MIS 3317 Quiz 5
Most end-office switches are Class ________ switches. A) 1 B) 2 C) 4 D) 5
5
Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B
both A and B
A network that runs on the customer premises is a ________. A) LAN B) WAN C) both A and B D) neither A nor B
LAN
Which of the following usually offers higher speeds? A) LANs B) WANs C) Both A and B are about equal in typical speeds.
LANs
The first line in an HTTP response message is called the ________. A) status line B) command line C) reply line D) response line
status line
For Netflix, Google is a(n) ________. A) IaaS B) SaaS C) both A and B D) neither A nor B
SaaS
Decent data transmission for Web surfing began with ________ technology. A) 1G B) 2G C) 3G D) 4G
3G
How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A) 3 B) 4 C) 88 D) 91
4
Which generation is now bringing speeds of about 10 Mbps? A) 2G B) 3G C) 4G D) 5G
4G
WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the MPLS carrier D) by the ISP
at the ends of leased lines
Which of the following receive rights of way for transmission beyond sites? A) corporations B) carriers C) both A and B D) neither A nor B
carriers
The primary applications architecture is ________. A) TCP/IP B) OSI C) client/server D) HTTP
client/server
For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP
coaxial cable
Two-way amplifiers are needed for cable ________ service. A) television B) data C) both A and B D) neither A nor B
data
The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B
higher speed
P2P applications ________. A) increase IT control B) increase user control C) both A and B D) neither A nor B
increase user control
Creating a new VM is ________. A) booting B) startup C) birthing D) instantiation
instantiation
Which of the following is a file format standard? A) HTML B) HTTP C) both A and B D) neither A nor B
HTML
In Web-based e-mail, when a client sends a message to its mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP
HTTP
Which of the following is a file transfer standard? A) HTML B) HTTP C) both A and B D) neither A nor B
HTTP
The Internet is a ________. A) LAN B) WAN C) both A and B D) neither A nor B
WAN
Which of the following has more diversity in technologies? A) LANs B) WANs C) Both A and B are about equal in diversity of technologies.
WANs
In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B
ADSL modem
In cloud computing, latency is important for ________. A) AI-based cloud applications B) e-mail C) both A and B D) neither A nor B
AI-based cloud applications
Why is link-by-link encryption for confidentiality not fully secure even if there is encryption for confidentiality in all links along the way? A) There cannot be confidentiality on each link. B) Devices along the way may not be secure. C) both A and B D) neither A nor B
Devices along the way may not be secure
In Carrier Ethernet, which connects multiple distant sites into a single Ethernet network? A) E-Line service B) E-LAN service C) both A and B D) neither A nor B
E-LAN service
In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B
E-Line
T/F A media gateway connects a client computer, or VoIP phone, to the VoIP network.
False
T/F In VoIP traffic, the data field in a signaling packet usually carries codec data.
False
T/F In e-mail, UNICODE enhances security.
False
T/F Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.
False
T/F When carriers use the terms "4G" and "5G," they use these terms in ways that comply with standards.
False
For Netflix, ________ is a(n) ________, and ________ is a(n) ________. A) Google; IaaS; AWS; IaaS B) Google; SaaS; AWS; SaaS C) Google; IaaS; AWS; SaaS D) Google; SaaS; AWS; IaaS
Google; SaaS; AWS; IaaS
Which of the following allows you to read your e-mail easily on an Internet café's computer? A) IMAP B) HTTP C) HTML D) SMTP
HTTP
A traditional e-mail user retrieving messages from her mail server could use ________. A) IMAP B) HTTP C) HTML D) SMTP
IMAP
For Netflix, AWS is a(n) ________. A) ISP B) IaaS C) SaaS D) all of the above
IaaS
CSPs often offer ________. A) ISP services B) IaaS services C) both A and B D) neither A nor B
IaaS services
A company has more control over its ________ technology. A) LAN B) WAN C) It has about equal control over both.
LAN
Which of the following is the most expensive to use? A) Traditional routing B) MPLS C) carrier Ethernet D) the Internet
MPLS
Which spends less processing time on each packet arriving at a router? A) traditional routing B) MPLS C) Both spend about equal time.
MPLS
A customer's leased line to its ISP connects to the ISP's ________. A) POP B) terminal point C) CSU/DSU D) interface
POP
Codec data comes after the ________ header in VoIP transport frames. A) IP B) TCP C) UDP D) RTP
RTP
Which of the following provides end-to-end encryption? A) SSL/TLS B) S/MIME C) both A and B D) neither A nor B
S/MIME
In traditional e-mail, when a client sends a message to its mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP
SMTP
When the sender's mail host sends the message to the receiver's mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP
SMTP
Which type of service manages application software for users? A) IaaS B) SaaS C) both A and B D) neither A nor B
SaaS
Many T1 lines are ________. A) optical fiber lines B) Asymmetric DSL lines C) Symmetric DSL lines D) none of the above
Symmetric DSL lines
If you need speeds of 1.2 Mbps between two corporate sites in the United States, you would need a ________ leased line. A) T1 B) T3 C) OC3 D) none of the above
T1
If you need speeds of 16 Mbps between two corporate sites in the United States, you would need a ________ leased line. A) T1 B) T3 C) OC3 D) none of the above
T3
What is the universal standard for end-to-end encryption? A) SSL/TLS B) IPsec C) S/MIME D) There is no universal standard for end-to-end encryption.
There is no universal standard for end-to-end encryption
How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.
They lease them from telephone companies
T/F A networked application requires a network to operate.
True
T/F In MPLS, the label-switched routers in the middle do not look at a packet's IP address.
True
For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) SIP D) IP
UDP
E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) MIME D) UNICODE
UNICODE
Which of the following forms of e-mail is usually easier to use if you are using someone else's computer? A) Webmail B) Mail programs using SMTP and POP C) Mail programs using SMTP and IMAP D) none of the above
Webmail
For ADSL service, which of the following typically must be added to the telephone system? A) a DSLAM B) a transmission line to the customer premises C) both A and B
a DSLAM
If a cellsite uses Channel 237, which other cellsites can reuse the channel? A) adjacent cellsites B) cellsites one beyond adjacent cells C) cellsites two beyond adjacent cells D) no other cellsites
adjacent cellsites
On networks, cloud computing is increasing the need for ________. A) sudden changes in traffic B) reliability C) controlled latency D) all of the above
all of the above
VoIP ________ uses the Internet Protocol for transmission. A) always B) usually C) seldom D) never
always
Which tends to have a data field? A) an HTTP request message B) an HTTP response message C) both A and B D) neither A nor B
an HTTP response message
The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture
an application architecture
Tor provides the sending host with ________. A) end-to-end confidentiality B) anonymity C) both A and B D) neither A nor B
anonymity
DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B
asymmetric speed
Firms generally pay the added cost of MPLS for connecting their sites ________. A) because it has higher transmission speeds B) because it can do traffic engineering C) because it uses familiar technology D) all of the above
because it can do traffic engineering
In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the first data packet is sent C) by a dynamic routing protocol D) none of the above
before the first data packet is sent
Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B
business
For cable modem service, customers need ________. A) cable modems B) splitters C) both A and B D) neither A nor B
cable modems
Which reduces traffic more when sending long files? A) compression B) caching C) both A and B D) neither A nor B
caching
Compared to physical servers, virtual machines ________. A) can be moved more easily B) potentially have infinite capacity C) both A and B D) neither A nor B
can be moved more easily
Skype login is necessary so that the user ________. A) can find the IP address of a Skype proxy server B) can find the IP address of a client it wishes to communicate with C) can find her own Skype address D) none of the above
can find the IP address of a Skype proxy server
In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B
cell
In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier
cellsite
VoIP users have ________ in their phones or on their computers. A) media gateways B) codecs C) both A and B D) neither A nor B
codecs
Which of the following does the carrier NOT own? A) the network core B) customer premises equipment C) both A and B D) neither A nor B
customer premises equipment
In Skype, transport is governed by ________. A) peers providing signaling B) super nodes C) Skype servers D) direct communication between the calling and receiving peers
direct communication between the calling and the receiving peers
The primary applications architecture is ________. A) TCP/IP B) OSI C) both A and B D) neither A nor B
neither A nor B
Tor provides confidentiality ________. A) only between the source host and the first Tor router B) all the way to the destination host C) both A and B D) neither A nor B
neither A nor B
How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A) 1 B) 2 C) 3 D) none of the above
none of the above
If you are downloading a webpage containing three graphics images, which file will you download first? A) The first image. B) The second image. C) The third image. D) none of the above
none of the above
Compared to the Internet, carrier WANs ________. A) offer higher-quality service B) can reach more customers C) both A and B D) neither A nor B
offer higher-quality service
What transmission medium do ALL DSL services use? A) one-pair data-grade UTP B) two-pair data-grade UTP C) one-pair voice-grade UTP D) none of the above
one-pair voice-grade UTP
A ________ may have multiple ________. A) physical server; virtual machines B) virtual machine; physical servers C) both A and B D) neither A nor B
physical server; virtual machines
Traffic shaping reduces traffic by ________. A) compression B) preventing or limiting undesirable traffic from entering the network C) both A and B
preventing or limiting undesirable traffic from entering the network
Netflix uses AWS for its ________. A) recommendation system B) content delivery appliances C) both A and B D) neither A nor B
recommendation system
Content delivery networks mainly ________. A) increase transmission speed B) increase program selection C) decrease program selection D) reduce latency
reduce latency
MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces
reduces
Compression reduces traffic by ________. A) reducing redundancy in the data B) preventing undesirable traffic from entering the network C) both A and B D) neither A nor B
reducing redundancy in the data
The first line in an HTTP request message is called the ________. A) request line B) status line C) both A and B D) neither A nor B
request line
Having all privileges on a computer is known as having ________. A) access B) totality C) root privileges D) mojo
root privileges
The explosion of apps on small mobile devices raises ________ issues. A) cumulative cost B) inventory control C) security D) network load
security
When you login to a website and it responds by saying, "Hello yourname," this is primarily creates a ________ problem. A) security B) privacy C) user interface D) network
security
An IaaS owns and operates ________. A) servers B) application programs C) both A and B D) neither A nor B
servers
IaaSs own ________. A) application software B) servers C) both A and B D) neither A nor B
servers
Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above
service for more customers
In which VoIP phase does Skype implement with peer-to-peer service? A) signaling B) login C) both A and B D) neither A nor B
signaling
SIP is a ________ protocol for VoIP. A) signaling B) transport C) both A and B D) neither A nor B
signaling
Which phase of VoIP is different in traditional VoIP and Skype? A) signaling B) transport C) login D) none of the above
signaling
In Skype, a directory search to find the IP address of a client to be called, is done by ________. A) peers B) super nodes C) Skype servers D) direct communication between the calling and receiving clients
super nodes
In Skype, signaling is done by ________. A) peers B) super nodes C) direct communication between the calling and receiving clients D) none of the above
super nodes
Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B
the Internet
Asymmetric residential service is good for ________. A) the World Wide Web B) videoconferencing C) both A and B D) neither A nor B
the World Wide Web
MPLS brings ________. A) lower cost than the Internet B) the ability to do traffic engineering C) both A and B D) neither A nor B
the ability to do traffic engineering
In Tor, ________ can read the content of the message delivered to the destination host. A) no Tor router B) all Tor routers C) the first Tor router D) the last Tor router
the last Tor router
In a telephone system, the lines that connect customers to the nearest switch are called ________. A) trunk lines B) local lines C) the access loop D) the local loop
the local loop
T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps
1 Mbps
Which of the following already runs to nearly all customer premises? A) 4-pair UTP B) 1-pair VG UTP C) 1-pair DG UTP D) 2-pair DG UTP
1-pair VG UTP
Many lines sold as T1 lines actually use ________. A) 1-pair voice-grade UTP B) 1-pair data-grade UTP C) 2-pair data-grade UTP D) optical fiber
1-pair voice-grade UTP
To use a leased line, the customer must have a(n) ________ at each site. A) compatible switch B) compatible router C) CSU/DSU D) modem
CSU/DSU
There is usually a time difference ________. A) between transmission from the sender to his or her mail server and the transmission to the receiver's mail server B) between transmission to the receiver's mail server and the reading of the message by the receiver. C) both A and B D) neither A nor B
between transmission to the receiver's mail server and the reading of the message by the receiver
5G will bring ________. A) higher speeds than 4G B) energy-efficient low speeds C) both A and B D) neither A nor B
both A and B
A media gateway translates ________ methods. A) signaling B) transport C) both A and B D) neither A nor B
both A and B
An IaaS owns ________. A) servers B) application programs C) both A and B D) neither A nor B
both A and B
An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B
both A and B
Cloud customers are concerned that ________. A) their data might be hacked B) the government may access their data secretly C) both A and B D) neither A nor B
both A and B
Compared to the Internet, Layer 2 and Layer 3 carrier WAN services usually ________. A) offer QoS guarantees B) require less management labor in the customer organization C) both A and B D) neither A nor B
both A and B
DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B
both A and B
Falling network costs are resulting in ________. A) the consolidation of servers B) server farms for cloud computing C) both A and B D) neither A nor B
both A and B
Fiber to the home service is normally offered by ________. A) cable television companies B) telephone companies C) both A and B D) neither A nor B
both A and B
Growing client processing power was a major driving force behind the ________ application architecture. A) client/server B) P2P C) both A and B D) neither A nor B
both A and B
How does carrier Ethernet differ from traditional Ethernet? A) It is offered by carriers instead of being installed and managed by the company using it. B) It is for MAN and WAN services. C) both A and B D) neither A nor B
both A and B
In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) both A and B D) neither A nor B
both A and B
Netflix transcoding is based on ________. A) network speed B) the user's display device characteristics C) both A and B D) neither A nor B
both A and B
Skype provides ________. A) Voice over IP B) Video over IP C) both A and B D) neither A nor B
both A and B
Speech codecs vary with respect to ________. A) compression B) voice quality C) both A and B D) neither A nor B
both A and B
The SIP invite is transmitted to the ________. A) called party's SIP proxy server B) called party's VoIP phone or computer C) both A and B D) neither A nor B
both A and B
Traffic shaping reduces traffic by ________. A) preventing certain undesirable traffic from entering the network B) limiting the amount of certain undesirable traffic entering the network C) both A and B D) neither A nor B
both A and B
VoIP is an acronym for ________. A) Voice over IP B) Video over IP C) both A and B D) neither A nor B
both A and B
When a cloud client customer moves from one client machine to another, ________. A) the same data files are available B) the same application software personalization is in effect C) both A and B D) neither A nor B
both A and B
When a message arrives at a Tor router, the router ________. A) decrypts the arriving message B) erases its memory of the source address C) both A and B D) neither A nor B
both A and B
Which of the following affects what cellular throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B
both A and B
Which of the following can sometimes be accelerated by changing their operation? A) Application protocols B) Network protocols C) both A and B D) neither A nor B
both A and B
Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B
both A and B
Which of the following reduces traffic? A) compression B) traffic shaping C) both A and B D) neither A nor B
both A and B
Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It is usually easy to upgrade speed rapidly. C) both A and B D) neither A nor B
both A and B
Why is Carrier Ethernet popular? A) It uses familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B
both A and B
In MPLS, if two packets arrive in order going to the same IP address, MPLS will ________. A) send the second on doing a simple cache lookup B) go through the entire routing process for the second packet C) do a simple table lookup for the second packet D) none of the above
do a simple table lookup for the second packet
LAN speeds are faster than WAN speeds because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons
economic reasons
MAN speeds are faster than WAN speeds because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons
economic reasons
LANs are ________. A) single networks B) local internets C) either A or B D) neither A nor B
either A or B
WANs include ________. A) single networks B) the Internet C) either A or B D) neither A nor B
either A or B
Leased lines offer ________ service. A) fast B) any-to-any C) both A and B D) neither A nor B
fast
Compared to ADSL service, cable modem traditionally has been ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive
faster and more expensive
In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) either A or B D) neither A nor B
first label-switching router
In cellular technology, G stands for ________. A) goodness B) grade C) ground wave D) generation
generation
The main advance that made the client/server application architecture possible was ________. A) the Internet B) growing client processing power C) growing application sophistication D) new input/output methods
growing client processing power
Netflix has the most VMs ________. A) on weekends B) on weekdays C) in the evenings D) The number of VMs is fixed over periods of a month or longer.
in the evenings
RTP supports ________. A) faster transmission speed B) jitter control C) both A and B D) neither A nor B
jitter control
In HTTP, each line after the first begins with a ________. A) keyword B) command C) CRLF D) value
keyword
MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B
label number
Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B
leased lines
In e-mail, SSL/TLS provides ________. A) link encryption B) end-to-end encryption C) both A and B D) neither A nor B
link encryption
A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above
links different sites together
In which VoIP phase does Skype use a server instead of service directly between peers? A) signaling B) transport C) login D) none of the above
login
The PSTN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop
modified hierarchy
For ________, Netflix owns and operates the servers. A) its recommendation system B) e-mail C) both A and B D) neither A nor B
neither A nor B
In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) both A and B D) neither A nor B
neither A nor B
Typically, the most common way for an attacker to get extensive privileges on a computer is ________. A) to take over an application program B) to take over the operating system C) to take over a computer's hardware D) privilege escalation after a hack
to take over an application program
When an e-mail user encrypts an outgoing message with SSL/TLS, how far will this encryption extend? A) to the sender's e-mail server B) to the receiver's e-mail server C) to the receiver's client host D) to an application program on the receiver's client host
to the sender's e-mail server
Speech codecs ________. A) translate human voice signals into digital signals for transmission B) translate human voice signals into analog signals for transmission C) both A and B D) neither A nor B
translate human voice signals into digital signals for transmission
MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on
transparent to
Which of the following is considered a bigger problem with client/server architecture than peer-to-peer architecture? A) underutilized processing capacity of client PCs B) potential for essential data/services to become unavailable because devices providing services are often turned off C) lack of corporate control D) none of the above
underutilized processing capacity of client PCs
A lesson of XSS is that programmers should never trust ________. A) contractors B) their own staff colleagues C) databases D) user input
user input
Why is Carrier Ethernet popular? A) uses a familiar technology B) offers predictable pricing over multi-year periods C) both A and B D) neither A nor B
uses a familiar technology