a request to close a connection. FIN ACK Close Disconnect
FIN
Leased lines offer ________ service. A) fast B) any-to-any C) rapid-connection D) none of the above
Fast
Compared to ADSL service, cable modem service typically is ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive
Faster and more expensive
In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B
First label switching
Skype offers ________. A) free calling among Skype customers B) free calling to and from Public Switched Telephone Network customers C) both A and B D) neither A nor B
Free calling among skype customers
Which of the following is used to define webpage bodies? A) HTTP B) HTML C) both A and B D) neither A nor B
HTML
Which of the following is used to retrieve Web pages? A) HTTP B) HTML C) RTP D) SQL
HTTP
The network part of a n IPv4 address is ______ bits long. 8 16 32 Hard to say
Hard to say
The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B
Higher speed
In BitTorrent, a(n) ________ website is a site the BitTorrent client program goes to in order to get .torrent files. A) swarm B) index C) tracker D) none of the above
Index
BitTorrent's .torrent files are stored on the ________. A) swarm B) index server C) tracker D) individual peers
Index server
The part of an IPv6 global unicast address that designates the host is called the _______ Host part interface ID routing prefix None
Interface ID
Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B
Internet
RTP supports ________. A) faster transmission speed B) jitter control C) both A and B D) neither A nor B
Jitter control
A company has more control over its ________ technology. A) LAN B) WAN
LAN
A network that runs on the customer premises is a ________. A) LAN B) WAN C) both A and B D) neither A nor B
LAN
Which of the following usually offers higher speeds? A) LANs B) WANs C) Both A and B are about equal in typical speeds.
LANs
Today's dominant cellular technology is ________. A) LTE B) 3G C) HSPA+ D) MTSO
LTE
MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B
Label number
In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path
Label switch path
Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B
Leased lines
A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above
Links different sites together
In the telephone system, the lines that connect customers to the nearest switch are called the ________. A) access lines B) local lines C) access loop D) local loop
Local loop
Which of the following steps are done in order during a call with Skype? A) login, signaling, transport B) signaling, transport, end a call C) login, signaling, end a call D) none of the above
Login, signaling, transport
The PSN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop
Modified hierarchy
In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) both A and B D) neither A nor B
Neither
In a network mask, the 1s correspond to the ______. network part subnet part host part None
Network part
In the mask /14, how many 1s are there? 8 16 24 None
None
Which is the correct formula for decibels? 10*PS/P1 10*(P2/P1)2 Log10(P2/P1) None
None
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A) 1 B) 2 C) 3 D) none of the above
None of the above
Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
Northbound API's
Wireless LAN standards come from ______ OSI TCP/IP Both Neither
OSI
______ is an interior dynamic routing protocol. OSPF BGP Both Neither
OSPF
Which of the following provides end-to-end encryption? A) SSL/TLS B) PGP C) both A and B D) neither A nor B
PGP
A customer's leased line to its ISP connects to the ISP's ________. A) POP B) NAP C) CSU/DSU D) interface
POP
In a PSDN, customers connect to the network core at ________. A) NAPs B) public/private access points C) POPs D) DSLAMs
POP's
In 802.11i ______ hosts must know a shared initial key. 802.1X mode PSK mode Both Neither
PSK
Transient client presence tends to be a problem in ________. A) P2P applications B) client/server applications C) both A and B D) neither A nor B
PSP applications
A LAN is the network that ________. A) links different sites together B) provides service within a company C) provides service within a site D) all of the above
Provides service within a company.
Which of the following is NOT one of the main elements of the Skype network? A) login server B) proxy server C) host node D) super node
Proxy server
Which of the following segments is not acknowledged? FIN RST Both Neither
RST
Codec data comes after the ________ header in VoIP transport frames. A) IP B) TCP C) UDP D) RTP
RTP
MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces
Reduces
SDN ________. A) reduces CapEx B) increases OPEx C) both A and B D) neither A nor B
Reduces CapEx
An unauthorized internal access point is an _________ access point. Evil twin rogue shadow counterfeit
Rogue
Having all privileges on a computer is known as having ________. A) access B) omniscience C) root privileges D) mojo
Root privileges
A _____ must find the best matching row in its _____ table comparing multiple row matches. Ethernet switch, switching router, routing both neither
Router, routing
Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) both A and B D) neither A nor B
Running optical fiber to neighborhoods
The highest layer in SDN consists of ________. A) switches B) routers C) the SDN controller D) SDN applications
SDN applications
Which of the following is a processor-sharing application? A) BitTorrent B) SETI@home C) SIP D) Skype
SETI@home
Which of the following signaling standards is likely to dominate in VoIP? A) SIP B) H.323
SIP
SIP is a ________ protocol for VoIP. A) signaling B) transport C) both A and B D) neither A nor B
SIgnaling
Mail servers communicate with each other by using ________. A) POP B) HTTP C) RFC 2822 D) SMTP
SMTP
A traditional e-mail user sending messages to his or her mail server would most likely use ________. A) IMAP standard B) POP standard C) either IMAP or POP standard D) SMTP standard
SMTP standard
In XSS, the malicious script that gets placed in a webpage sent to a target is ________. A) created by a Trojan horse B) sent by someone who has compromised the webserver C) embedded in a database the user queries D) sent by a user
Sent by the user
Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above
Service for more customers
OpenFlow can be used to standardize ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
Southbound API's
Which element of the Skype network is in charge of signaling? A) the login server B) host nodes C) super nodes D) media gateways
Super nodes
In BitTorrent, the group of all connected computers that have all or part of the file to be downloaded is called the ________. A) swarm B) index peers C) trackers D) none of the above
Swarm
Which element of the Skype network is in charge of transport? A) the login server B) the calling and called host nodes C) super nodes D) media gateways
THe calling and called host nodes
Most P2P applications use servers. TRUE/FALSE
TRUE
In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manage
The SDN controller
IPsec protects ______ layer messages data link applicaiton both neither
application
For human reading, IPv6 fields are spearated by ______ dashes slashes colons None
colons
The first step in the routing process involves _____ selecting the best match row comparing the packets destination IP address to all rows comparing the packets destinatino IP address to matching rows selecting an interface
comparing the packets destination IP address to all rows
Pinging is to send ICMP ______ messages to the target host echo request error advisement ping echo
echo request
Which of the following is usually set up by a hacker outside the building? Rogue access point evil twin access point both neither
evil twin access point
Compared to normal routing, decision chaching is ______ faster less dangerous Both
faster
After selecting a row on a routing table, a router will send packets out to the ______ port socket interface plug
interface
Router connectors are called ________. sockets plugs interfaces ports
interfaces
Routers usually are connected in a ______ topology. Point to point mesh hierarchical bus
mesh
What transmission medium do ALL DSL services use? A) one-pair data-grade UTP B) two-pair data-grade UTP C) one-pair voice-grade UTP D) all of the above
one pair voice grad UTP
RFC 822 and RFC 2822 standards govern ________. A) plain text content of e-mail messages B) HTTP page contents C) HTML page contents D) pages written in any language
plain text content of email messages
The main promise of VoIP is to ________. A) add video B) improve voice quality C) improve reliability D) reduce cost
reduce cost
Centralized access point management _______. increases management costs but provides better control reduces management costs
reduces management costs
When a router forwards incoming packets closer to their destination hosts, this is _____. routing switching bridging relaying
routing
The attack on GHOSTNET began with ________. A) a wireless vulnerability B) a social engineering attack C) malicious mobile code D) an insider attack
social engineering attack
Which of the following is one of the three parts of an IPv4 address? subnet part mask both neither
subnet part
An internal router only connects different IP ______ Subnets networks Both Neither
subnets
VoIP ________ uses the Internet Protocol for transmission. A) always B) usually C) seldom D) never
alwahys
Which of the following offers more reliable antivirus protection? A) antivirus software on user PCs B) antivirus software on the mail server C) Both A and B are about equally reliable.
Antivirus software on the mail server
Users are primarily concerned with the ________ layer. A) application B) transport C) internet D) physical
Applications
DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B
Asymmetric speed
WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the PSDN carrier D) by the ISP
At the ends of leased lines
To use a leased line, the customer requires a(n) ________ at each site. A) switch B) router C) CSU/DSU D) modem
CSU/DSU
The PSDN technology that is growing rapidly today is ________. A) Frame Relay B) Carrier Ethernet C) the Internet D) No PSDN technology is growing rapidly today.
Carrier Ethernet
In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B
Cell
In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier
Cellsite
The advance that made the client/server application architecture possible was ________. A) the Internet B) client processing power C) application sophistication D) input/output methods
Client processing power
In ________ file retrieval, your computer downloads a file from a server. A) P2P B) client/server C) BitTorrent D) none of the above
Client/server
For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP
Coaxial cable
VoIP users have ________ in their phones or on their computers. A) media gateways B) codecs C) both A and B D) neither A nor B
Codecs
Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) both A and B D) neither A nor B
Companies lack rights of way
The Trojan horse placed on the first compromised GHOSTNET client could ________. A) conduct audio and video surveillance B) delete files C) both A and B D) neither A nor B
Conduct audio and video surveillance
The creation of routing tables for a router is an example of ________. A) forwarding B) control C) both A and B D) neither A nor B
Control
Which of the following does the carrier NOT own? A) the network core B) customer premises equipment C) both A and B D) neither A nor B
Customer premises equipment
When an e-mail user encrypts an outgoing messages with SSL/TLS, how far will this encryption extend? A) to the sender's e-mail server B) to the receiver's e-mail server C) to the receiver's client host D) to an application program on the receiver's client host
The senders email server
What is the almost universal standard for end-to-end encryption? A) SSL/TLS B) IPsec C) PGP D) There is no almost universal standard for end-to-end encryption.
There is no almost universal standard for end to end encryption
How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.
They lease them from telephone companies.
Control functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B
Traditional routing
Speech codecs ________. A) translate human voice signals into digital signals for transmission B) translate human voice signals into analog signals for transmission C) both A and B D) neither A nor B
Translate human voice signals into digital signals for transmission
IPsec provides protection in two modes of operation, one of these two modes is ______ transport mode data link mode network mode 802.1X mode
Transport mode
A networked application is an application that requires a network to operate. TRUE/FALSE
True
Client PCs must have digital certificates in ________ transport mode tunnel mode both neither
Tunnel mode
For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) SIP D) IP
UDP
Which header comes SECOND in a VoIP transport packet? A) RTP B) UDP C) TCP D) Application
UDP
E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) MIME D) UNICODE
UNICODE
Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures? A) underutilized processing capacity of client PCs B) potential for essential data/services to become unavailable as a device is turned off C) both A and B D) neither A nor B
Underutilized procesing capacity of clients PC's
Tor provides confidentiality ________. A) all the way to the destination host B) up to the entry P2P node C) up to the exit P2P node D) Tor does not provide confidentiality.
Up to the exit P2P node
In SQL injection attacks, the attacker sends ________. A) a legitimate SQL query B) a malformed SQL query C) user input that is used in an SQL query D) an SQL query in malware that is delivered to the target computer
User input that is used in an SQL query
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? VLANs VPNs PEAP 802.1X mode
VPNs
The Internet is a ________. A) LAN B) WAN C) both A and B D) neither A nor B
WAN
Which of the following has more diversity in technologies? A) LANs B) WANs C) Both A and B are about equal in diversity of technologies
WANs
Which of the following allows you to read your e-mail easily on an Internet café's computer? A) POP B) Web-enabled e-mail C) both A and B D) neither A nor B
Web enabled email
For ADSL service, which of the following typically must be added to the telephone system? A) a DSLAM B) a transmission line to the customer premises C) both A and B D) neither A nor B
a DSLAM
in 802.11i protection is provided between the client and the _______ access point switch router server
access point
In SNMP, the manager communicates directly with a _______ managed device agent object access point
agent
The encapsulating security protocol offers _____ confidentiality authentication both neither
both
What does a router do with address resolution protocol request messages? broadcasts them sends them directly to the destination host sends them to a next hop router sends them to the default next hop router
broadcasts them
Typically, the most common way for an attacker to get extensive privileges on a computer is to ________. A) take over an application program B) take over the operating system C) take over a computer's hardware D) privilege escalation after an initial takeover
take over an application program
The main benefit of the IPv6 over IPv4 is _____ two more bits in the IP address two more bytes in the IP address the ability to have quality of service guarantees the ability to support more possible hosts
the ability to support more possible hosts
In BitTorrent, a(n) ________ is a server that coordinates the file transfer. A) swarm B) index C) tracker D) none of the above
tracker
Which of the following uses an access point? Traditional Wi-Fi Wi-Fi direct Both Neither
traditional Wi-Fi
MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on
transparent to
If a company uses 802.11i for its core security protocol, an evil twin access point will set up ______ 802.11i connections. One Two Four 16
two
A lesson of XSS is that programmers should never trust ________. A) contractors B) their own staff colleagues C) databases D) user input
user input
To drive around a city looking for working access points that are unprotected is ______ Drive by hacking war driving
war driving
Which is a problem with IPv4 addresses? They cant be used on wireless devices they are too complex routers find it difficult to handle them we have run out of them
we have run out of them