IS 435- Final Review
11) Routing is based on a(n) ________. A) IP address B) single-network address C) either A or B D) neither A nor B
Answer: A
110) The highest-level DNS servers are called ________. A) root servers B) top-level domain servers C) both A and B D) neither A nor B
Answer: A
111) Electronic signatures provide message-by-message ________. A) authentication B) confidentiality C) both A and B D) neither A nor B
Answer: A
121) A firewall will drop a packet if it ________. A) is a definite attack packet B) is a highly probable attack packet C) both A and B D) neither A nor B
Answer: A
127) Which of the following is the most frustrating to use? A) IDSs B) opaque filtering C) SPI firewalls D) NGFW firewalls
Answer: A
128) A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above
Answer: A
130) Ethernet messages are ________. A) frames B) packets C) segments D) not named
Answer: A
136) The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B
Answer: A
138) For cable modem service, customers need ________. A) cable modems B) splitters C) both A and B D) neither A nor B
Answer: A
88) SNMP Get commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
Answer: A
89) If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________. A) 2001:0:0:fe::cdef B) 2001::fe:0:0:0:cdef C) 2001:0:0:fe:0:0:0:cdef D) 2001::00fe:0::cdef
Answer: A
89) The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud
Answer: A
91) Using standard configurations ________. A) saves money B) gives management agility C) both A and B D) neither A nor B
Answer: A
93) If you see 0 in the Next Header Field of a header, what will follow this header? A) hop-by-hop options B) destination options C) mobility header D) none of the above
Answer: A
94) Routing packets is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
Answer: A
97) Users typically can eliminate a vulnerability in one of their programs by ________. A) installing a patch B) using an antivirus program C) both A and B D) neither A nor B
Answer: A
98) The routing prefix in IPv6 is like the ________ part in an IPv4 address. A) network B) subnet C) host D) both A and B
Answer: A
Difficulty: Basic 136) ________ links connect switches to other switches. A) Trunk B) Long C) Access D) Workgroup
Answer: A
53) Compared to an omnidirectional antenna, a dish antenna quadruples radiated power. How much is this change in decibels? A) 6 dB B) 9 dB C) 16 dB D) none of the above
Answer: A <-- Quadruples = 3dB +3dB
10) WLANs normally use ________. A) licensed bands B) unlicensed bands C) leased bands D) None of them
Answer: B
100) ________ are full programs. A) Viruses B) Worms C) both A and B D) neither A nor B
Answer: B
107) Advanced persistent threats are ________. A) inexpensive for the attacker B) extremely dangerous for the victim C) both A and B D) neither A nor B
Answer: B
109) ".com" is a ________. A) root domain B) top-level domain C) second-level domain D) none of the above
Answer: B
110) Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is ________. A) authentication B) confidentiality C) both A and B D) neither A nor B
Answer: B
111) Companies get second-level domains from ________. A) the IETF B) domain registrars C) the Internet Society D) the United States Government
Answer: B
126) Which type of firewall filtering looks at application-layer content? A) stateful packet inspection B) NGFW C) both A and B D) neither A nor B
Answer: B
145) Decent data transmission for Web surfing began with ________ technology. A) 1G B) 2G C) 3G D) 4G
Answer: C
146) To use a leased line, the customer must have a(n) ________ at each site. A) compatible switch B) compatible router C) CSU/DSU D) modem
Answer: C
150) Why is Carrier Ethernet popular? A) It uses familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B
Answer: C
154) Two switches that are 200 m apart at a speed of 20 Gbps should be connected using ________. A) 10GBASE-SR B) 100GBASE-SR C) 10GBASE-SR with bonding D) 100GBASE-SR with bonding
Answer: C
157) Which of the following reduces traffic? A) compression B) traffic shaping C) both A and B D) neither A nor B
Answer: C
159) Traffic shaping reduces traffic by ________. A) preventing certain undesirable traffic from entering the network B) limiting the amount of certain undesirable traffic entering the network C) both A and B D) neither A nor B
Answer: C
161) The primary applications architecture is ________. A) TCP/IP B) OSI C) client/server D) HTTP
Answer: C
163) Having all privileges on a computer is known as having ________. A) access B) totality C) root privileges D) mojo
Answer: C
163) Rapid Spanning Tree Protocol (RSTP) ________. A) can increase reliability B) was created to break accidental loops C) both A and B D) neither A nor B
Answer: C
172) A SaaS owns ________. A) servers B) application programs C) both A and B D) neither A nor B
Answer: C
173) Cloud customers are concerned that ________. A) their data might be hacked B) the government may access their data secretly C) both A and B D) neither A nor B
Answer: C
178) In traditional e-mail, when a client sends a message to its mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP
Answer: C
186) Speech codecs vary with respect to ________. A) compression B) voice quality C) both A and B D) neither A nor B
Answer: C
192) When a message arrives at a Tor router, the router ________. A) decrypts the arriving message B) erases its memory of the source address C) both A and B D) neither A nor B
Answer: C
193) Security is primarily about ________. A) technology B) planning C) management D) none of the above
Answer: C
200) A central firewall management program that specifically pushes changes to firewalls is ________. A) a weakest link B) defense in depth C) a single point of takeover D) risk analysis thinking
Answer: C
211) Policies should drive ________. A) implementation B) oversight C) both A and B D) neither A nor B
Answer: C
215) The policy server creates ________. A) DMZs B) policies C) ACLs for individual firewalls D) standards that firewalls must follow
Answer: C
216) Successful attacks are called ________. A) breaches B) compromises C) both A and B D) neither A nor B
Answer: C
221) CSIRTs rehearse an incident by talking about what should be done without actually doing it in ________. A) simulations B) live rehearsals C) desktop rehearsals (also called tabletop rehearsals) D) none of the above
Answer: C
224) Real-time fail-over with synchronized data centers ________. A) is expensive B) minimizes downtime C) both A and B D) neither A nor B
Answer: C
25) Network standards provide ________. A) strobing B) synchronization C) interoperability D) entanglement
Answer: C
101) Malware programs that masquerade as system files are called ________. A) viruses B) scripts C) root malware D) Trojan horses
Answer: D
102) Pieces of code that is executed after the virus or worm has spread are called ________. A) vulnerabilities B) exploits C) compromises D) payloads
Answer: D
104) Convert the following EUI-48 address to a modified EUI-64 address: B0-00-00-FF-FF-00. A) b000:ff:feff:ff00 B) b200:ff:feff:ff00 C) b100:00ff:feff:ff00 D) b200:00ff:feff:ff00
Answer: D
112) Secured packets typically receive ________. A) confidentiality B) authentication C) message integrity D) all of the above
Answer: D
122) Which of the following is used in ESP? A) ESP header B) ESP trailer C) Integrity check value D) all of the above
Answer: D
10) IPv4 addresses are ________ bits long. A) 32 B) 64 C) 128 D) none of the above
Answer: A
105) ________ is a program that can capture passwords as you enter them. A) A keystroke logger B) Data mining software C) both A and B D) neither A nor B
Answer: A
107) NAT enhances security by ________. A) preventing sniffers from learning internal IP addresses B) encryption C) both A and B D) neither A nor B
Answer: A
117) A company is free to select its ________. A) interior dynamic routing protocol B) exterior dynamic routing protocol C) both A and B D) neither A nor B
Answer: A
119) ICMP is used for ________. A) error messages B) configuration messages C) routing messages D) none of the above
Answer: A
120) Pinging is to send ICMP ________ messages to the target host. A) echo request B) error advisement C) ping D) echo
Answer: A
140) In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B
Answer: A
141) How long (in milliseconds) is a clock cycle if I transmit 400 Mbps with four states? A) 0.000005 B) 0.0025 C) 0.005 D) none of the above
Answer: A
143) Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above
Answer: A
150) The strength of a wave is its ________. A) amplitude B) frequency C) wavelength D) force
Answer: A
161) To manage their Ethernet networks, companies rely on ________. A) SNMP B) HTTP C) FTTH D) none of the above
Answer: A
164) To prevent anyone from simply walking up to a corporate switch and plugging their computer into its Ethernet port, companies can use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE
Answer: A
165) Compared to physical servers, virtual machines ________. A) can be moved more easily B) potentially have infinite capacity C) both A and B D) neither A nor B
Answer: A
169) An IaaS owns and operates ________. A) servers B) application programs C) both A and B D) neither A nor B
Answer: A
18) A host sends a packet to another host containing seven single networks along the way. How many other hosts will there be along the route when Host A transmits? A) 1 B) 2 C) 7 D) 9
Answer: A
18) To use an access point, you need to know its ________. A) SSID B) BSS C) ESS D) Wi-Fi ID
Answer: A
180) Which of the following forms of e-mail is usually easier to use if you are using someone else's computer? A) Webmail B) Mail programs using SMTP and POP C) Mail programs using SMTP and IMAP D) none of the above
Answer: A
182) In e-mail, SSL/TLS provides ________. A) link encryption B) end-to-end encryption C) both A and B D) neither A nor B
Answer: A
185) Speech codecs ________. A) translate human voice signals into digital signals for transmission B) translate human voice signals into analog signals for transmission C) both A and B D) neither A nor B
Answer: A
205) On sensitive resources, authenticated parties should get ________. A) least permissions B) standard permissions C) no permissions D) maximum permissions
Answer: A
212) Oversight activities include ________. A) vulnerability testing B) creating guidelines C) both A and B D) neither A nor B
Answer: A
213) Attacking your own firm occurs in ________. A) vulnerability testing B) auditing C) both A and B D) neither A nor B
Answer: A
214) Which of the following MUST be followed? A) standards B) guidelines C) both A and B D) neither A nor B
Answer: A
217) Normal incidents are handled by the ________. A) on-duty staff B) CSIRT (computer security incident response team) C) outside consultant D) FBI
Answer: A
59) When two devices communicate using NFC, how close must they be? A) a few inches B) up to 5 feet C) up to 10 feet D) up to 50 feet
Answer: A
71) The business benefit of multiplexing is ________. A) lower cost B) higher speed C) avoiding the need to send many transmission links through narrow conduits D) security
Answer: A
160) What is binary 0010 in hex? A) 1 B) 2 C) 3 D) none of the above
Answer: B
167) CSPs often offer ________. A) ISP services B) IaaS services C) both A and B D) neither A nor B
Answer: B
198) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must specifically ________. A) outsource security B) have defense in depth C) do risk analysis D) only give minimum permissions
Answer: B
108) Employees often attack ________. A) for revenge B) for money C) both A and B D) neither A nor B
Answer: C
143) How many wires are there is a 4-pair UTP Ethernet cord? A) 1 B) 2 C) 4 D) 8
Answer: D
91) The version number field in IPv6 has the value ________. A) 0001 B) 0100 C) 0101 D) 0110
Answer: D
24) Internet standards are published as ________. A) RFCs B) IETFs C) TCP
IPs D) Internet Protocols /Answer: A
42) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN ACK D) none of the above
/Answer: C
113) An advantage of using DHCP to configure clients is that ________. A) the configuration information will be up-to-date B) the configuration will be done securely C) both A and B D) neither A nor B
Answer: A
114) Dynamic ________ protocols allow routers to transmit routing table information to one another. A) routing B) transport C) synchronization D) none of the above
Answer: A
114) Using SSL TLS for Web applications is attractive because SSL/TLS ________. A) is essentially free to use B) offers the strongest possible cryptographic protections C) both A and B D) neither A nor B
Answer: A
115) ________ is an interior dynamic routing protocol. A) OSPF B) BGP C) both A and B D) neither A nor B
Answer: A
116) In authentication, ________ are the general name for proofs of identity. A) credentials B) authorizations C) digital certificates D) all of the above
Answer: A
122) Stateful packet inspection firewalls are attractive because of their ________. A) low cost for a given traffic volume B) ability to base rules on specific application programs C) both A and B D) neither A nor B
Answer: A
15) Which of the following is an Internet supervisory protocol? A) DNS B) IP C) both A and B D) neither A nor B
Answer: A
152) MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces
Answer: A
152) Modal dispersion limits transmission distance in ________. A) multimode fiber B) single-mode fiber C) both A and B D) neither A nor B
Answer: A
153) If a physical link can use either 4-pair UTP, multimode fiber, or single-mode fiber, which should I use? A) 4-pair UTP B) multimode fiber C) single-mode fiber D) none of the above
Answer: A
154) MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on
Answer: A
156) 850 nm multimode fiber is used in LANs ________. A) to keep cost low B) to have the longest transmission distances C) both A and B D) neither A nor B
Answer: A
17) A single access point, and the set of hosts it serves, is called a(n) ________. A) BSS B) BSSID C) ESS D) none of the above
Answer: A
175) Which of the following is a file format standard? A) HTML B) HTTP C) both A and B D) neither A nor B
Answer: A
179) In Web-based e-mail, when a client sends a message to its mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP
Answer: A
196) Attackers only need to find a single weakness to break in. Consequently, companies must ________. A) have comprehensive security B) have insurance C) do risk analysis D) only give minimum permissions
Answer: A
199) There is a single countermeasure in ________. A) weakest links B) defense in depth C) both A and B D) neither A nor B
Answer: A
2) If another wireless device is near, but in an unknown direction, it is better to use ________. A) an omnidirectional antenna B) a dish antenna C) a directional antenna D) a MIMO antenna
Answer: A
204) Another term for authorization is ________. A) permission B) authentication C) scope D) establishing the creator of a file
Answer: A
206) Companies should have ________ for each site. A) multiple security domains B) a single security domain C) at least two DMZs D) multiple DMZs
Answer: A
222) Desktop (tabletop) rehearsals are important because they ________ compared to live rehearsals. A) are relatively inexpensive B) get into specific details C) both A and B D) neither A nor B
Answer: A
225) ________ stop definite attack packets. A) Firewalls B) IDSs C) both A and B D) neither A nor B
Answer: A
23) ________ have DHCP servers. A) Home access routers B) Internet core routers C) both A and B D) neither A nor B
Answer: A
24) Which of the following is more efficient and faster? A) CSMA/CA+ACK B) RTS/CTS C) Both are about equally efficient and fast. D) don't know
Answer: A
26) Wider channel bandwidth ________. A) increases transmission speed B) allows more channels to be used in a service band C) both A and B D) neither A nor B
Answer: A
27) A standards agency for OSI is ________. A) ITU-T B) IETF C) both A and B D) neither A nor B
Answer: A
39) If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 7
Answer: A
4) What propagation problem is especially bad in moist air? A) absorptive attenuation B) electromagnetic interference C) multipath interference D) inverse square law attenuation
Answer: A
44) If a destination host receives a correct segment, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing
Answer: A
46) Which of the following is NOT one of the three general parts of messages? A) address field B) header C) data field D) trailer
Answer: A
47) If the destination internet process detects an error, it ________. A) discards the packet B) sends back a segment notifying the sender C) both A and B D) neither A nor B
Answer: A
48) Selecting locations for access points first involves ________. A) laying out circles of a chosen diameter in a diagram of the building B) doing a wireless site survey C) selecting locations that reflect organizational units D) all of the above
Answer: A
48) Which of the following is a connectionless protocol? A) IP B) TCP C) both A and B D) neither A nor B
Answer: A
78) An SLA specifies ________. A) maximum latency B) minimum latency C) both A and B D) neither A nor B
Answer: A
78) If a router receives 20 packets in a row going to the same destination IP address, the standard calls for it to ________. A) go through all three steps for each B) use the decision it made for the first one C) send them via different routers to create load balancing along different routes D) none of the above
Answer: A
80) Decision caching ________. A) reduces routing costs B) is safe C) both A and B D) neither A nor B
Answer: A
81) In IPv4, the ________ field is used to deal with congestion in the Internet. A) ECN B) DiffServ C) time to live D) header checksum
Answer: A
83) Which of the following allows packet fragmentation? A) IPv4 B) IPv6 C) both A and B D) neither A nor B
Answer: A
102) The part of an IPv6 global unicast address that designates the host is called the ________. A) host part B) interface ID C) routing prefix D) none of the above
Answer: B
105) ________ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm. A) DNS B) NAT C) DHCP D) none of the above
Answer: B
106) In a DDoS attack, a ________ sends messages directly to the victim. A) botmaster B) bot C) command and control server D) all of the above
Answer: B
112) The DNS ________ record is for the host name's ________ address A) AAAA -> IPv4 B) AAAA -> IPv6 C) both A and B d) neither A or B
Answer: B
115) Requiring someone prove his or her identity is ________. A) confidentiality B) authentication C) authorization D) both B and C
Answer: B
116) You need to use EIGRP if ________. A) you have TCP/IP traffic exclusively B) your traffic is not TCP/IP traffic C) both A and B
Answer: B
117) Iris scanning is attractive because of its ________. A) low cost B) precision C) both A and B D) neither A nor B
Answer: B
118) Digital certificate authentication fails if the supplicant ________. A) is the true party B) learns the true party's private key C) learns the true party's public key D) either B or C
Answer: B
12) Paths across a single network are called ________. A) routes B) data links C) physical links D) none of the above
Answer: B
121) IPsec protects ________ layer content. A) data link B) application C) both A and B D) neither A nor B
Answer: B
124) How will a stateful packet inspection (SPI) firewall handle a packet containing a TCP segment that contains an acknowledgement? A) process it through the Access Control List (ACL) B) pass it if it is part of an approved connection C) both A and B D) neither A nor B
Answer: B
127) Which has stronger security? A) SSL/TLS B) IPsec C) Both have about equal security. D) We don't know
Answer: B
13) If there are 10 routers between the source and destination hosts, how many transport processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12
Answer: B
13) The 2.4 GHz band supports ________ possible non-overlapping 20 MHz channel(s). A) 1 B) 3 C) 7 D) 11
Answer: B
130) How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.
Answer: B
141) In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier
Answer: B
142) What type of copper wiring is widely used in Ethernet? A) optical fiber B) 4-pair UTP C) both A and B D) neither A nor B
Answer: B
144) 4-pair UTP terminates in a(n) ________ connector. A) USB B) RJ-45 C) SC D) standard telephone
Answer: B
146) The ability to transmit in two directions simultaneously is ________. A) parallel communication B) full-duplex communication C) both A and B D) neither A nor B
Answer: B
147) The main benefit of parallel transmission over serial transmission is ________. A) reliability B) speed C) both A and B D) neither A nor B
Answer: B
16) A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission? A) 1 B) 2 C) 4 D) There will be one frame for each switch along the way.
Answer: B
16) In a point-to-point single network, how many physical links will there be when a packet is transmitted? A) 0 B) 1 C) 2 D) We cannot say with the information provided.
Answer: B
162) The main advance that made the client/server application architecture possible was ________. A) the Internet B) growing client processing power C) growing application sophistication D) new input/output methods
Answer: B
168) Which type of service manages application software for users? A) IaaS B) SaaS C) both A and B D) neither A nor B
Answer: B
17) Which of the following is true? A) Frames are carried inside packets. B) Packets are carried inside frames. C) both A and B D) neither A nor B
Answer: B
170) For Netflix, AWS is a(n) ________. A) ISP B) IaaS C) SaaS D) all of the above
Answer: B
171) For Netflix, Google is a(n) ________. A) IaaS B) SaaS C) both A and B D) neither A nor B
Answer: B
176) Which of the following is a file transfer standard? A) HTML B) HTTP C) both A and B D) neither A nor B
Answer: B
183) Why is link-by-link encryption for confidentiality not fully secure even if there is encryption for confidentiality in all links along the way? A) There cannot be confidentiality on each link. B) Devices along the way may not be secure. C) both A and B D) neither A nor B
Answer: B
184) Which of the following provides end-to-end encryption? A) SSL/TLS B) S/MIME C) both A and B D) neither A nor B
Answer: B
188) For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) SIP D) IP
Answer: B
189) RTP (Real Time Protocol) supports ________. A) faster transmission speed B) jitter control C) both A and B D) neither A nor B
Answer: B
19) A host sends a packet to another host containing six single networks along the way. How many data links are used for this transmission? A) 1 B) 6 C) 7 D) 8
Answer: B
191) Tor provides the sending host with ________. A) end-to-end confidentiality B) anonymity C) both A and B D) neither A nor B
Answer: B
194) Which phase of the plan-protect-respond cycle takes the largest amount of work? A) plan B) protect C) respond D) The phases require about equal amounts of effort.
Answer: B
195) Balancing threats against protection costs is called ________. A) economic justification B) risk analysis C) comprehensive security D) The Illusion of Cost
Answer: B
201) Allowing a user access to edit files in a specific directory is an example of ________. A) authentication B) authorizations C) defense in depth D) network segregation
Answer: B
203) ________ are actions people can take on a resource. A) Provisions B) Authorizations C) Authentications D) Risks
Answer: B
207) DMZs are places for ________. A) servers that are not accessible to clients outside the firm B) servers that are freely accessible to clients outside the firm C) servers that are freely accessible to clients inside the firm D) servers that are inaccessible to any clients
Answer: B
21) A host sends a packet to another host with six single networks along the way. How many frames are involved? A) 1 B) 6 C) 7 D) 8
Answer: B
218) Major incidents are handled by the ________. A) on-duty staff B) CSIRT (computer security incident response team) C) outside consultant D) FBI
Answer: B
219) CSIRT leaders should come from ________. A) an outside crisis vendor B) a business department C) the security department D) the IT department
Answer: B
22) CSMA/CA+ACK is ________. A) unreliable B) reliable C) semi-reliable D) don't know
Answer: B
226) ________ focus on suspicious packets. A) Firewalls B) IDSs C) both A and B D) neither A nor B
Answer: B
31) If an 802.11n client tries to use an 802.11ac access point, ________. A) they will not be able to communicate B) they will communicate using 802.11n C) they will communicate using 802.11ac D) either B or C
Answer: B
32) At what layer, will you find standards for routers? A) transport B) Internet C) both A and B D) neither A nor B
Answer: B
34) At what layer, will you find standards for switches? A) application B) data link C) transport D) Internet
Answer: B
35) At what layer, will you find standards for frames? A) application B) data link C) transport D) Internet
Answer: B
37) 802.11i PSK initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points
Answer: B
38) At what layer, will you find standards for EUI-48 addresses? A) application B) data link C) transport D) Internet
Answer: B
39) After authentication in 80.11i PSK mode, a wireless client communicates with the access point via a(n) ________ key. A) VPN B) pairwise session C) 802.1x D) a shared initial
Answer: B
45) Which of the following is usually set up by a hacker outside the building? A) a rogue access point B) an evil twin access point C) both A and B D) neither A nor B
Answer: B
46) Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? A) VLANs B) VPNs C) 802.1X mode D) none of the above
Answer: B
47) A VPN provides ________. A) link security B) end-to-end security C) comprehensive security D) none of the above
Answer: B
49) If someone says that a 1-bit flag is set, it is given the value ________. A) 0 B) 1 C) either 0 or 1 D) neither 0 or 1
Answer: B
5) What propagation problem becomes worse when there is a large, and dense, object between sender and receiver? A) multipath interference B) shadow zones (dead zones) C) inverse square law attenuation D) none of the above
Answer: B
50) A security might use SNMP Get commands to ________. A) change an access point's power B) collect information to look for a rogue access point C) both A and B D) neither A nor B
Answer: B
53) The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B
Answer: B
55) The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server
Answer: B
56) "Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B
Answer: B
57) Ethernet has a Frame Check Sequence Field to check for errors. Ethernet is ________. A) reliable B) unreliable C) both A and B D) neither A nor B
Answer: B
58) In Bluetooth LE, ________ provide information. A) advertisements B) beacons C) both A and B D) neither A nor B
Answer: B
6) What process adds a header in front of an application message or fragment? A) application B) transport C) internet D) data link
Answer: B
60) Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111
Answer: B
63) The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5
Answer: B
65) A border router connects different IP ________. A) subnets B) networks C) both A and B D) neither A nor B
Answer: B
70) Trunk lines in the Internet core are ________. A) dedicated B) multiplexed C) both A and B D) neither A nor B
Answer: B
72) The first step in the routing process involves ________. A) selecting the best match row B) comparing the packet's destination IP address to all rows C) comparing the packet's destination IP address to matching rows D) selecting an interface
Answer: B
76) An SLA specifies the ________. A) best case B) worst case C) both A and B D) neither A nor B
Answer: B
77) An SLA specifies ________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B
Answer: B
79) ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B
Answer: B
79) In decision cashing, when 20 packets arrive to the same destination IP address, the router will ________. A) go through all three steps for each B) use the decision it made for the first one C) send them via different routers to create load balancing along different routes D) none of the above
Answer: B
8) To transmit data very rapidly, you would want a ________ channel. A) narrowband B) broadband C) single-frequency band D) single-mode
Answer: B
82) To handle momentary traffic peaks, which would you give higher priority to? A) e-mail B) VoIP C) both A and B D) It is impossible to say with the information provided.
Answer: B
84) SNMP agents communicate with the ________. A) network visibility program B) network management program C) MIB D) all of the above
Answer: B
87) For human reading, IPv6 addresses are written in ________ notation. A) dotted decimal B) hexadecimal C) binary D) all of the above
Answer: B
87) SNMP Set commands can ________. A) ask agents for information about the managed device B) change router operation C) both A and B D) neither A nor B
Answer: B
94) An abrupt close uses a ________ segment. A) FIN B) RST C) either A or B D) neither A nor B
Answer: B
99) What field in an IPv6 global unicast address corresponds to the subnet part of an IPv4 address? A) global routing prefix B) subnet ID C) interface ID D) none of the above
Answer: B
99) What kind of attack is most likely to succeed against a system with no technological vulnerabilities? A) malware B) social engineering C) both A and B D) neither A nor B
Answer: B
106) NAT ________. A) allows a firm to have more internal IP addresses B) provides some security C) both A and B D) neither A nor B
Answer: C
118) In the Border Gateway Protocol, "gateway" means ________. A) firewall B) switch C) router D) none of the above
Answer: C
155) The longest transmission distances are possible with ________. A) USB B) UTP C) single-mode fiber D) multimode fiber
Answer: C
157) In Ethernet, switches are organized in a ________. A) ring B) mesh C) hierarchy D) any of the above
Answer: C
42) What initial authentication mode does 802.11i use? A) 802.1x B) PSK C) both A and B D) neither A nor B
Answer: C
43) A ________ is an unauthorized internal access point. A) binky B) shadow C) rogue D) none of the above
Answer: C
51) UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B
Answer: C
52) Which is the correct formula for decibels? A) 10 * P2/P1 B) 10 * (P2/P1)2 C) 10*Log10(P2/P1) D) none of the above
Answer: C
125) In IPsec, agreements about how security will be done are called ________. A) tranches B) security contracts C) service-level agreements D) security associations
Answer: D
14) If there are 10 routers between the source and destination hosts, how many internet processes will be involved on all devices? A) 1 B) 2 C) 10 D) 12
Answer: D
145) Optical fiber cords use two strands ________. A) for reliability through redundancy B) to form a complete electrical loop C) to double the transmission speed D) for full-duplex transmission
Answer: D
151) ________ describe light entering a fiber's core at different angles. A) Co-cycle waves B) Harmonics C) Divergences D) Different modes
Answer: D
164) Content delivery networks mainly ________. A) increase transmission speed B) increase program selection C) decrease program selection D) reduce latency
Answer: D
166) Creating a new VM is ________. A) booting B) startup C) birthing D) instantiation
Answer: D
40) After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. A) a shared initial key B) an 802.1X key C) an WPA key D) different pairwise session keys
Answer: D
96) ________ is the general name for a security flaw in a program. A) A virus B) Malware C) A security fault D) A vulnerability
Answer: D
98) Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) indefensible B) stealth C) malware D) zero-day
Answer: D
54) A change in power from 100 W to 1 W corresponds to approximately ________ decibels. A) 10 B) 20 C) -10 D) -20
Answer: D <-- 10*Log10(P2/P1) = 10*log10(1/100) = -20
139) Compared to ADSL service, cable modem traditionally has been ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive
Answer: A
14) Companies prefer the 5 GHz band because there is ________ than in the 2.5 GHz band. A) more bandwidth B) less absorptive attenuation C) both A and B D) neither A nor B
Answer: A
140) If you double the number of states, you can transmit ________ more bit(s) per clock cycle. A) 1 B) 2 C) 4 D) none of the above
Answer: A
148) In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B
Answer: A
149) In optical fiber, light travels through the ________. A) core B) cladding C) both A and B
Answer: A
158) Compression reduces traffic by ________. A) reducing redundancy in the data B) preventing undesirable traffic from entering the network C) both A and B D) neither A nor B
Answer: A
158) Ethernet became the dominant LAN technology because of ________. A) low cost B) high speed C) link reliability D) agility
Answer: A
187) SIP (Session Initiation Protocol) is a ________ protocol for VoIP. A) signaling B) transport C) both A and B D) neither A nor B
Answer: A
19) In an extended service set, each access point ________. A) must have the same SSID B) must have a different SSID C) must have a coordinated SSID D) none of the above
Answer: A
20) A host sends a packet to another host containing six single networks along the way. How many routes are included in this transmission? A) 1 B) 6 C) 7 D) 8
Answer: A
208) There should be relatively free access ________. A) between the Internet and the DMZ B) between the DMZ and the firm's internal network C) both A and B D) neither A nor B
Answer: A
210) A policy specifies ________. A) what should be done B) how to do it C) both A and B D) neither A nor B
Answer: A
35) In 802.11i, protection is provided between the client and the ________. A) access point B) switch C) router D) server
Answer: A
36) The protection of communication between a wireless client and the access point is ________. A) link security B) end-to-end security C) both A and B D) neither A nor B
Answer: A
38) 802.11i 802.1x initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points
Answer: A
5) When you use your tablet to access the internet, the tablet is a ________. A) client host B) server host C) both A and B D) neither A nor B
Answer: A
50) The UDP header has ________ fields. A) 4 B) 8 C) 16 D) 32
Answer: A
51) A security might use SNMP Set commands to ________. A) change an access point's power B) collect information to look for a rogue access point C) both A and B D) neither A nor B
Answer: A
52) On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B
Answer: A
54) The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server
Answer: A
57) In Bluetooth LE, ________ notify other Bluetooth devices that it is available. A) advertisements B) beacons C) both A and B D) neither A nor B
Answer: A
63) UDP is a standard for ________. A) packet delivery B) supervision C) both A and B D) neither A nor B
Answer: A
66) An internal router connects different IP ________. A) subnets B) networks C) both A and B D) neither A nor B
Answer: A
66) Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octets per second D) none of the above
Answer: A
67) Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B
Answer: A
7) To handle multiple conversations in 802.11 transmission, you normally use multiple ________. A) channels B) frequencies C) service bands D) wires
Answer: A
72) ________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above
Answer: A
73) The second step in the routing process involves ________. A) selecting the best-match row B) comparing the packet's destination IP address to all rows C) comparing the packet's destination IP address to matching rows D) selecting an interface
Answer: A
73) When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) output C) jitter D) throughput
Answer: A
74) Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. The default row has a metric cost of 2. Which row will the router choose if both are matches? A) 2707 B) 2708 C) 4400 D) 4401
Answer: A
74) Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency
Answer: A
75) Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16 and the reliability metric 10. Which row will the router choose if both are matches? A) 2707 B) 4400 C) either A or B D) The router will choose the default row.
Answer: A
84) Which of the following checks for errors in the packet header? A) IPv4 B) IPv6 C) both A and B D) neither A nor B
Answer: A
131) The path a message takes from the source host to the destination device in an Ethernet network is a ________. A) physical link B) data link C) route D) label-switched route
Answer: B
134) DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B
Answer: B
134) What type of switch connects switches to other switches? A) trunk switches B) core switches C) workgroup switches D) none of the above
Answer: B
135) In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B
Answer: B
139) A system with 16 states can transmit ________ bits per clock cycle A) 3 B) 4 C) 5 D) none of the above
Answer: B
147) Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B
Answer: B
148) Which UTP quality levels are needed to send signals 100 meters at 10 gigabits per second? A) category 6 B) category 6A C) both A and B D) neither A nor B
Answer: B
149) In Carrier Ethernet, which connects multiple distant sites into a single Ethernet network? A) E-Line service B) E-LAN service C) both A and B D) neither A nor B
Answer: B
15) Spread spectrum transmission is used in WLANs for ________. A) higher transmission speed B) more reliable transmission C) greater security D) more efficient transmission
Answer: B
151) Which spends less processing time on each packet arriving at a router? A) traditional routing B) MPLS C) SPLM D) Both spend about equal time.
Answer: B
153) In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) either A or B D) neither A nor B
Answer: B
155) MPLS brings ________. A) lower cost than the Internet B) the ability to do traffic engineering C) both A and B D) neither A nor B
Answer: B
156) Which of the following is the most expensive to use? A) Traditional routing B) MPLS C) carrier Ethernet D) the Internet
Answer: B
159) What is 9F hex in binary? A) 10001101 B) 10011111 C) 10101111 D) 11111001
Answer: B
22) Source and destination EUI-48 (or MAC) addresses are found in ________ headers. A) IP B) frame C) TCP D) UDP
Answer: B
223) Live rehearsals are important because they ________ compared to desktop rehearsals. A) are relatively inexpensive B) get into specific details C) both A and B D) neither A nor B
Answer: B
25) When does it make sense to use RTS/CTS? A) when all devices can hear each other B) when not all of the devices can hear each other C) when efficiency is crucial D) always
Answer: B
26) Which standards agency is especially important for internet processes? A) ITU-T B) IETF C) Both A and B are about equally important. D) Neither A nor B is important.
Answer: B
28) Which layer governs wires? A) transport B) physical C) Internet D) none of the above
Answer: B
4) The IETF primarily ________. A) manages the Internet B) creates Internet standards C) coordinates the work of ISPs D) all of the above
Answer: B
41) In 802.1x initial authentication mode, the authenticator is the ________. A) wireless client B) wireless access point C) authentication server D) none of the above
Answer: B
44) When a wireless client in an evil twin attack transmits, ________. A) the evil twin reads the packet, encrypts it, and passes on the packet B) the evil twin reads the frame, encrypts it, and passes on the frame C) the evil twin reads the packet and passes on the packet D) the evil twin reads the frame and passes on the frame
Answer: B
69) In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? A) 10 B) 5 C) 2 D) none of the above
Answer: B
71) If no other row matches, the router will select the ________ row as its best match. A) first B) last C) either A or B, depending on the circumstances D) neither A nor B
Answer: B
8) When a frame arrives, the data link process on the destination host ________. A) adds a header B) removes a header C) both A and B D) neither A nor B
Answer: B
80) ________ can be addressed by using priority. A) Chronic lacks of capacity B) Momentary traffic peaks C) both A and B D) neither A nor B
Answer: B
92) In IPv6, the payload length gives the number of octets in the ________. A) entire packet B) entire packet minus the main header C) entire packet minus the main and extension headers D) entire packet minus the extension headers
Answer: B
100) If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? A) 16 bits B) 32 bits C) 64 bits D) none of the above
Answer: B (interface ID: 64 bits fixed)
85) A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________. A) 0 B) 1 C) 254 D) 256
Answer: B If a packet arrives at a router with TTL Value 1 then that router should discard (as TTL becomes 0).
1) ISPs ________. A) carry traffic on the Internet B) connect users to the Internet C) both A and B D) neither A nor B
Answer: C
1) Wi-Fi Standards come from the ________ Working Group. A) 802.1 B) 802.3 C) 802.11 D) 802.1X
Answer: C
101) In an IPv6 global unicast address, the interface ID is ________ bits long. A) 8 B) 16 C) 64 D) Its size varies.
Answer: C
103) In a ________ attack, the attacker encrypts some or all of the victim's hard drive. A) virus B) DoS C) ransom D) lock
Answer: C
103) In a large company, you want ________. A) as big a routing prefix as you can have B) a medium-size routing prefix C) as small a routing prefix as you can have D) The size of the routing prefix is of no importance.
Answer: C
104) ________ is the general name for malware on a user's PC that collects sensitive information and sends this information to an attacker. A) A keystroke logger B) Anti-privacy software C) Spyware D) Data mining software
Answer: C
108) If your local DNS server does not know the host name of an IP address, it will get the address from a(n) ________. A) root DNS server B) proxy DNS server C) authoritative DNS server D) none of the above
Answer: C
109) Who are the most dangerous types of employees? A) financial employees B) manufacturing employees C) IT security employees D) former employees
Answer: C
11) Two access points that operate on the same channel will ________. A) bond B) coordinate their use of the channel C) interfere D) divide the available spectrum about equally
Answer: C
113) The messages of VPNs ________. A) share the same transmission lines used by other VPNs B) are encrypted C) both A and B D) neither A nor B
Answer: C
119) A debit card is secure because it requires two credentials for authentication-the card itself and a PIN. This is called ________. A) segmentation B) redundancy C) two-factor authentication D) none of the above
Answer: C
12) The downside of unlicensed bands is potential ________ A) speed loss B) loss of flexibility C) interference from others D) less-developed standards
Answer: C
120) When a firewall identifies an attack packet, it ________. A) discards the packet B) copies information about the packet into a log file C) both A and B D) neither A nor B
Answer: C
123) In transport mode, ESP fields surround an IPv4 packet's ________. A) entire length B) header C) data field D) none of the above
Answer: C
123) When a packet that is part of an ongoing connection arrives at a stateful inspection firewall, the firewall usually ________. A) drops the packet B) drops the packet and notifies an administrator C) passes the packet D) passes the packet, but notifies an administrator
Answer: C
124) in tunnel mode, ESP fields surround an IPv4 packet's ________. A) header B) data field C) header and data field D) none of the above
Answer: C
125) SPI firewalls are being replaced in large part because they are limited in their ability to detect ________. A) NAT B) piggybacking C) port spoofing D) none of the above
Answer: C
126) The first stage of IPsec uses the ________ protocol. A) SSL/TLS B) AES C) IKE D) SHA
Answer: C
129) Ethernet standards are specified at the ________ layer. A) physical B) data link C) both A and B D) neither A nor B
Answer: C
132) What 802 Working Group creates Ethernet standards? A) 802.1 B) 802.2 C) 802.3 D) 802.11
Answer: C
133) DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B
Answer: C
135) ________ links connect users to workgroup switches. A) Trunk B) Core C) Access D) Workgroup
Answer: C
137) For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP
Answer: C
137) Physical layer standards govern ________. A) signaling B) physical connectors C) both A and B D) neither A nor B
Answer: C
138) To transmit three bits per clock cycle, you must have ________ states. A) 3 B) 6 C) 8 D) 16
Answer: C
142) An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B
Answer: C
144) Which of the following affects what cellular throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B
Answer: C
27) Individual throughput for users of an access point ________. A) depends on how many users are sharing the access point B) depends on your distance from the access point C) both A and B D) neither A nor B
Answer: C
29) MIMO ________. A) increases transmission speed B) increases transmission distance C) both A and B D) neither A nor B
Answer: C
30) An access point can transmit to more than one wireless client at a time with ________. A) bonding B) MIMO C) Multiuser MIMO D) CSMC/CA+ACK
Answer: C
31) Which layer(s) governs transmission through a single network? A) data link B) physical C) both A and B D) neither A nor B
Answer: C
32) Because of ________, an 802.11ax access point can communicate with an 802.11ay client. A) MIMO B) MU-MIMO C) backward compatibility D) They CANNOT communicate.
Answer: C
33) At what layer, will you find standards for access points? A) physical B) data link C) both A and B D) neither A nor B
Answer: C
34) 802.11i provides ________. A) confidentiality B) message integrity C) both A and B D) neither A nor B
Answer: C
40) If two hosts are connected by five networks, how many routers will there be when one host sends a packet to the other host? A) 1 B) 2 C) 4 D) 5
Answer: C
45) In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the side that does not initiate the close C) both A and B D) neither A nor B
Answer: C
49) Site surveys should be done ________. A) after the initial provisional placement of access points B) periodically afterwards C) both A and B D) neither A nor B
Answer: C
55) Bluetooth ________ is likely to be used most of the time in IoT transmission. A) HDR B) HS C) LE D) COIN
Answer: C
58) Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange
Answer: C
61) A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64
Answer: C
62) In Zigbee, ad hoc networking's mesh is operated by ________. A) Zigbee Controllers B) Zigbee End Devices C) Zigbee Routers D) Zigbee Hives
Answer: C
62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8
Answer: C
64) In QoS, the S stands for ________. A) software B) security C) service D) satisfaction
Answer: C
64) Router sockets for wire and optical fiber cords are called ________. A) sockets B) plugs C) interfaces D) ports
Answer: C
65) QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above
Answer: C
67) A mask has ________ bits. A) 8 B) 16 C) 32 D) 64
Answer: C
68) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) none of the above
Answer: C
68) In the mask 255.255.255.0, how many 1s are there? A) 8 B) 16 C) 24 D) 48
Answer: C
7) What process adds a header in front of a TCP segment? A) Application B) Transport C) Internet D) Data Link
Answer: C
75) Guarantees for quality of service are called ________. A) QoS-G B) QoS metrics C) SLAs D) QoS guarantees
Answer: C
77) If the next-hop router field in the best-match row says "local", the router should address the packet to the ________. A) local router B) default router C) destination host D) none of the above.
Answer: C
81) Momentary traffic peaks can lead to ________. A) latency B) packet loss C) both A and B D) neither A nor B
Answer: C
83) Traffic shaping may ________ traffic that is undesirable. A) prohibit B) limit C) both A and B D) neither A nor B
Answer: C
86) Ping tells you ________. A) that a host is reachable B) latency in the connection to the host C) both A and B D) neither A nor B
Answer: C
9) The term "broadband" is commonly used for ________. A) wide radio bandwidths B) high-speed transmission in general C) both A and B D) neither A nor B
Answer: C
9) The transport layer on the destination host ________. A) reassembles the application message if it has been fragmented B) removes the transport header C) both A and B D) neither A nor B
Answer: C
90) Using the SNMP Set command ________. A) saves management labor B) requires excellent security C) both A and B D) neither A nor B
Answer: C
90) Which RFC standardizes how to write IPv6 addresses in canonical form? A) RFC 791 B) RFC 2707 C) RFC 5952 D) RFC 7600
Answer: C
92) SDN can ________. A) permit routing rules to be changed rapidly B) reduce router costs C) both A and B D) neither A nor B
Answer: C
95) The general term for evil software is ________. A) virus B) worm C) malware D) all of the above
Answer: C
95) You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet? A) 15 B) 16 C) 254 D) none of the above
Answer: C
96) Your firm has a 22-bit network part. What subnet part would you select to give at least 10 subnets? A) 2 bits B) 3 bits C) 4 bits D) none of the above
Answer: C
97) Your firm has a 22-bit network part and a 6-bit subnet part. How many usable hosts can you have per subnet? A) 6 B) 8 C) 14 D) 16
Answer: C
128) ________ look at ________, while ________ mostly look at ________. A) Antivirus programs, packets, firewalls, packets B) Antivirus programs, files, firewalls, files C) Antivirus programs, packets, firewalls, files D) Antivirus programs, files, firewalls, packets
Answer: D
129) MAN speeds are faster than WAN speeds because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons
Answer: D
131) In a telephone system, the lines that connect customers to the nearest switch are called ________. A) trunk lines B) local lines C) the access loop D) the local loop
Answer: D
132) Most end-office switches are Class ________ switches. A) 1 B) 2 C) 4 D) 5
Answer: D
133) What type of switch connects users to the network? A) user switches B) core switches C) access switches D) workgroup switches
Answer: D
160) The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture
Answer: D
165) To prevent an unauthorized user from sending supervisory commands to switches, companies use ________. A) 802.1X B) SNMP C) VLANs D) 802.1AE
Answer: D
166) After an ARP cache poisoning attack, the ARP cache gives the ________. A) IP address of the router the user wishes to send to B) EUI-48 address of the router the user wishes to send to C) IP address of the router the MITM attacker D) EUI-48 address of the router the MITM attacker
Answer: D
174) On networks, cloud computing is increasing the need for ________. A) sudden changes in traffic B) reliability C) controlled latency D) all of the above
Answer: D
177) If you are downloading a webpage containing three graphics images, which file will you download first? A) The first image. B) The second image. C) The third image. D) none of the above
Answer: D
181) E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) MIME D) UNICODE
Answer: D
190) Codec data comes after the ________ header in VoIP transport frames. A) IP B) TCP C) UDP D) RTP
Answer: D
197) An attacker must break through two firewalls to get to a host. This most specifically illustrates the ________ principle. A) comprehensive security B) risk assurance C) weakest link protection D) defense in depth
Answer: D
2) We call any device connected to the Internet a(n) ________. A) IP B) client C) router D) host
Answer: D
20) ________ is a technique for preventing two wireless stations from interfering with each other by transmitting at the same time. A) Creating extended service sets B) Roaming C) The distribution system D) Media access control
Answer: D
202) If someone has been properly authenticated, they should receive ________ permissions. A) all B) no C) maximum D) minimum
Answer: D
209) It is hardest to create good security ________. A) policies B) procedures C) processes D) culture
Answer: D
21) In CSMA/CA, CS means ________. A) cancel sending B) counter-source C) carriage suspension D) carrier sense
Answer: D
220) Which department will almost always be involved in a CSIRT? A) the IT department B) the legal department C) the human resources department D) all of the above
Answer: D
23) In ________, when a wireless host wishes to send, it first sends a message to the wireless access point asking for permission to send. When the access point sends back a response, the host sending the original message may transmit. All other hosts must wait. A) CSMA/CA+ACK B) CSMA/CA C) CSMA/CD D) RTS/CTS
Answer: D
28) MIMO ________. A) bonds two or more channels for higher speed B) is used in all forms of 802.11 C) uses a single spatial stream but multiple signals D) transmits multiple signals in the same channel
Answer: D
29) Which standards layer governs e-mail? A) data link B) transport C) Internet D) none of the above
Answer: D
3) Who owns the Internet? A) The U.S. Government B) The United Nations C) The IETF D) No one
Answer: D
30) Which standards layer governs multiuser word processing programs? A) data link B) transport C) Internet D) none of the Above
Answer: D
33) The main problem with the 60 GHz unlicensed band is that ________. A) it cannot be used outside B) it does not support MIMO C) transmission speed is low D) transmission distance is short
Answer: D
36) At what layer, will you find standards for IP addresses? A) application B) data link C) transport D) Internet
Answer: D
37) At what layer, will you find standards for routes? A) application B) data link C) transport D) Internet
Answer: D
41) If two hosts are connected by five switches, how physical links will there be when one host sends a packet to the other host? A) 1 B) 2 C) 5 D) 6
Answer: D
43) If a destination host receives a TCP segment with an error, it will transmit ________. A) an ACK segment B) an NAC segment C) an RSND segment D) nothing
Answer: D
56) If a master has multiple slaves, Bluetooth will use ________ operation. A) all-to-all B) point-to-multipoint C) one-to-all D) one-to-one
Answer: D
59) Transmitting "Oh, My!" without the quotes in ASCII requires ________ octets. A) 2 B) 4 C) 6 D) 7
Answer: D
6) Multipath interference is mitigated through ________. A) broadband transmission B) MIMO C) beamforming D) spread spectrum transmission
Answer: D
60) Passive RFID chips get the power needed to transmit from ________. A) wall power B) coin batteries C) the electricity that always flows through the air in small quantities D) none of the above
Answer: D
61) Wi-Fi direct ________ uses access points. A) always B) usually C) rarely D) never
Answer: D
69) In the mask /14, how many 1s are there? A) 8 B) 16 C) 24 D) none of the above
Answer: D
70) Express the mask /18 in dotted decimal notation. A) 255.0.0.0 B) 255.255.0.0 C) 255.255.255.0 D) none of the above
Answer: D
76) The next-hop router listed in the last row is the ________ router. A) local B) best-match C) socket D) default
Answer: D
82) The identification field in IPv4 is used for ________. A) route fragmentation B) frame fragmentation C) application message fragmentation D) packet fragmentation
Answer: D
85) To determine if a host is reachable, you send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping
Answer: D
86) The main benefit of IPv6 over IPv4 is ________. A) having two more bits in the IP address B) having two more bytes in the IP address C) the ability to have quality-of-service guarantees D) the ability to support more hosts
Answer: D
88) In IPv6 addresses, ________ are separated by ________. A) segments -> dots B) segments -> colons C) fields -> dots D) fields -> colons
Answer: D
93) Creating switching and routing tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control
Answer: D
3) If a signal has a strength of 100 mW at 10 meters, how strong will it be at 40 meters? A) about 0.5 mW B) about 5 mW C) about 25 mW D) about 6.25 mW
Answer: D. P2=100mW*(10/40)^2 =6.25 mW