ISM 4220 exam 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In transport mode, ESP fields surround an IPv4 packet's ____________. data field header entire length none is correct

data field

in 802.1x initial authentication mode, the authenticator is the________. wireless client none is correct authentication server wireless access point

wireless access point

A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________. 0 1 254 256

1

In an routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet's IP address. What row will the router look at first when trying to find matching rows? 1 47 3497 the default row

1

Your firm has a 22-bit network part and a 6-bit subnet part. How many hosts can you have per subnet? 14 8 16 6

14

A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frame(s) will be involved in this one-way transmission? 1 There will be one frame for each switch along the way. 4 2

2

A change in power fom 100 W corresponds to approximately _____________ decibels. 20 10 -20 -10

20

If I simplify the address 2001:0000:0000:00fe:0000:0000:0000:cdef, I get ________.

2001:::fe::::cdef

In the mask 255.255.255.0, how many 1s are there? 8 16 24 It cannot be determined from the information given

24

Express the mask /18 in dotted decimal notation (no space is needed). Hint: recall the formula in Ch. 2

255.255.48.0

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? 16 bits 64 bits 32 bits It cannot be determined from the information given

32 bits

Most end-office switches are Class ___________switches 4 3 1 5

5

Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? 8 6 7 9

8

Which of the following uses OFDM ? 802.11n 802.11ac 802.11 802.11ac AND 802.11n

802.11ac AND 802.11n

A change in power from 2 mW to 17 mW corresponds to approximately _________ decibels. 3 12 9 20

9

Convert the following EUI-48 address to a modified E U I-64 address: 9B-E5-33-21-FF-0D. (no space nor colon is needed)

99e5:33ff:fe21:ff0d

The DNS ______________ record is for the host name's ______________ address. AAAA: IPv4 AAAA: IPv6 A: IPv6 None is correct

AAAA: IPv6

If a cellsite uses Channel 237, which other cellsites can reuse the channel? no other cellsites Adjacent cellsites Cellsites one beyond adjacent cells Cellsites two beyond adjacent cells

Adjacent cellsites

In IPv4, the __________ field is used to deal with congestion in the internet. ECN DiffServ header checksum time to live

ECN

Which of the following can route non-IP packets? EIGRP OSPF Both None is correct

EIGRP

There is a row for each host address in a(n) ____________________. Rotuing number ethernet switching table modem table none is correct

Ethernet switching table

Most wireless systems operate in the______range. MHz kHz GHz hz

GHz

Which is NOT one of the three parts of a public IPv 6 unicast address? Routing prefix subnet ID HOst part All of the above are parts in a public IPv6 unicast address

Host part

If you triple channel bandwidth, what happens to the number of channels in a service band? It triples. It increases by a factor of nine. It is reduced to a third. It is reduced to a ninth.

It is reduced to a third.

Bluetooth _____________ is likely to be used most of the time in IoT transmission. HDR HS LE COIN

LE

If no other row matches, the router will select the ________ row as its best match. First Last Depending on the circumstances None is correct

Last

A channel extends from 55 MHz to 60 MHz. Its bandwidth is ___________ . 55 MHz 58 MHz 60 MHz None is correct

None is correct

What transmission medium do ALL D S L services use? One-pair data-grade U T P One-pair voice-grade U T P None is correct Two-pair data-grade U T P

One-pair voice-grade U T P

A group of devices on a desk that communicate wirelessly is called a _________________. WAN PAN LAN MAN

PAN

802.11i PSK initial authentication mode was created for ________. A) corporations with multiple access points B) residences with a single access point C) residences with less than eight access points D) corporations with less than eight access points

Residences with a single access point

To connect to an access point, you must know its __________. ESSID Wi-Fi ID SSID IP address

SSID

How do WAN carriers typically get their trunk lines? They lease them from telephone companies They use the internet They construct them They use wireless transmission

They lease them from telephone companies

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? 802.1X mode VlANs VPNs None is correct

VPNs

The WIFI Alliance calls 802.11i___________. WPA None is correct WEP WPA2

WPA2

When does it make sense to use RTS /CTS ? When efficiency is crucial When all devices can hear each other When not all of the devices can hear each other Always

When not all of the devices can hear each other

The other wireless device is far away in a known direction. It would be better to use _________. an omnidirectional antenna a regular antenna None is correct a dish antenna

a dish antenna

At 10 meters, a signal has a strength of 100 m W . About how strong will it be at 40 meters? About 0.5 mW About 5 mW About 6 mW About 25 mW

about 6mW

In 802.11i, protection is provided between the client and the__________. access point switch router server

access point

In SNMP, the manager communicates directly with a(n) _______________. agent access point object managed device

agent

a rogue access point is usually created by_______ an evil twin an external attacker the IT security department an employee

an employee

Classic Bluetooth provides transmission speeds of _______________. 24 Mbps 3 Mbps both 3 Mbps and 24 Mbps None is correct

both 3 Mbps and 24 Mbps

In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n)___________ MTSO wireless carrier cell cellsite

cellsite

For their transmission medium, cable television companies primarily use ___________ coaxial cable 2-pair DG UTP cabling 2-pair VG UTP cabling 4-pair U T P

coaxial cable

Which of the following does the carrier NOT own? the network core and the customer premises equipment the network core customer premises equipment none is correct

customer premises equipment

If the next-hop router field in the best-match row says "local", the router should address the packet to the ________. local router destination host default router none is correct

destination host

After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point. WPA keys different pairwise session keys an 802.1x key the preshared key

different pairwise session key

Compared to ADSL service, cable modem traditionally has been ________. slower and more expensive faster and less expensive faster and more expensive slower and less expensive

faster and more expensive

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.

fffe

In NAT, the ____________ creates new external source IP addresses and port numbers. firewall router destination host source host

firewall

The set of frequencies used for police communication in a city are ______ . None is correct channels frequencies spectrums

frequencies

Router sockets for wire and optical fiber cords are called ____________________. plugs ports sockets iterfaces

interfaces

the downside of unlicensed bands is potential __________. speed loss interference from others loss of flexibility less-developed standards

interference from others

The internet is organized in a ____________________. mesh hierarchy ring None is correct

mesh

The P S T N core is organized as a _____________ modified hierarchy mesh loop hierarchy

modified hierarchy

Spread spectrum transmission is used in WLAN s for ________. higher transmission speed more reliable transmission more efficient transmission greater security

more reliable transmission

A border router connects different IP. subnets networks subnets and networks none is correct

networks

If you have a subnet part of 7 bits, how many subnets can you have? 128 512 256 None is correct

none is correct

Which is the correct formula for decibels? 10* P2/P1 10* (P2/P1)^2 Log10(P2/P1) None is correct

none of these

CSMA /CA +ACK is _______. reliable semireliable None is correct unreliable

reliable

Cells are used in cellular telephony to provide ________. service for more customers greater reliability greater transmission speed all of the above

service for more customers

Multipath interference is mitigated through ________. broadband transmission spread spectrum transmission MIMO beamforming

spread spectrum transmission

An internal router connects different IP. subnets networks subnets and networks none is correct

subnets

For cost reasons, you should ____________ where you can, ______________ where you must. switch; route switch; switch route; route route; switch

switch; route

Which of the following would be an SNMP object? Number of rows in routing table system uptime system uptime and number of rows in routing table none is correct

systemuptimeandnumber of rows in routing table

Access points in the same ESS communicate via _______. routers the distribution system wireless transmission a master access point

the distribution system

when a wireless client in an evil twin attack transmits, _______ the evil twin reads the packet, encrypts it, and passes on the packet the evil twin reads the packet and passes on the packet the evil twin reads the frame, encrypts it, and passes on the frame the evil twin reads the frame and passes on the frame

the evil twin reads the frame, encrypts it, and passes on the frame

If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client? the local DNS server the remote DNS server either A or B No IP address will be returned to the client.

the local DNS server

".com" is a ____________. second-level domain top-level domain root domain none of above

top-level domain

if a company uses 802.11i for its core security protocol, an evil twin access point will set up _______ 802.11i connection(s) none is correct four two one

two


संबंधित स्टडी सेट्स

AP Human Geography Princeton Review Vocabulary

View Set

Lifespan Developmental Psychology

View Set

Chapter 20: Population and Urbanization, Chapter 22: Social Change and the Environment

View Set

HHA, chp 24, ASSESSING MUSCULOSKELETAL SYSTEM

View Set

Vocabulary Rows of ア・カ・サ・タ・ガ・ザ・ダ

View Set

Ap world history : Modern Learning objectives

View Set

IT-410 Modules 1+2 Quiz Questions

View Set

Wordly Wise 3000, Book 4 Lesson 12

View Set

Refraction occurs when light passing from one medium to another

View Set

Systems Theory and Family Therapy

View Set