Business Data Networks & Security - Ch. 6, Business Data Networks and Security - Chapters 8, 9, 10, and 11., Business Data Networks & Security (Panko)- Ch 9- Internetworking, Business Data Networks and Security Ch 10, Business Data Networks & Securit...
Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B
A) leased lines
Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above
A) service for more customers
In SDN, a switch receives its forwarding table rules directly from ________. A) the SDN controller B) an SDN management application C) another switch D) an SNMP manager
A) the SDN controller
T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps
B) 1 Mbps
Which of the following already runs to nearly all customer premises? A) 4-pair UTP B) 1-pair VG UTP C) 1-pair DG UTP D) none of the above
B) 1-pair VG UTP
Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B
B) the Internet
Index Server
BitTorrent's .torrent files are stored on the _____.
An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B
C) both A and B
DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B
C) both A and B
Forwarding functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B
C) both A and B
In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) both A and B D) neither A nor B
C) both A and B
SDN can ________. A) permit routing rules to be changed rapidly B) reduces router costs C) both A and B D) neither A nor B
C) both A and B
WAN optimization provides ________. A) network protocol acceleration B) caching C) both A and B D) neither A nor B
C) both A and B
For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP
C) coaxial cable
WANs are ________. A) single networks B) internets C) either A or B D) neither A nor B
C) either A or B
RTP
Codec data comes after the _____ header in VoIP Transport Frames.
Faster and More Expensive
Compared to ADSL service, cable modem service typically is _____.
Faster
Compared to normal routing, decision caching is _____.
Most end-office switches are Class ________ switches. A) 1 B) 2 C) 3 D) 5
D) 5
The highest layer in SDN consists of ________. A) switches B) routers C) the SDN controller D) SDN applications
D) SDN applications
A. Voice Transmission B. Data Transmission C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
DSL offers _____.
Routing
Dynamic _____ protocols allow routers to transmit routing table information to one another.
UNICODE
E-Mail bodies that have non-English text use _____.
running optical fiber to neighborhoods.
Fiber to the home service is normally created by _____.
A Routing Table
For 100,000 Addresses, which will have fewer rows?
Routers
For a given volume of traffic, which are more expensive?
Hexadecimal
For human reading, IPv6 address is written in _____ notation.
Colons
For human reading, IPv6 fields are separated by _____.
4
For human reading, symbols in IPv6 addresses are written in fields of _____ symbols.
UDP
For the Transport Layer, VoIP uses _____ for transport transmission.
Coaxial Cable
For their transmission medium, cable television companies primarily use _____.
A. Traditional Routing B. SDN C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Forwarding functions are located in routers in _____.
A. Echo and Echo Reply Messages B. Error Advisement Messages C. Both A and B D. Neither A nor B CORRECT ANSWER - D. Neither A nor B
IP is reliable because of _____.
A. Run Side-By-Side. B. Are Twisted Around Each Other. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - D. Neither A nor B.
In coaxial cable, the two conductors _____.
None of the Above
In the mask /14, how many 1s are there?
preventing sniffers from learning internal IP addresses.
NAT enhances security by _____.
Soutbound APIs
OpenFlow can be used to standardize _____.
Translate Human Voice Signals into Digital Signals for Transmission
Speech codecs _____.
modified hierarchy
The PSTN core is organized as a _____.
Anonymity
Tor was created to improve _____.
A. Limits the amount of some types of traffic. B. Does not admit some types of traffic. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - C. Both A and B
Traffic shaping _____.
Transport Mode
Which mode of IPsec may be more expensive if a company has a large number of computers?
Business
Which of the following DSL services usually offers QoS quarantees?
OSPF
_____ is an interior dynamic routing protocol.
Domain Name System (DNS)
a general system for naming domains.
MIB object
a piece of information about a managed device. SNMP Objects Set Commands Password used to encrypt manager Systems Objects IP Objects TCP Objects UDP Objects ICMP Objects Interface Objects
Border Gateway Protocol (BGP)
almost-universal external routing protocol.
Man in the middle attack
attack that places the attacker in the middle of the compromised transmissions between two legitimate hosts
Data field
contains two subfields: the LLC subheader and the packet that the frame is delivering
802.11 standards
dominant WLAN standards used today. Created by the IEEE 802.11 Working Group
Electromagnetic interference (EMI)
electromagnetic signals from nearby motors, flourescent lights, and even other wire pairs (crosstalk interference)
Frame Check Sequence Field
4 octets long. Permits error detection
Logical link control layer (LLC) subheader
8 octets long. Describes the type of packet contained in the data field.
An SDN Application
A router's load-balancing process is determined by _____.
WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the PSDN carrier D) by the ISP
A) at the ends of leased lines
Multimode fiber
fiber that permits multiple modes to travel through it. Core of 50 microns
Single-mode fiber
fiber with a core diameter of only 8 or 9 microns
sniffer program
hackers use the program to read all packets coming out of the firm.
dual stack
hosts both IPv4 stack and IPv6 stack.
internet layer protocol stack (IP stack)
inter layer process that handles more than the Internet Protocol (IP).
3 main issues that mesh networking must address
must be self-organizing, must be difficult to overload access points near geographical center, and security
Hierarchical topology
required by Ethernet, otherwise loops would exist
exterior dynamic routing protocol
required by the external network to with it is connected.
Clear-to-send (CTS) message
response by the access point to an RTS message. Other hosts must wait while the host sending the RTS may then transmit, ignoring CSMA/CA
Channel
what service bands are subdivided into smaller frequency ranges. Do not interfere with each other
Wireless LANs (WLANs)
wireless local area networks. Wireless networking's widest application
Interior
A company is free to select whatever _____ dynamic routing protocol it wishes.
a domain registrar.
A company receives its domain name from _____.
POP
A customer's leased line to its ISP connects to the ISP's _____.
User Input
A lesson of XSS is that programmers should never trust _____.
32
A mask has _____ bits.
A. Signaling B. Transport C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
A media gateway translates _____ transmissions.
Whenever it forwards an IP packet to a host that is not in its ARP cache.
A router must use the Address Resolution Protocol process _____.
1
A router will discard a packet if the Time-To-Live (TTL) value in an arriving packet is _____.
fffe
A step in creating an EUI-64 is dividing a 48-Bit MAC address in half and inserting _____ in the center.
Either IMAP or POP Standard
A traditional e-mail user retrieving messages from his or her mail server could use _____.
SMTP Standard
A traditional e-mail user sending messages to his or her mail server would most likely use _____.
Router, Routing
A(n) _____ must find the best-matching row in its _____ table by comparing multiple row matches.
Many "T1" lines that carriers provide today use ________ in the local loop. A) 1-pair voice-grade UTP B) 2-pair voice-grade UTP C) 1-pair data-grade UTP D) 2-pair data-grade UTP
A) 1-pair voice-grade UTP
In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B
A) E-Line
A company has more control over its ________ technology. A) LAN B) WAN
A) LAN
A network that runs on the customer premises is a ________. A) LAN B) WAN C) both A and B D) neither A nor B
A) LAN
Which of the following usually offers higher speeds? A) LANs B) WANs C) Both A and B are about equal in typical speeds.
A) LANs
Today's dominant cellular technology is ________. A) LTE B) 3G C) HSPA+ D) MTSO
A) LTE
A customer's leased line to its ISP connects to the ISP's ________. A) POP B) NAP C) CSU/DSU D) interface
A) POP
For ADSL service, which of the following typically must be added to the telephone system? A) a DSLAM B) a transmission line to the customer premises C) both A and B D) neither A nor B
A) a DSLAM
In caching, ________. A) a message may not have to be transmitted B) messages are cached at the transmitting end of the line C) both A and B D) neither A nor B
A) a message may not have to be transmitted
In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B
A) cell
Companies use carriers for WAN transmission because ________. A) companies lack rights of way B) carriers have extremely strong security C) both A and B D) neither A nor B
A) companies lack rights of way
Leased lines offer ________ service. A) fast B) any-to-any C) rapid-connection D) none of the above
A) fast
Compared to ADSL service, cable modem service typically is ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive
A) faster and more expensive
The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B
A) higher speed
A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above
A) links different sites together
Communication between SDN applications and SDN controllers is governed by ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
A) northbound APIs
MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces
A) reduces
SDN ________. A) reduces CapEx B) increases OPEx C) both A and B D) neither A nor B
A) reduces CapEx
Fiber to the home service is normally created by ________. A) running optical fiber to neighborhoods B) running individual fiber cords from the nearest switching building to individual homes C) both A and B D) neither A nor B
A) running optical fiber to neighborhoods
Layer 3
ARP operates at _____.
Go through the entire process for each packet.
According to the IETF standards, if a router receives a series of packets from the same IP address to the same IP address, it shoud _____.
2
According to the principle of defense in depth, antivirus filtering should be done in at least _____ location(s).
A. Destination Hosts B. Routers C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Address Resolution Protocol is used to find the destination data link layer destination addresses of _____.
Interface
After selecting a row on a routing table, a router will send packets out to the _____.
A. Controls Cellsites in a Cellular System. B. Links Mobile Users to Wired Telephone Customers. C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
An MTSO _____.
Subnets
An internal router only connects different IP _____.
A. Viruses B. Trojan Horses C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Antivirus software checks e-mail attachments for _____.
In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B
B) ADSL modem
The PSDN technology that is growing rapidly today is ________. A) Frame Relay B) Carrier Ethernet C) the Internet D) No PSDN technology is growing rapidly today.
B) Carrier Ethernet
How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.
B) They lease them from telephone companies.
The Internet is a ________. A) LAN B) WAN C) both A and B D) neither A nor B
B) WAN
Which of the following has more diversity in technologies? A) LANs B) WANs C) Both A and B are about equal in diversity of technologies.
B) WANs
A router's load-balancing process is determined by ________. A) the SDN controller B) an SDN application C) the router D) any of the above
B) an SDN application
DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B
B) asymmetric speed
remote-site-access VPN
connecting a remote user to a site and a site-to-site VPN that connects two corporate sites.
Optical multimode (OM)
consists of OM3 and OM4. OM4 cost more, but can carry signals farther
Basic service set (BBS)
consists of an access point and the wireless hosts it serves
Length field
contains a binary number that gives the length of the data field (not entire frame) in octets. Maximum length is 1,522 octets
DNS A Record
contains the IPv4 address for a target host..
DNS AAAA Record
contains the IPv6 address for a target host (4X DNS A Record)
Service bands
contiguous spectrum ranges that regulators divide the frequency spectrum into.
top-level domains
country domains (.uk, .ca, .ie, .au, .ch, ect.) genetic domains (.com, .edu, .net, .info, .gov, .org)
802 LAN/MAN standards committee
create LAN standards, also known as the 802 Committee. Done in working groups.
802.3 Working Group
creates Ethernet standards
What speed does the LTE Advanced standard require downstream? A) 3 Mbps B) 30 Mbps C) 3 Gbps D) 30 Gbps
C) 3 Gbps
A firm uses a PSDN. It has four sites. How many leased lines will it need? A) 0 B) 1 C) 4 D) none of the above
C) 4
To use a leased line, the customer requires a(n) ________ at each site. A) switch B) router C) CSU/DSU D) modem
C) CSU/DSU
In a PSDN, customers connect to the network core at ________. A) NAPs B) public/private access points C) POPs D) DSLAMs
C) POPs
Orthogonal frequency division multiplexing (OFDM)
each broadband channel is divided into many smaller channels called subcarriers. A part of a frame is transmitted,
Address Resolution Protocol (ARP) cache
each host and router has this. Lists IP addresses and their corresponding EUI-48 addresses
Hierarchy
each switch has only one parent switch above it. Only a single possible path between any two hosts
Single points of failure
failure of a single component (a switch or trunk link between switches) can cause disruption
lower-level domains
further qualified domains (shidler.hawaii.edu.domain, Shidler College School of Business within the University of Hawaii)
Digital signaling
has a few states (2, 4, 8 etc) always a multiple of two
Media Access Control (MAC) layer
has functionality specific to a particular working group's core operation
Logical Link Control (LLC) layer
has functionality that all 802 standards use to interact with the internet layer. 802.2 is the only single standard
Binary signaling
has two states (conditions) which may be two voltage levels or light being turned on or off
Traffic shaping ________. A) limits the amount of some types of traffic B) does not admit some types of traffic C) both A and B D) neither A nor B
C) both A and B
Which of the following affects what throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B
C) both A and B
Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B
C) both A and B
Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B
C) both A and B
Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B
C) both A and B
LANs are ________. A) single networks B) local internets C) either A or B D) neither A nor B
C) either A or B
In MPLS, the packet travels along the ________. A) route B) data link C) label-switched path D) MPLS path
C) label-switched path
The PSTN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop
C) modified hierarchy
What transmission medium do ALL DSL services use? A) one-pair data-grade UTP B) two-pair data-grade UTP C) one-pair voice-grade UTP D) all of the above
C) one-pair voice-grade UTP
A LAN is the network that ________. A) links different sites together B) provides service within a company C) provides service within a site D) all of the above
C) provides service within a site
CSMA/CA+ACK
Carrier Sense Multiple Access with Collision Avoidance and Acknowledgement, a mandatory method for media access control
3 common UTP cable categories
Category 5e, Category 6, Category 6A UTP
service for more customers.
Cells are used in cellular telephony to provide _____.
Enhanced Interior Gateway Routing Protocol (EIGRP)
Cisco Systems interior routing protocol. gateway- another term for a router.
Transport Mode
Client PCs must have digital certificates in _____.
Traditional Routing
Control functions are located in routers in _____.
Base 16 hexadecimal (hex) notation
Converted from 48-bit Ethernet addresses.
Label-switching routers bring ________. A) lower cost B) the ability to do traffic engineering C) quality of service D) all of the above
D) all of the above
Frequency
how radio waves are described. The number of of complete cycles. Increases by factor of 1,000
N = 2^b - 2
if a part is b bits long , it can represent 2^b - 2 networks, subnets, or hosts
authoritative DNS server
if the host's IP address is not know it will find the domain in the host name.
ACK
if the receiver receives a message correctly, it immediately sends an acknowledgement to the sender. If sender does not receive an ACK, it retransmits. This is reliable for providing both error detection and correction
Terminal crosstalk interference
if wires are untwisted too far, the interference between the untwisted wires would be crippling
root DNS servers
keep an overview information for the system.
IPsec policy servers
manage IPsec security options in order to prevent weak options from being used.
Multipath interference
may cause the signal to range from strong to nonexistent within a few centimeters
Request-to-send (RTS) message
message that host sends to wireless access point for permission to send messages
802.11r messages
messages used for two access points involved in handoff of service
Media access control (MAC)
methods govern when hosts and access points may transmit so that collisions are avoided
500 megahertz to 10 gigahertz
most common radio frequencies for wireless transceivers
Local area network (LAN)
networks that operate a customer premises, like a home, office building, campus, etc
Request to send/clear to send (RTS/CTS)
nonmandatory control mechanism
Electromagnetic interference (EMI)
objects like cordless phones, microwaves, and nearby access points produce EMI creating excessive mutual interference
5 GHz service band
one of the two service bands used by 802.11 Wi-Fi WLANs. Provides between 11 and 24 non-overlapping 20 MHz channels. More expensive than 2.4 GHz receiver
2.4 GHz service band
one of the two service bands used by 802.11 Wi-Fi WLANs. Same in most countries around the world, stretching from 2.4 GHz to 2.835 GHz. Better for radio propagation. Only has 83.5 MHz of bandwidth, and only 3 non-overlapping 20 MHz 802.11 channels, centered at Channels 1, 6, and 11
ARP poisoning attack
packet that falsely tells the victim the incorrect EUI-48 address
Absorptive attenuation
partial absorption by air molecules, plants, etc when a radio signal travels. Bad in moist air and office plants -> water is an especially good absorber of radio signals
Connectorization
placing an RJ-45 connector on the end of a 4-pair UTP cable
Dish antenna
point in a particular direction, which allows for stronger signals. Good for longer distances because of focusing ability.
Network Address Translation (NAT)
presents external IP addresses that are different from internal IP addresses used within a firm.
Broadband channel
radio channels with large bandwidths
Spatial streams
radio signals that are released by the host or access point in the same channel between two or more different antennas on access points and wireless points
Transceivers
radios for data transmission, both transmit and receive.
Modes
rays of lights that enter the core at a few angles
Bandwidth
real signals that are spread out over a range of frequencies. Measured by subtracting the lowest frequency from the highest
ST connector
round connector on one end of an optical fiber cord
Co-channel interference
signals that interfere with each other if nearby access points operate in the same channel, unless the access points are far apart
Subcarrier
smaller subchannels that each broadband channel is divided into
second-level domains
specific organizations domains (microsoft.com, hawaii.edu, cnn.com, ect.)
SC connector
square connector on one end of an optical fiber cord
Secure Sockets Layer (SSL)
standard created by the Netscape Corporation but later passed it to the IETF.
802.1X
standard for Port-Based Access Control on the workgroup switches that give users access to the network
Rapid Spanning Tree Protocol (RSTP)
standard that Ethernet uses to detect and break loops automatically
IEEE Standards Association
standards setting arm of the Institute of Electrical and Electronics Engineers
Workgroup switches
switches that connect hosts to the network
Core switches
switches that connect switches to other switches
Multiple input/multiple output (MIMO)
technique used to double, triple, or quadruple transmission speed (or even increase it more) without increasing channel bandwidth
Backward compatibility
the ability of new access points and wireless clients to work with older equipment, permitting products meeting new standards to be installed gradually over time
Full duplex transmission
the ability to transmit in two directions simultaneously
Roaming
the ability to use handoffs in WLANs
Wavelength
the distance between successive wave heights, troughs, starts, stops, etc
Service set identifier (SSID)
the identifier within the access point in a BSS
Frequency spectrum
the range of all possible frequencies from zero hertz to infinity
Core
the thin strand of glass that optical fiber carries light signals through
Carrier sense (CS)
to listen to (sense) traffic (the carrier, in radio parlance)
Licensed radio bands
transceivers must have a gov't license to operate. e.g. commercial television bands, AM and FM radio bands
Access links
transmission links that connect hosts to workgroup switches
Trunk links
transmission links that connect switches to other switches
Spread spectrum transmission
transmission that uses far wider channels than transmission speed requires
Omnidirectional antenna
transmits signals equally strongly in all directions, as well as receive. Does not need to point in direction of receiver, but only a small fraction of energy reaches the receiver. Best for short distances, like in wireless LAN or cellular telephone network
Serial transmission
transmitting over a single pair of wires
Parallel transmission
transmitting over more than one pair of wires
Link aggregation/bonding
two or more UTP or fiber trunk links to connect a pair of switches. Ethernet supports both
Beamforming
usage of multiple antennas focusing radio power in a particular direction instead of broadcasting isotropically. Signal will be stronger
internal dynamic routing protocols
used to exchange routing table information between routers within an individuals organization or internet.
dynamic routing protocols
used to exchange routing table information between routers.
Multiple access (MS)
uses listening to control how multiple hosts can access the network to transmit. If another device is transmitting, the wireless host or access point does not transmit
Antenna
what transceivers need to transmit its signal. Two types: omnidirectional and dish
Clock cycle
when a device transmits, it holds the signal constant for a brief period of time
LAN speeds are faster than WAN speeds. This is because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons
D) economic reasons
In the telephone system, the lines that connect customers to the nearest switch are called the ________. A) access lines B) local lines C) access loop D) local loop
D) local loop
In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) both A and B D) neither A nor B
D) neither A nor B
asymmetric speed.
DSL residential service provides _____.
3
Deciding what interface and to what device to send the packet back out is step _____ in the routing process.
Power over Ethernet (POE) Plus
Ethernet can provide both data and electrical power, up to 25 watts over the UTP access link
802.3 MAC Layer Standard
Ethernet's only single data layer layer standard. Governs frame organization and switch operation
None of the Above
Express the mask /18 in dotted decimal notation.
255.255.255.0
Express the mask /24 in dotted decimal notation.
Root Privileges
Having all privileges on a computer is known as having _____.
They lease them from telephone companies.
How do WAN carriers typically get their trunk lines?
13
How many DNS root servers are there?
4
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images?
None of the Above
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images?
8
How many fields are there in an IPv6 address written for human reading?
Transport Layer Security (TLS)
IEFT standard that was once SSL.
Internet Control Message Protocol (ICNMP)
IETF protocol used for supervisory messages at the internet layer and goes hand in hand with IP.
Open Shortest Path First (OSPF)
IETF standard for interior routing.
A. Remote-Access B. Site-to-Site C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
IPsec is used for _____ VPNs.
application
IPsec protects _____ layer messages.
Transport Mode
IPsec provides protection in two modes of operation; one of these two modes is _____.
Have a Dual-Stack.
If a host is to be able to communicate via IPv4 and IPv6, it is said to _____.
32-Bits
If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?
126
If you have a subnet part of 7 bits, how many subnets can you have?
254
If your subnet part is 8 bits long, you can have _____ subnets.
A. Splitters B. An ADSL Modem C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
In ADSL, the customer should have _____.
Tracker
In BitForrent, a(n) _____ is a server that coordinates the file transfer.
Index
In BitTorrent, a(n) _____ website is a site the BitTorrent client program goes to in order to get .torrent files.
Domain
In DNS, a group of resources under the control of an organization is called a _____.
8
In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?
security associations.
In IPsec, agreements about how security will be done are called _____.
entire packet minus the main header.
In IPv6, the payload length gives the number of octets in the _____.
First Label-Switching Router
In MPLS, the _____ adds the label to the packet.
Label-Switched Path.
In MPLS, the packet travels along the _____.
before the packet arrives.
In MPLS, the router interface to send the packet back out will be decided _____.
Firewall
In NAT, the _____ creates new external source IP addresses and port numbers.
The SDN Controller
In SDN, a switch receives its forwarding table rules directly from _____.
set
In SNMP, companies are often reluctant to use _____ commands because of security dangers.
Agent
In SNMP, the manager communicates directly with a(n) _____.
Users Input That Is Used In An SQL Query
In SQL injection attacks, the attacker sends _____.
Sent By A User
In XSS, the malicious script that gets placed in a webpage sent to a target is _____.
Client/Server
In _____ File Retrieval, your computer downloads a file from a server.
Network Part
In a Network Mask, the 1s correspond to the _____.
POPs
In a PSDN, customers connect to the network core at _____.
None of the Above
In a Subnet Mask, the 1s correspond to the _____.
1
In a routing table, Row 47 and 3497 both match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches?
Protocol
In an IPv4 packet, the _____ field value tells the type of message contained in the IP packet's data field.
64
In an IPv6 global unicast address, the interface ID is _____ bits long.
a message may not have to be transmitted.
In caching, _____.
Cell
In cellular technology, a _____ is a small geograpihcal area.
Cellsite
In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) _____.
It is hard to say with limited information.
In the IPv4 address 1.2.3.4, What is the Network Port?
24
In the mask 255.255.255.0, how many 1s are there?
Local Loop
In the telephone system, the lines that connect customers to the nearest switch are called the _____.
only between the IPsec Servers.
In tunnel mode, IPsec provides protection _____.
A. Lower Cost B. The Ability to do Traffic Engineering C. Quality of Service D. All of the Above CORRECT ANSWER - D. All of the Above
Label-Switching Routers bring _____.
Fast
Leased Lines offer _____ service.
reduces
MPLS _____ the work that each router must do to deliver a packet during a traffic exchange.
Transparent To
MPLS is _____ the source and destination hosts.
Label Number
MPLS routers base their decisions on a packet's _____.
SMTP
Mail servers communicate with each other by using _____.
1-Pair Voice-Graded UTP
Many "T1" lines that carriers provide today use _____ in the local loop.
second-level
Most corporations wish to have _____ domain names.
5
Most end-office switches are Class _____ switches.
Hertz (Hz)
One cycle per second
Echo Request
Pinging is to send ICMP _____ messages to the target host.
plain text content of e-mail messages.
RFC 822 and RFC 2822 standards govern _____.
Jitter Control
RTP supports _____.
Interfaces
Router connectors are called _____.
Mesh
Routers usually are connected in a _____ topology.
2707
Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. Which row will the router choose if both are matches?
2707
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16 and the reliability metric 10. Which row will the router choose if both are matches?
Inverse square law (1/r^2)
S2 = S1 * (r1/r2)^2. Area of a sphere is proportional to the square of its radius
Signaling
SIP is a _____ protocol for VoIP.
Community Names
SNMPv1 uses _____ for authentication.
a different password for each manager-agent pair
SNMPv3 uses _____ for authentication.
A. Compression B. Voice Quality C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Speech codecs vary with respect to _____.
Wi-Fi
Stems from the Wifi Alliance, an industry consortium of 802.11 product vendors
Benefits of using a central authentication server
Switch cost, consistency, reduced management cost, and rapid changes
1 Mbps
T1 leased lines run at a speed of about _____.
Segments
TCP messages are called _____.
Extended Unique Identifiers
The IEEE calls 64-bit interface addresses _____.
A. Called Party's SIP Proxy Server B. Called Party's VoIP Phone or Computer C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
The SIP invite is transmitted to the _____.
Conduct Audio and Video Surveillance
The Trojan Horse placed on the first compromised GHOSTNET client could _____.
Client Processing Power
The advance that made the client/server application architecture possible was _____.
A Social Engineering Attack
The attack on GHOSTNET began with _____.
A.) Always has the mask /32. B.) Will always match the destination IP address of an incoming packet. C.) Both A and B. D.) Neither A nor B. CORRECT ANSWER - C. Both A and B
The default row _____.
A. is a way to find a host's IP addresses if your computer only knows the Host's Host Name. B. is a general naming system for the Internet. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - C. Both A and B
The domain name system _____.
A. Confidentiality B. Authentication C. Both A and B D. Neither A nor B CORRECT ANSWER: C. Both A and B
The encapsulating security protocol offers _____.
Comparing the packet's destination IP address to all rows.
The first step in the routing process involves _____.
Root Servers
The highest-level DNS servers are called _____.
the ability to support more possible hosts.
The main benefit of IPv6 over IPv4 is _____.
Higher Cost
The main disadvantage of transport mode protection compared to tunnel mode protection in IP is _____.
protection over only part of the route.
The main limit of IPsec tunnel mode protection compared to transport mode protection in IPsec is _____.
Reduce Cost
The main promise of VOIP is to _____.
4
The main version of Internet Protocol in use today is IP Version _____.
It is hard to say with limited information.
The network part of an IPv4 address is _____ bits long.
6
The new version of Internet Protocol that is coming into use is IP Version _____.
Interface ID
The part of an IPv6 global unicast address that designates the host is called the _____.
Higher Speed
The promise of FTTH is _____.
Destination Host
The router selects a row in which the next-hop router is labeled local. The router will send the packet to the _____.
Network
The routing prefix in IPv6 is like the _____ part in an IPv4 address.
32
The total length of an IPv4 address is _____ bits.
0110
The version number field in IPv6 has the value _____.
An Application Architecture
The way in which application layer functions are spread among computers to deliver service to users is called _____.
Ethernet Switching Table
There is a row for each individual Ethernet Address in a(n) _____.
Bonded T1 Lines
To connect two sites at 2.8Mbps, I would use _____.
A. IP Address B. Data Link Layer Address C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
To deliver an arriving packet to a destination host on a subnet connected to a router, the router needs to know the destination host's _____ before the router can send the packet on to the destination host.
Echo Request
To see if a target host can be reached, you normally would send it an ICMP _____ message.
private IP address ranges
To support NAT, the Internet Assigned Numbers Authority (IANA) has created three sets that can only be used in the firm. 10.x.x.x 192.168.x.x (Most Popular) 172.16.x.x through 172.31.x.x
CSU/DSU
To use a leased line, the customer requires a(n) _____ at each site.
LTE
Today's dominant cellular technology is _____.
A single IPv6 stack could not communicate with a single IPv4 stack.
Today, it can be problematic to have only a single IPv6 stack because _____.
P2P Applications
Transient client presence tends to be a problem in _____.
Data
Two-Way Amplifiers are needed for cable _____ service.
Take Over an Application Program
Typically, the most common way for an attacker to get extensive privileges on a computer is to _____.
Application
Users are primarily concerned with the _____ layer.
Always
VOIP _____ uses the Internet Protocol for Transmission.
Codecs
VoIP users have _____ in their phones or on their computers.
at the ends of leased lines.
WAN optimization devices are deployed _____.
A. Network Protocol Acceleration B. Caching C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
WAN optimization provides _____.
It broadcasts them.
What does a router do with Address Resolution Protocol request messages?
None of the Above
What is pushing IPv6 adoption now?
There Is No Almost Universal Standard for End-To-End Encryption.
What is the almost universal standard for end-to-end encryption?
3 Gbps
What speed does the LTE Advanced standard require downstream?
One-Pair Voice-Graded UTP
What transmission medium do ALL DSL services use?
Routing
When a router forwards incoming packets closer to their destination hosts, this is _____.
To The Sender's E-Mail Server
When an e-mail user encrypts an outgoing message with SSL/TLS, How far will this encryption extend?
Differentiated Services Control Point
Which IPv4 header field is used to specify quality of service?
IPsec
Which has stronger security?
UDP
Which header comes SECOND in a VoIP Transport Packet?
Host Part
Which is NOT one of the three parts of a public IPv6 unicast address?
We have run out of them.
Which is a problem with IPv4 addresses?
SSL/TLS
Which is less expensive to implement?
Leased Lines
Which lines run from one customer premise to another?
A. Being In A Moving Car. B. Being Far From the Cellsite. C. Both A and B. D. Neither A nor B. CORRECT ANSWER - C. Both A and B.
Which of the following affects what throughput an individual user will receive?
IPv4
Which of the following allows routers to check for errors in the header when a packet arrives?
Web-Enabled E-Mail
Which of the following allows you to read your e-mail easily on an Internet cafe's computer?
1-Pair VG UTP
Which of the following already runs to nearly all customer premises?
A. Private IP Addresses B. Public IP Addresses C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Which of the following can be used within a firm?
EIGRP
Which of the following can route non-IP packets?
Customer Premises Equipment
Which of the following does the carrier NOT own?
A. To Connect Corporate Sites B. To Connect a Corporate Site to the Internet C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Which of the following is a common use for carrier WANS?
10.x.x.x
Which of the following is a private IP address range?
SETI@Home
Which of the following is a process-sharing application?
Underutilized Processing Capacity of Clients PCs
Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?
A. Cable Modem Service Companies B. ADSL Service Companies C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Which of the following is moving toward FTTH?
Subnet Part
Which of the following is one of the three parts of an IPv4 address?
A. It can enhance security. B. It presents problems for some protocols. C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Which of the following is true about NAT?
HTML
Which of the following is used to define webpage bodies?
HTTP
Which of the following is used to retrieve Web Pages?
Antivirus Software on the Mail Server
Which of the following offers more reliable antivirus protection?
PGP
Which of the following provides end-to-end encryption?
SIP
Which of the following signaling standards is likely to dominate in VoIP?
IPsec
Which of the following standards permits central management?
Login, Signaling, Transport
Which of the following steps are done in order during a call with Skype?
A. Number of Rows in Routing Table B. System Uptime (Since Last Reboot) C. Both A and B D. Neither A nor B CORRECT ANSWER - C. Both A and B
Which of the following would be an SNMP object?
Number of Rows in Routing Table
Which of the following would be an SNMP object?
254
You have a 20-bit network part and a 4-bit subnet part. How many hosts can you have per subnet?
65,534
Your firm has an 8-bit network part and an 8-bit subnet part. How many hosts can you have per subnet?
8
Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be?
DNS
_____ is a general naming system for the Internet.
NAT
_____ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.
ICMP
_____ is used for supervisory messages at the internet layer.
Extended service set (ESS)
a group of BSSs that are both connected to the same distribution system and all of the access points have the same SSID
Frame
a long series of 1s and 0s
Dead zone
a receiver cannot get a signal if there is a dense object blocking the direct path between sender and itself. Also known as shadow zone or dead spot
community name
a secret name the manger and all managed devices had to be configured to for SNMP Set Security.
RJ-45 connector
a snap-in connector that 4-pair UTP uses
Cladding
a thin glass cylinder surrounding the core. light never enters it. 125 micron diameter
Distribution system (DS)
a wired Ethernet LAN which access points connect to
Multiuser MIMO (MU-MIMO)
access points focus on two wireless devices at the same time. With focused transmissions, it can communicate with two or more devices at the same time, eliminating time device has to wait before transmitting
security associations (SAs)
agreements about what security methods and options the two devices will use when the communicate.
Access point
an 802.11 wireless access point, which wireless clients communicate wirelessly (by radio) to
domain
any group of resources (routers, single networks and hosts) under the control of an organization.
Collision avoidance (CA)
attempts to avoid two devices transmitting at the same time. Adds a random delay time to decide which device may transmit first. Works, but is inefficient because it adds a dead time when no one is transmitting
Channel bandwidth
bandwidth of individual channels. Must be wide enough for a signal's bandwidth
4-pair unshielded twisted pair (UTP) copper wire
carries electronic signals over copper wire
Optical fiber
carries light signals through very thin glass tubes
Normal radio transmission
channel bandwidths are limited to the speed requirements of the user's signal to allow as many channels as possible.
Unlicensed radio bands
company can add or drop access points at any time, as well as having as many wireless hosts as it wishes. All 802.11 Wi-Fi networks operate in these
Top-Level Domain
".com" is a _____.
Top-Level Domain
".edu" is a _____.
Microns
(micrometers or um)
Tag fields (two)
-first indicates frame is tagged -seconds gives tagged information
Control functions are located in routers in ________. A) traditional routing B) SDN C) both A and B D) neither A nor B
A) traditional routing
MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on
A) transparent to
IPv6 global unicast addresses
single host address that can be transmitted over the internet. Three Parts routing prefix- lets router on the Internet route packets to an organization. subnet ID- lets routers within a firm route packets to individual subnets within a firm. interface ID- identifies and individual host in the firm.
Modal dispersion
slightly different times of arrival due to traveling different distances
Baseband signal
the original signal that's energy is spread over a much broader channel than is required
Management Information Base (MIB)
the place where managers retrieve information from agents on managed devices is stored.
Amplitude
the strength of the signal
In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the packet arrives C) by a dynamic routing protocol D) none of the above
B) before the packet arrives
To connect two sites at 2.8 Mbps, I would use ________. A) a T1 line B) bonded T1 lines C) a T2 line D) a T3 line
B) bonded T1 lines
Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B
B) business
Which of the following DSL services usually offers QoS guarantees? A) residential B) business C) both A and B D) neither A nor B
B) business
In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier
B) cellsite
The creation of routing tables for a router is an example of ________. A) forwarding B) control C) both A and B D) neither A nor B
B) control
Which of the following does the carrier NOT own? A) the network core B) customer premises equipment C) both A and B D) neither A nor B
B) customer premises equipment
Two-way amplifiers are needed for cable ________ service. A) television B) data C) both A and B D) neither A nor B
B) data
In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) both A and B D) neither A nor B
B) first label-switching router
MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B
B) label number
OpenFlow can be used to standardize ________. A) northbound APIs B) southbound APIs C) both A and B D) neither A nor B
B) southbound APIs