MIS 3317 Quiz 5

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Most end-office switches are Class ________ switches. A) 1 B) 2 C) 4 D) 5

5

Which of the following is moving toward FTTH? A) cable modem service companies B) ADSL service companies C) both A and B D) neither A nor B

both A and B

A network that runs on the customer premises is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

LAN

Which of the following usually offers higher speeds? A) LANs B) WANs C) Both A and B are about equal in typical speeds.

LANs

The first line in an HTTP response message is called the ________. A) status line B) command line C) reply line D) response line

status line

For Netflix, Google is a(n) ________. A) IaaS B) SaaS C) both A and B D) neither A nor B

SaaS

Decent data transmission for Web surfing began with ________ technology. A) 1G B) 2G C) 3G D) 4G

3G

How many HTTP request-response cycles are needed to transfer a webpage containing 88 lines of text and three different images? A) 3 B) 4 C) 88 D) 91

4

Which generation is now bringing speeds of about 10 Mbps? A) 2G B) 3G C) 4G D) 5G

4G

WAN optimization devices are deployed ________. A) at the ends of leased lines B) by the telephone carrier C) by the MPLS carrier D) by the ISP

at the ends of leased lines

Which of the following receive rights of way for transmission beyond sites? A) corporations B) carriers C) both A and B D) neither A nor B

carriers

The primary applications architecture is ________. A) TCP/IP B) OSI C) client/server D) HTTP

client/server

For their transmission medium, cable television companies primarily use ________. A) 2-pair VG UTP cabling B) 2-pair DG UTP cabling C) coaxial cable D) 4-pair UTP

coaxial cable

Two-way amplifiers are needed for cable ________ service. A) television B) data C) both A and B D) neither A nor B

data

The promise of FTTH is ________. A) higher speed B) lower cost C) both A and B D) neither A nor B

higher speed

P2P applications ________. A) increase IT control B) increase user control C) both A and B D) neither A nor B

increase user control

Creating a new VM is ________. A) booting B) startup C) birthing D) instantiation

instantiation

Which of the following is a file format standard? A) HTML B) HTTP C) both A and B D) neither A nor B

HTML

In Web-based e-mail, when a client sends a message to its mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP

HTTP

Which of the following is a file transfer standard? A) HTML B) HTTP C) both A and B D) neither A nor B

HTTP

The Internet is a ________. A) LAN B) WAN C) both A and B D) neither A nor B

WAN

Which of the following has more diversity in technologies? A) LANs B) WANs C) Both A and B are about equal in diversity of technologies.

WANs

In ADSL, the residential customer needs a(n) ________. A) DSLAM B) ADSL modem C) both A and B D) neither A nor B

ADSL modem

In cloud computing, latency is important for ________. A) AI-based cloud applications B) e-mail C) both A and B D) neither A nor B

AI-based cloud applications

Why is link-by-link encryption for confidentiality not fully secure even if there is encryption for confidentiality in all links along the way? A) There cannot be confidentiality on each link. B) Devices along the way may not be secure. C) both A and B D) neither A nor B

Devices along the way may not be secure

In Carrier Ethernet, which connects multiple distant sites into a single Ethernet network? A) E-Line service B) E-LAN service C) both A and B D) neither A nor B

E-LAN service

In Carrier Ethernet, which service is a competitor for leased line service? A) E-Line B) E-LAN C) both A and B D) neither A nor B

E-Line

T/F A media gateway connects a client computer, or VoIP phone, to the VoIP network.

False

T/F In VoIP traffic, the data field in a signaling packet usually carries codec data.

False

T/F In e-mail, UNICODE enhances security.

False

T/F Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.

False

T/F When carriers use the terms "4G" and "5G," they use these terms in ways that comply with standards.

False

For Netflix, ________ is a(n) ________, and ________ is a(n) ________. A) Google; IaaS; AWS; IaaS B) Google; SaaS; AWS; SaaS C) Google; IaaS; AWS; SaaS D) Google; SaaS; AWS; IaaS

Google; SaaS; AWS; IaaS

Which of the following allows you to read your e-mail easily on an Internet café's computer? A) IMAP B) HTTP C) HTML D) SMTP

HTTP

A traditional e-mail user retrieving messages from her mail server could use ________. A) IMAP B) HTTP C) HTML D) SMTP

IMAP

For Netflix, AWS is a(n) ________. A) ISP B) IaaS C) SaaS D) all of the above

IaaS

CSPs often offer ________. A) ISP services B) IaaS services C) both A and B D) neither A nor B

IaaS services

A company has more control over its ________ technology. A) LAN B) WAN C) It has about equal control over both.

LAN

Which of the following is the most expensive to use? A) Traditional routing B) MPLS C) carrier Ethernet D) the Internet

MPLS

Which spends less processing time on each packet arriving at a router? A) traditional routing B) MPLS C) Both spend about equal time.

MPLS

A customer's leased line to its ISP connects to the ISP's ________. A) POP B) terminal point C) CSU/DSU D) interface

POP

Codec data comes after the ________ header in VoIP transport frames. A) IP B) TCP C) UDP D) RTP

RTP

Which of the following provides end-to-end encryption? A) SSL/TLS B) S/MIME C) both A and B D) neither A nor B

S/MIME

In traditional e-mail, when a client sends a message to its mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP

SMTP

When the sender's mail host sends the message to the receiver's mail host, what standard does it use? A) HTTP B) HTML C) SMTP D) FTP

SMTP

Which type of service manages application software for users? A) IaaS B) SaaS C) both A and B D) neither A nor B

SaaS

Many T1 lines are ________. A) optical fiber lines B) Asymmetric DSL lines C) Symmetric DSL lines D) none of the above

Symmetric DSL lines

If you need speeds of 1.2 Mbps between two corporate sites in the United States, you would need a ________ leased line. A) T1 B) T3 C) OC3 D) none of the above

T1

If you need speeds of 16 Mbps between two corporate sites in the United States, you would need a ________ leased line. A) T1 B) T3 C) OC3 D) none of the above

T3

What is the universal standard for end-to-end encryption? A) SSL/TLS B) IPsec C) S/MIME D) There is no universal standard for end-to-end encryption.

There is no universal standard for end-to-end encryption

How do WAN carriers typically get their trunk lines? A) They construct them. B) They lease them from telephone companies. C) They use wireless transmission. D) They use the Internet.

They lease them from telephone companies

T/F A networked application requires a network to operate.

True

T/F In MPLS, the label-switched routers in the middle do not look at a packet's IP address.

True

For the transport layer, VoIP uses ________ for transport transmission. A) TCP B) UDP C) SIP D) IP

UDP

E-mail bodies that have non-English text use ________. A) RFC 822 and RFC 2822 B) HTTP C) MIME D) UNICODE

UNICODE

Which of the following forms of e-mail is usually easier to use if you are using someone else's computer? A) Webmail B) Mail programs using SMTP and POP C) Mail programs using SMTP and IMAP D) none of the above

Webmail

For ADSL service, which of the following typically must be added to the telephone system? A) a DSLAM B) a transmission line to the customer premises C) both A and B

a DSLAM

If a cellsite uses Channel 237, which other cellsites can reuse the channel? A) adjacent cellsites B) cellsites one beyond adjacent cells C) cellsites two beyond adjacent cells D) no other cellsites

adjacent cellsites

On networks, cloud computing is increasing the need for ________. A) sudden changes in traffic B) reliability C) controlled latency D) all of the above

all of the above

VoIP ________ uses the Internet Protocol for transmission. A) always B) usually C) seldom D) never

always

Which tends to have a data field? A) an HTTP request message B) an HTTP response message C) both A and B D) neither A nor B

an HTTP response message

The way in which application layer functions are spread among computers to deliver service to users is called ________. A) distributed processing B) peer-to-peer computing C) client/server computing D) an application architecture

an application architecture

Tor provides the sending host with ________. A) end-to-end confidentiality B) anonymity C) both A and B D) neither A nor B

anonymity

DSL residential service provides ________. A) symmetric speed B) asymmetric speed C) both A and B D) neither A nor B

asymmetric speed

Firms generally pay the added cost of MPLS for connecting their sites ________. A) because it has higher transmission speeds B) because it can do traffic engineering C) because it uses familiar technology D) all of the above

because it can do traffic engineering

In MPLS, the router interface to send the packet back out will be decided ________. A) during the router's routing process B) before the first data packet is sent C) by a dynamic routing protocol D) none of the above

before the first data packet is sent

Which of the following DSL services tends to be symmetric in speed? A) residential B) business C) both A and B D) neither A nor B

business

For cable modem service, customers need ________. A) cable modems B) splitters C) both A and B D) neither A nor B

cable modems

Which reduces traffic more when sending long files? A) compression B) caching C) both A and B D) neither A nor B

caching

Compared to physical servers, virtual machines ________. A) can be moved more easily B) potentially have infinite capacity C) both A and B D) neither A nor B

can be moved more easily

Skype login is necessary so that the user ________. A) can find the IP address of a Skype proxy server B) can find the IP address of a client it wishes to communicate with C) can find her own Skype address D) none of the above

can find the IP address of a Skype proxy server

In cellular technology, a ________ is a small geographical area. A) cell B) cellsite C) both A and B D) neither A nor B

cell

In cellular technology, the carrier antenna and equipment to which mobile customers connect directly is called a(n) ________. A) cell B) cellsite C) MTSO D) wireline carrier

cellsite

VoIP users have ________ in their phones or on their computers. A) media gateways B) codecs C) both A and B D) neither A nor B

codecs

Which of the following does the carrier NOT own? A) the network core B) customer premises equipment C) both A and B D) neither A nor B

customer premises equipment

In Skype, transport is governed by ________. A) peers providing signaling B) super nodes C) Skype servers D) direct communication between the calling and receiving peers

direct communication between the calling and the receiving peers

The primary applications architecture is ________. A) TCP/IP B) OSI C) both A and B D) neither A nor B

neither A nor B

Tor provides confidentiality ________. A) only between the source host and the first Tor router B) all the way to the destination host C) both A and B D) neither A nor B

neither A nor B

How many HTTP request-response cycles are needed to transfer a webpage containing three graphics images? A) 1 B) 2 C) 3 D) none of the above

none of the above

If you are downloading a webpage containing three graphics images, which file will you download first? A) The first image. B) The second image. C) The third image. D) none of the above

none of the above

Compared to the Internet, carrier WANs ________. A) offer higher-quality service B) can reach more customers C) both A and B D) neither A nor B

offer higher-quality service

What transmission medium do ALL DSL services use? A) one-pair data-grade UTP B) two-pair data-grade UTP C) one-pair voice-grade UTP D) none of the above

one-pair voice-grade UTP

A ________ may have multiple ________. A) physical server; virtual machines B) virtual machine; physical servers C) both A and B D) neither A nor B

physical server; virtual machines

Traffic shaping reduces traffic by ________. A) compression B) preventing or limiting undesirable traffic from entering the network C) both A and B

preventing or limiting undesirable traffic from entering the network

Netflix uses AWS for its ________. A) recommendation system B) content delivery appliances C) both A and B D) neither A nor B

recommendation system

Content delivery networks mainly ________. A) increase transmission speed B) increase program selection C) decrease program selection D) reduce latency

reduce latency

MPLS ________ the work that each router must do to deliver a packet during a traffic exchange. A) reduces B) increases C) does not affect D) occasionally reduces

reduces

Compression reduces traffic by ________. A) reducing redundancy in the data B) preventing undesirable traffic from entering the network C) both A and B D) neither A nor B

reducing redundancy in the data

The first line in an HTTP request message is called the ________. A) request line B) status line C) both A and B D) neither A nor B

request line

Having all privileges on a computer is known as having ________. A) access B) totality C) root privileges D) mojo

root privileges

The explosion of apps on small mobile devices raises ________ issues. A) cumulative cost B) inventory control C) security D) network load

security

When you login to a website and it responds by saying, "Hello yourname," this is primarily creates a ________ problem. A) security B) privacy C) user interface D) network

security

An IaaS owns and operates ________. A) servers B) application programs C) both A and B D) neither A nor B

servers

IaaSs own ________. A) application software B) servers C) both A and B D) neither A nor B

servers

Cells are used in cellular telephony to provide ________. A) service for more customers B) greater reliability C) greater transmission speed D) all of the above

service for more customers

In which VoIP phase does Skype implement with peer-to-peer service? A) signaling B) login C) both A and B D) neither A nor B

signaling

SIP is a ________ protocol for VoIP. A) signaling B) transport C) both A and B D) neither A nor B

signaling

Which phase of VoIP is different in traditional VoIP and Skype? A) signaling B) transport C) login D) none of the above

signaling

In Skype, a directory search to find the IP address of a client to be called, is done by ________. A) peers B) super nodes C) Skype servers D) direct communication between the calling and receiving clients

super nodes

In Skype, signaling is done by ________. A) peers B) super nodes C) direct communication between the calling and receiving clients D) none of the above

super nodes

Which of the following allows you to connect to the hosts of almost any corporation today? A) carrier WANs B) the Internet C) both A and B

the Internet

Asymmetric residential service is good for ________. A) the World Wide Web B) videoconferencing C) both A and B D) neither A nor B

the World Wide Web

MPLS brings ________. A) lower cost than the Internet B) the ability to do traffic engineering C) both A and B D) neither A nor B

the ability to do traffic engineering

In Tor, ________ can read the content of the message delivered to the destination host. A) no Tor router B) all Tor routers C) the first Tor router D) the last Tor router

the last Tor router

In a telephone system, the lines that connect customers to the nearest switch are called ________. A) trunk lines B) local lines C) the access loop D) the local loop

the local loop

T1 leased lines run at a speed of about ________. A) 250 kbps B) 1 Mbps C) 10 Mbps D) 45 Mbps

1 Mbps

Which of the following already runs to nearly all customer premises? A) 4-pair UTP B) 1-pair VG UTP C) 1-pair DG UTP D) 2-pair DG UTP

1-pair VG UTP

Many lines sold as T1 lines actually use ________. A) 1-pair voice-grade UTP B) 1-pair data-grade UTP C) 2-pair data-grade UTP D) optical fiber

1-pair voice-grade UTP

To use a leased line, the customer must have a(n) ________ at each site. A) compatible switch B) compatible router C) CSU/DSU D) modem

CSU/DSU

There is usually a time difference ________. A) between transmission from the sender to his or her mail server and the transmission to the receiver's mail server B) between transmission to the receiver's mail server and the reading of the message by the receiver. C) both A and B D) neither A nor B

between transmission to the receiver's mail server and the reading of the message by the receiver

5G will bring ________. A) higher speeds than 4G B) energy-efficient low speeds C) both A and B D) neither A nor B

both A and B

A media gateway translates ________ methods. A) signaling B) transport C) both A and B D) neither A nor B

both A and B

An IaaS owns ________. A) servers B) application programs C) both A and B D) neither A nor B

both A and B

An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) both A and B D) neither A nor B

both A and B

Cloud customers are concerned that ________. A) their data might be hacked B) the government may access their data secretly C) both A and B D) neither A nor B

both A and B

Compared to the Internet, Layer 2 and Layer 3 carrier WAN services usually ________. A) offer QoS guarantees B) require less management labor in the customer organization C) both A and B D) neither A nor B

both A and B

DSL offers ________. A) voice transmission B) data transmission C) both A and B D) neither A nor B

both A and B

Falling network costs are resulting in ________. A) the consolidation of servers B) server farms for cloud computing C) both A and B D) neither A nor B

both A and B

Fiber to the home service is normally offered by ________. A) cable television companies B) telephone companies C) both A and B D) neither A nor B

both A and B

Growing client processing power was a major driving force behind the ________ application architecture. A) client/server B) P2P C) both A and B D) neither A nor B

both A and B

How does carrier Ethernet differ from traditional Ethernet? A) It is offered by carriers instead of being installed and managed by the company using it. B) It is for MAN and WAN services. C) both A and B D) neither A nor B

both A and B

In ADSL, the customer should have ________. A) splitters B) an ADSL modem C) both A and B D) neither A nor B

both A and B

Netflix transcoding is based on ________. A) network speed B) the user's display device characteristics C) both A and B D) neither A nor B

both A and B

Skype provides ________. A) Voice over IP B) Video over IP C) both A and B D) neither A nor B

both A and B

Speech codecs vary with respect to ________. A) compression B) voice quality C) both A and B D) neither A nor B

both A and B

The SIP invite is transmitted to the ________. A) called party's SIP proxy server B) called party's VoIP phone or computer C) both A and B D) neither A nor B

both A and B

Traffic shaping reduces traffic by ________. A) preventing certain undesirable traffic from entering the network B) limiting the amount of certain undesirable traffic entering the network C) both A and B D) neither A nor B

both A and B

VoIP is an acronym for ________. A) Voice over IP B) Video over IP C) both A and B D) neither A nor B

both A and B

When a cloud client customer moves from one client machine to another, ________. A) the same data files are available B) the same application software personalization is in effect C) both A and B D) neither A nor B

both A and B

When a message arrives at a Tor router, the router ________. A) decrypts the arriving message B) erases its memory of the source address C) both A and B D) neither A nor B

both A and B

Which of the following affects what cellular throughput an individual user will receive? A) being in a moving car B) being far from the cellsite C) both A and B D) neither A nor B

both A and B

Which of the following can sometimes be accelerated by changing their operation? A) Application protocols B) Network protocols C) both A and B D) neither A nor B

both A and B

Which of the following is a common use for carrier WANs? A) to connect corporate sites B) to connect a corporate site to the Internet C) both A and B D) neither A nor B

both A and B

Which of the following reduces traffic? A) compression B) traffic shaping C) both A and B D) neither A nor B

both A and B

Why is Carrier Ethernet popular? A) It uses a familiar technology. B) It is usually easy to upgrade speed rapidly. C) both A and B D) neither A nor B

both A and B

Why is Carrier Ethernet popular? A) It uses familiar technology. B) It has attractive prices. C) both A and B D) neither A nor B

both A and B

In MPLS, if two packets arrive in order going to the same IP address, MPLS will ________. A) send the second on doing a simple cache lookup B) go through the entire routing process for the second packet C) do a simple table lookup for the second packet D) none of the above

do a simple table lookup for the second packet

LAN speeds are faster than WAN speeds because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons

economic reasons

MAN speeds are faster than WAN speeds because of ________. A) technological limitations B) regulatory limitations C) slow corporate adoption of newer WAN technologies D) economic reasons

economic reasons

LANs are ________. A) single networks B) local internets C) either A or B D) neither A nor B

either A or B

WANs include ________. A) single networks B) the Internet C) either A or B D) neither A nor B

either A or B

Leased lines offer ________ service. A) fast B) any-to-any C) both A and B D) neither A nor B

fast

Compared to ADSL service, cable modem traditionally has been ________. A) faster and more expensive B) faster and less expensive C) slower and more expensive D) slower and less expensive

faster and more expensive

In MPLS, the ________ adds the label to the packet. A) source host B) first label-switching router C) either A or B D) neither A nor B

first label-switching router

In cellular technology, G stands for ________. A) goodness B) grade C) ground wave D) generation

generation

The main advance that made the client/server application architecture possible was ________. A) the Internet B) growing client processing power C) growing application sophistication D) new input/output methods

growing client processing power

Netflix has the most VMs ________. A) on weekends B) on weekdays C) in the evenings D) The number of VMs is fixed over periods of a month or longer.

in the evenings

RTP supports ________. A) faster transmission speed B) jitter control C) both A and B D) neither A nor B

jitter control

In HTTP, each line after the first begins with a ________. A) keyword B) command C) CRLF D) value

keyword

MPLS routers base their decisions on a packet's ________. A) destination IP address B) label number C) both A and B D) neither A nor B

label number

Which lines run from one customer premise to another? A) leased lines B) access lines C) both A and B D) neither A nor B

leased lines

In e-mail, SSL/TLS provides ________. A) link encryption B) end-to-end encryption C) both A and B D) neither A nor B

link encryption

A WAN is the network that ________. A) links different sites together B) provides service within about a mile C) provides service within a site D) all of the above

links different sites together

In which VoIP phase does Skype use a server instead of service directly between peers? A) signaling B) transport C) login D) none of the above

login

The PSTN core is organized as a ________. A) mesh B) hierarchy C) modified hierarchy D) loop

modified hierarchy

For ________, Netflix owns and operates the servers. A) its recommendation system B) e-mail C) both A and B D) neither A nor B

neither A nor B

In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) both A and B D) neither A nor B

neither A nor B

Typically, the most common way for an attacker to get extensive privileges on a computer is ________. A) to take over an application program B) to take over the operating system C) to take over a computer's hardware D) privilege escalation after a hack

to take over an application program

When an e-mail user encrypts an outgoing message with SSL/TLS, how far will this encryption extend? A) to the sender's e-mail server B) to the receiver's e-mail server C) to the receiver's client host D) to an application program on the receiver's client host

to the sender's e-mail server

Speech codecs ________. A) translate human voice signals into digital signals for transmission B) translate human voice signals into analog signals for transmission C) both A and B D) neither A nor B

translate human voice signals into digital signals for transmission

MPLS is ________ the source and destination hosts. A) transparent to B) nontransparent to C) apparent to D) a burden on

transparent to

Which of the following is considered a bigger problem with client/server architecture than peer-to-peer architecture? A) underutilized processing capacity of client PCs B) potential for essential data/services to become unavailable because devices providing services are often turned off C) lack of corporate control D) none of the above

underutilized processing capacity of client PCs

A lesson of XSS is that programmers should never trust ________. A) contractors B) their own staff colleagues C) databases D) user input

user input

Why is Carrier Ethernet popular? A) uses a familiar technology B) offers predictable pricing over multi-year periods C) both A and B D) neither A nor B

uses a familiar technology


Set pelajaran terkait

ServSafe Quiz 4 (The flow of food)

View Set