ISM 4220 Final Practice Questions

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________. -0 -1 -254 -256

-1

In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches? -1 -47 -3497 -the default row

-1

Your firm has a 22-bit network part and a 6-bit subnet part. How many hosts can you have per subnet? -6 -8 -14 -16

-14

A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission? -1 -2 -4 -there will be one frame for each switch along the way

-2

A change in power from 100 W to 1 W corresponds to approximately ________ decibels. -(-10) -(-20) -10 -20

-20

In the mask 255.255.255.0, how many 1s are there? -8 -16 -24 -it cannot be determined from the given information

-24

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix? -16 bits -32 bits -64 bits -it cannot be determined from the given information

-32 bits

Most end-office switches are Class ________ switches. -1 -2 -3 -5

-5

Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be? -6 -7 -8 -9

-8

Which of the following uses OFDM? -802.11n -802.11ac and 802.11n -802.11 -802.11ac

-802.11ac and 802.11n

A change in power from 2 mW to 17 mW corresponds to approximately ________ decibels. -3 -9 -12 -20

-9

The DNS _____ record is for the host name's _____ address. -AAAA; IPv6 -A; IPv6 -AAAA; IPv4 -none of the above

-AAAA; IPv6

In IPv4, the ____ field is used to deal with congestion the Internet. -time to live -header checksum -DiffServ -ECN

-ECN

Which of the following can route non-IP packets? -EIGRP -OSPF -both -neither

-EIGRP

Most wireless systems operate in the _____ range -MHz -kHz -hz -GHz

-GHz

A group of devices on a desk that communicate wirelessly is called a ________. -LAN -WAN -MAN -PAN

-PAN

To connect to an access point, you must know its ________. -SSID -ESSID -IP address -Wi-Fi ID

-SSID

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks? -VLANs -VPNs -802.1X mode -none of the above

-VPNs

The Wi-Fi Alliance calls 802.11i _____. -WEP -WPA -WPA2 -none of the above

-WPA2

If the other wireless device is far away in a known direction it would be better to use _____. -a regular antenna -an omnidirectional antenna -a dish antenna -none of the above

-a dish antenna

At 10 meters, a signal has a strength of 100 mW. About how strong will it be at 40 meters? -about 5 mW -about 0.5 mW -about 6 mW -about 25 mW

-about 6mW

In 802.11i, protection is provided between the client and the _____. -switch -router -server -access point

-access point

If a cellsite uses Channel 237, which other cellsites can reuse the channel? -adjacent cellsites -cellsites 2 beyond adjacent cells -cellsites 1 beyond adjacent cells -no other cellsites

-adjacent cellsites

In SNMP, the manager communicates directly with a(n) _____. -access point -agent -object -managed device

-agent

A rogue access point is usually created by ____. -an employee -an external attacker -the IT security department -an evil twin

-an employee

Which of the following would be an SNMP object? -system uptime -number of rows in routing table -both -neither

-both

Classic Bluetooth provides transmission speeds of ________. -3 Mbps -24 Mbps -both of the above -none of the above

-both of the above

In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) _____. -cellsite -cell -MTSO -wireline carrier

-cellsite

For their transmission medium, cable television companies primarily use ________. -4 pair UTP -2 pair DG UTP cabling -coaxial cable -2 pair VG UTP cabling

-coaxial cable

Which of the following does the carrier NOT own? -the network core -customer premises equipment -the network core and the customer premises equipment -none of the above

-customer premises equipment

In transport mode, ESP fields surround an IPv4 packet's _____. -header -data field -entire length -none of the above

-data field

If the next-hop router field in the best-match row says "local", the router should address the packet to the ________. -default router -local router -destination host -none is correct

-destination host

After 2 wireless clients authenticate themselves via PSK to an access point, they will use _____ to communicate with the access point. -an 802.1X key -WPA keys -the pre shared key -different pairwise session keys

-different pairwise session keys

There is a row for each host address in a(n) _____. -ethernet switching table -modem table -routing table -none of the above

-ethernet switching table

Compared to ADSL service, cable modem traditionally has been ________. -slower and more expensive -faster and more expensive -slower and less expensive -faster and less expensive

-faster and more expensive

In NAT, the ________ creates new external source IP addresses and port numbers. -firewall -source host -destination host -router

-firewall

Which is NOT one of the 3 parts of a public IPv6 unicast address? -host part -subnet ID -routing prefix -all of the above are parts of a public IPv6 unicast address?

-host part

Router sockets for wire and optical fiber cords are called ________. -interfaces -ports -sockets -plugs

-interfaces

The downside of unlicensed bands is potential ________ -interference from others -loss of flexibility -less developed standards -speed loss

-interference from others

If you triple bandwidth, what happens to the number of channels in the service band? -it is reduced to a third -it triples -it increases by a factor of nine -it is reduced to a ninth

-it is reduced to a third

If no other row matches, the router will select the ________ row as its best match. -first -last -depends on the circumstances -none of the above

-last

The Internet is organized in a _____. -hierarchy -ring -mesh -none of the above

-mesh

The PSTN core is organized as a _____. -loop -modified hierarchy -hierarchy -mesh

-modified hierarchy

Spread spectrum transmission is used in WLANs for _____. -more efficient transmission -greater security -higher transmission speed -more reliable transmission

-more reliable transmission

A border router connects different IP ________. -networks -subnets -subnets & networks -none of the above

-networks

A channel extends from 55 MHz to 60 MHz. Its bandwidth is ________. -55 MHz -58 MHz -60 MHz -none of the above

-none of the above

If you have a subnet part of 7 bits, how many subnets can you have? -128 -256 -512 -none of the above

-none of the above

The set of frequencies used for police communication in a city are _____. -spectrums -channels -frequencies -none of the above

-none of the above

Which is the correct formula for decibels? -10 * P2/P1 -10 * (P2/P1)^2 -Log10(P2/P1) -none of the above

-none of the above

What transmission medium do all ADSL services use? -one pair voice grade UTP -one pair data grade UTP -two pair data grade UTP -none of the above

-one pair voice grade UTP

CSMA/CA+ACK is _____. -reliable -unreliable -semi reliable -none of the above

-reliable

802.11i PSK initial authentication mode was created for ________. -corporations with multiple access points -residences with a single access point -residences with less than eight access points -corporations with less than eight access points

-residencies with a single access point

Cells are used in cellular telephony to provide ________. -greater reliability -service for more customers -greater transmission speed -all of the above

-service for more customers

Multipath interference is mitigated through _____. -broadband transmission -MIMO -beamforming -spread spectrum transmission

-spread spectrum transmission

An internal router connects different IP ________. -networks -subnets -subnets & networks -none of the above

-subnets

For cost reasons, you should ________ where you can, ________ where you must. -route; route -route; switch -switch; route -switch; switch

-switch; route

Access points in the same ESS communicate via ________. -a master access point -routers -the distribution system -wireless transmission

-the distribution system

When a wireless client in an evil twin attack transmits, _____. -the evil twin reads the packet, encrypts it, and passes on the packet -the evil twin reads the packet and passes on the packet -the evil twin reads the frame and passes on the frame -the evil twin reads the frame, encrypts it, and passes on the frame

-the evil twin reads the frame, encrypts it, and passes on the frame

If the local DNS server does not know an IP address and must contact a remote DNS server, which DNS server will return the response to the client? -the local DNS server -the remote DNS sever -either the remote DNS server or the local DNS server -no IP address will be returned to the client

-the local DNS server

How do WAN carriers typically get their trunk lines? -they construct them. -they lease them from telephone companies. -they use wireless transmission. -they use the Internet.

-they lease them from telephone companies

".com" is a _____. -second level domain -top level domain -root domain -none of the above

-top level domain

If a company uses 802.11i for its core security protocol, an evil twin access point will set up _____ 802.11i connection(s). -one -two -four -none of the above

-two

When does it make sense to use RTS/CTS? -when not all of the devices can hear each other -always -when efficiency is crucial -when all devices can hear each other

-when not all of the devices can hear each other

In 802.1X initial authentication mode, the authenticator is the _____. -authentication server -wireless access point -wireless client -none of the above

-wireless access point

Bluetooth ________ is likely to be used most of the time in IoT transmission. -HS -COIN -LE -HDR

LE

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.

fffe


Set pelajaran terkait

Foundations of Networking Midterm

View Set

PART 2 CP4D ASSESSMENT TEST, version 2.5, accuracy 74%

View Set

Intro to Nutrition: Chapter 4 Quiz/Quiz 4

View Set