BUS4 111 FINAL EXAM

Ace your homework & exams now with Quizwiz!

Enhanced Interior Gateway Protocol =

Cisco Systems

The IEEE calls 64-bit interface addresses ________.

Extended Unique Identifiers

A TCP ________ segment is a request to close a connection.

FIN

ADSL offers symmetric service.

False

By regulation, cellular systems must give almost the same throughput at different times during the day.

False

In IP subnet planning, having a large subnet part allows more hosts per subnet.

False

________ is used for supervisory messages at the internet layer.

ICMP

Which has stronger security?

IPsec

___ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm

NAT

What operates on the 13.56 MHz unlicensed service band

Near Field Communication (NFC)

Local loop access lines to business use which of the following transmission media?

Optical Fiber

In 802.11i ________, hosts must know a shared initial key.

PSK mode

Evil Twin Access Attacs can be prevented by

VPN

A company receives its domain name from ________.

a domain registrar

In SNMP, the manager communicates directly with a(n) ________.

agent

WAN optimization devices are deployed ________.

at the ends of leased lines

The domain name system ________. A) is a way to find a host's IP addresses if your computer only knows the host's host name B) is a general naming system for the Internet C) both A and B

both A and B

To deliver an arriving packet to a destination host on a subnet connected to a router, the router needs to know the destination host's ________ before the router can send the packet on to the destination host. A) IP address B) data link layer address C) both A and B

both A and B

Which of the following can be used within a firm? A) private IP addresses B) public IP addresses C) both A and B D) neither A nor B

both A and B

Which of the following is true about NAT? A) It can enhance security. B) It presents problems for some protocols. C) both A and B D) neither A nor B

both A and B

In DNS, a group of resources under the control of an organization is called a ________.

domain

A Rogue access point is typically created by

employees

Express /24 in notation

255.255.255.0

If the subnet ID in an IPv6 address is 32 bits, how long is the routing prefix?

32 bits

In IPv6, the interface ID must have ____ bits

64

In an IPv6 global unicast address, the interface ID is ________ bits long.

64

In Bluetooth, a master can have up to ________ slaves at any moment.

7

How many fields are there in an IPv6 address written for human reading?

8

In IP subnet planning, you need to have at least 130 subnets. How large should your subnet part be?

8

Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be?

8

If a firm has many access points, it should use ________ mode in 802.11i.

802.1x

If a reader sees 27: , it means ____

:0027

If there are two or more single-zero felds in sequence, you an shorten this by using

::

A step in creating an EUI-64 is dividing a 48-bit MAC address in half and inserting ________ in the center.

fffe

In IPv6, Groups of bits =

fields

Metropolitan area Ethernet is used primarily ________.

in MANs

Classic Bluetooth and Low Energy are

incompatible

What is the SNMP trap command

indicates abnormal error rate, detection of rogue access point, or dissociate messages that break connections (an attacker is committing a denial-of-service attack)

Signal analysis software

initial site survey must be done of the area to discover any dead spots

After selecting a row on a routing table, a router will send packets out to the ________.

interface

Router connectors are called ________.

interfaces

The routing prefix in IPv6 is like the ________ part in an IPv4 address.

network

The _________ identifies the host's recognized network on the Internet

network part

A border router's main job is to connect different _______.

networks

Master and slave =

piconet

NAT enhances security by ________

preventing sniffers from learning internal IP addresses

In initial planning for access points, it is recommended

provide coverage to all points within the building while reducing overlap as much as possible

Centralized WLAN management's ____________ is the only real way to manage WLAN security.

wireless intrusion detection functionality

In 802.11i pre-shared key mode, the passphrase must be at least ________________ long to generate a strong pre-shared key

20 characters

A mask has ________ bits.

32

IPv4 addresses are

32 bits long

For surfing websites on the Internet, what is the lowest generation of cellular service that would provide at least reasonably good access?

3G

HSPA+ is a ________ service.

3g

Which 802 working group created 802.11i?

802.11

The 802.11i was created by the _________

802.11 Working Group

What is the strongest security protocol for 802.11 today?

802.11i

The real work of authentication is done by the ________

802.1X authentication server

The _______________________ was created for corporations with many access points (strong but complex to implement)

802.1X initial authentication mode

In ADSL, the residential customer needs a(n) ________.

ADSL modem

These devices are involved in the 802.1X Initial Authentication Mode:

Access Point and Central 802.1X authentication server

A rogue access point ________. A) is an unauthorized internal access point B) often has very poor security C) often operates at high power D) All of the above are true.

All of the above are true.

An mobile telephone switching office (MTSO)

controls cellsites in a cellular system and links mobile users to wired telephone customers

Two-way amplifiers are needed for cable ________ service

data

802.1X authentication server checks against _________

database

The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________.

destination host

After two wireless clients authenticate themselves via PSK to an access point, they will use ________ to communicate with the access point.

different session keys

A VPN provides

end-to-end security

ISPs are recognized organizations but not __________.

end-user organizations

Internet Control message Protocol (ICMP)

error-reporting protocol network devices like routers use to generate error messages to the source IP address when network problems prevent delivery of IP packets.

Classic Bluetooth has Two data rates

extended data rate speed of 2 Mbps and high speed rate of 24 Mbps

Compared to ADSL service, cable modem traditionally has been ________.

faster and more expensive

In NAT, the ________ creates new external source IP addresses and port numbers.

firewall

One-bit fields are called ________ fields.

flag

A firm uses a PSDN. It has four sites. How many leased lines will it need?

four

Near Field Communication (NFC)

has Low speeds of 434 kbps

For human reading, IPv6 address is written in ________ notation.

hexadecimal

Which form of Bluetooth has a typical transmission speed of about 24 Mbps?

high-speed bluetooth

The main disadvantage of transport mode protection compared to tunnel mode protection in IP is ________.

higher cost

To use a leased line, the customer must have a(n) ________ at each site.

CSU/DSU

Which of the following does the carrier NOT own?

Customer Premises Equipment

The _______ specifies a particular host in a subnet.

host part

The part of an IPv6 global unicast address that designates the host is called the ________.

interface ID

By using NAT, firms can have many more _____________________

internal IP addresses than its ISP provides it

TCP/IP dominates the work of network professionals at the

internet and transport layers

In VPNs designed to frustrate evil twin attacks, the shared secret ________.

is not transmitted

A man-in-the-middle is difficult to detect because

it is transparent to both the wireless client and the access point

802.11i provides only

link security

A WAN is a network that ________.

links different sites together

A WAN is the network that ________.

links different sites together

All hex symbols are in

lowercase

When the NAT firewall at the border receives the packet, it __________.

makes up a new row.

Routers usually are connected in a ________ topology.

mesh

Routers can have ________ rows

multiple

Routers can take _____ paths

multiple

Radio frequency ID (RFID) has

no power at all and uses power of near field

Evil Twin Access Points are typically

notebook computers, has software to impersonate a real access point and operates at a high power

Which of the following would be an SNMP object?

number of rows in routing table and system uptime (since last reboot)

Ethernet switch can only take ____ path

one

Carrier access lines to residential buildings typically use ________.

one-pair voice-grade UTP

What transmission medium do ALL DSL services use?

one-pair voice-grade UTP

SONET/SDH lines use ________.

optical fiber

Ethernet standards are specified at the ________ layer(s).

physical and data link

Bluetooth always uses ______________ between a pair of devices

point-to-point communication

Leased lines are ________.

point-to-point lines

The __________________________ was created for homes with a single access router

pre-shared Key (PSK) Initial authentication mode

Access points and wireless hosts need to know the same ________________ for initial authentication

pre-shared session key

Anyone who knows the _________ can authenticate himself/herself to the access point

pre-shared session key

Traffic shaping reduces traffic by ________.

preventing certain undesirable traffic from entering the network and limiting the amount of certain undesirable traffic entering the network

A LAN is a network that ________.

provides service within a site

NAT __________________________

provides some security and allows a firm to have more internal addresses

The use of virtual circuits ________.

reduces costs

The highest-level DNS servers are called ________.

root servers

The total length of ____ and _______ is 64 bits

routing prefix and subnet ID

In the IPv6, there are three parts:

routing prefix, subnet ID, and interface ID

For 100,000 addresses, which will have fewer rows? A) a routing table B) an Ethernet switching table C) both will be about the same length.

routing table

Most corporations wish to have ________ domain names.

second-level

TCP messages are called ________.

segments

Zigbee ad-hoc wireless network is

self-organizing ; no need to create a complex design in the beginning and network adapts automatically to changes

The next time a client authenticates itself, it will receive a different ___________.

session key

all host IPv4 addresses from the same network ____________

share the same network

An attacker may be able to install a/an ________ beyond the corporation's NAT firewall. The ________ will be able to read all packets coming out of the firm.

sniff program

In ADSL, the customer should have ________

splitters and an ADSL modem

Open Shortest Path First (OSPF) offers

strong security and only does TCP/IP routing

The prefix-length in IPv6 is the equivalent of the _____________________

subnet mask in IPv4.

An internal router only connects different ______ within a network

subnets

Most large organizations further divide their network into smaller units called _________

subnets

LAN speeds are faster than WAN speeds. This is because of ________.

technological limitations

Using the Internet as a WAN is attractive because of ________.

the Internet's low cost per bit

The larger # of subnets, _______________

the fewer hosts there can be

Passive RFID chips are powered by ________.

the scanning unit

In 802.1X Initial Authentication Mode Operation, the wireless client is _____

the supplicant

The 802.11i standard protects communication between ____________

the wireless access point and wireless clients.

".com" is a ________.

top-level domain

".edu" is a ________.

top-level domain

Client PCs must have digital certificates in ________.

transport mode

If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).

two

Low-speed leased lines use ________ transmission lines to the customer premises.

two-pair data-grade UTP

After authentication using the pre-shared key, the wireless access point gives each authenticated device a new __________________ to use while communicating with the access point subsequently.

unshared pairwise session key

DSL offers ________.

voice transmission and data transmission

Which is a problem with IPv4 addresses?

we have ran out of them

________ is a general naming system for the Internet.

DNS

For ADSL service, which of the following typically must be added to the telephone system?

DSLAM

___________________ is not in the Internet Protocol

Decision Caching

Router first finds row with matching

Destination IP

Part of WPS weakness is caused by ________.

Dividing the 8 digit PIN into two 4 digit halves

A/An ____________ is located outside corporate's premises but connects through an unsecure access point within the site

Drive-By-Hacker

In ________, switching decisions are based on destination addresses.

Ethernet

Routers need fewer rows than

Ethernet Switch

____________ will establish a secure 802.11i connection with the wireless victim client (Security Connection 1) and uses Key Client- ET (VC-ET) for encryption

Evil Twin Access Points

____________ is a man-in-the-middle attack in which the evil twin intercepts traffic passing between a wireless host and a legitimate access point

Evil Twin Attack

Bluetooth Low Energy

Extremely low energy output Similar to classic but reduced power consumption Work for small classes like light switches

IF access points are placed too far,

Hosts far must drop lower transmission speeds (frames take longer to send and receive)

Which of the following standards permits central management?

IPsec

In IPv6, which of the three are fixed: routing prefix, subnet ID, and interface ID

Interface ID

In routers, ports are called

Interfaces

How does carrier Ethernet differ from traditional Ethernet?

It is offered by carriers instead of being installed and managed by the company using it and It is for MAN and WAN services.

IF access points are placed too closely, ____

It will increase co-channel interference (bad)

A company has more control over its ________ technology.

LAN

A network that runs on the customer premises is a ________.

LAN

Switched network and wireless networks =

Layer 1 and Layer 2

Which of the following usually offers higher speeds?

MANs

Which of the following is the most expensive to use?

MPLS (Multiprotocol Label Switching)

To prevent risks, companies uses ___ which uses external IP addresses that are different from internal IP addresses used within the firm

NAT

In coaxial cable, the two conductors ________. A) run side-by-side B) are twisted around each other C) Both A and B D) Neither A nor B

Neither A nor B

In IPv4, what are the three parts:

Network, Subnet, Host

___________ are unauthorized access points setup within a firm by an employee or department.

Rogue Access Points

Fiber to the home service is normally created by ________.

Running optical fiber to neighborhoods

Which is less expensive to implement?

SSL/TLS

In SNMP, companies are often reluctant to use ________ commands because of security dangers.

Set

What is Bluetooth

Short-range radio technology designed for personal area networks (PANs)

Which of the following are more widely used?

T1 lines

To prevent packets being misaddressed and being circulated endlessly to nonexistent destinations, the ____________ was created

Time to Live (TTL) Field

DSL throughput is typically sensitive to distance from the nearest switching building.

True

IPv6 has a number of known security weaknesses.

True

Some smart phones can act as wireless access points.

True

To use your smartphone as a wireless access point today generally will require you to pay a larger monthly fee.

True

When the subnet part is made larger, the host part must be smaller.

True

Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?

VPNs

The Internet is a ________.

WAN

Which of the following has more diversity in technologies?

WANs

Another name for 802.11i is

WPA2

What offers strong security?

WPA2

Service quality issues with the Internet can be addressed by using ________.

a single ISP

Dividing an organization's network into subnets allows it to be connected to the Internet with ________________

a single shared network address.

Combining multiple WAN technologies into a collectively managed system is called having ________.

a virtual WAN

Which of the following is a risk in 802.11i PSK mode? A) WPS can easily be cracked if it is used. B) Unauthorized sharing of the pre-shared key. C) A weak passphrase may be selected. D) all of the above

all of the above

IPsec protects ________ layer messages.

application

In a network mask, the bits in the network part of the mask ______________

are 1s, and the remaining bits are 0s

In a subnet mask, the bits of both the network and the subnet parts

are 1s, and the remaining bits are 0s.

Which of the following affects what cellular throughput an individual user will receive?

being in a moving car and being far from the cellsite

In tunnel mode, IPsec provides protection ________.

between IPsec servers

IP is reliable because of ________. A) echo and echo reply messages B) error advisement messages C) both A and B D) neither A nor B

both A and B

Near Field Communication (NFC)

cannot transfer much information

Which of the following receive rights of way for transmission beyond sites?

carriers

In cellular technology, a ________ is a small geographical area.

cell

A router might _____________ the decision it made for a destination IPv4 address

cheat or cache (remember)

For their transmission medium, cable television companies primarily use ________.

coaxial cable

A network on the Internet is a/an

collection of routers and data links owned by a recognized organization

NFC (Near Field Communication) chip can be used for

communication

Exterior Dynamic Protocol

communication outside organization's network

Companies use carriers for WAN transmission because ________.

companies lack right of way

The first step in the routing process involves ________.

comparing the packet's destination IP address to all rows

How many is in 255.255.255.0?

/24

A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________.

0

Ethernet Switching Table can only have

1 row

Which of the following already runs to nearly all customer premises?

1-pair VG UTP.

To support NAT, the IANA has created three sets of private IP address ranges that can only be used within firms:

10.x.x.x 192.168.x.x 172.16.x.x through 173.31.x.x.

How many bits are in total in IPv6

128

How many DNS root servers are there?

13

The Network has ______ IP 8-bit addresses

2

Network part in IPv4 has ________

2 bytes

If your subnet part is 8 bits long, you can have ________ subnets.

254

What are PANs

small groups of devices in a communication bubble around a person's desk or body

In a telephone system, the lines that connect customers to the nearest switch are called ________.

the local loop

Bluetooth is standardized by the ________.

Bluetooth Special Interest Group

In the United States, to get a speed of at least 2.5 Mbps, you would use a/an

Bonded T1s

An MTSO ________. A) controls cellsites in a cellular system B) links mobile users to wired telephone customers C) Both A and B

Both A and B

Label-switching routers provide ________. A) lower cost B) the ability to do traffic engineering C) Both A and B

Both A and B

Leased line switched WANs typically use ________. A) leased lines B) a router at each site C) Both A and B

Both A and B

Which of the following go from one customer site to another customer site? A) Leased lines. B) Access lines. C) Both A and B

Both A and B

Why is metro Ethernet popular? A) Familiarity. B) Rapid reprovisioning. C) Both A and B D) Neither A nor B

Both A and B

Which of the following DSL services tend to be symmetric in speed?

Business

Which of the following DSL services usually offers QoS guarantees?

Business


Related study sets

50 terms for interpersonal communication

View Set

entrepreneurship in DECA composition

View Set

Exam 6-In defense of food documentary

View Set

Chapter 34: Acute Kidney Injury and Chronic Kidney Disease

View Set

Chapter 9 Influencing the Political Environment

View Set

Chapter 5a Membrane Dynamics Continued

View Set

Theoretical Orientation/Intervention

View Set