CIS 321 Final Exam Questions
How many DNS root servers are there?
13
The UDP _____
-is unreliable and has checksum field
When a cloud client customer moves from one machine to another machine, ________.
-the same data files are avaliable -the same application software personalization is in effect
Convert decimal 8 to binary
10000
At What layer would you find frames ?
2
In the mask 255.255.255.0, how many 1s are there?
24
What is the maximum power for POE Plus in the standard?
25 watts
If your subnet part is 8 bits long, you can have ________ subnets.
254
At What layer would you find IP Addresses?
3
A 5-bit field can represent ________ alternatives or different combinations.
32
A mask has ____ bits
32
A mask has ________ bits.
32
The total length of an IPv4 address is ________ bits.
32
At What layer would you find packets?
4
Convert the binary number 100 to decimal.
4
Near-field communication has a maximum transmission distance of about ________.
4 cm/20 in
What type of copper wiring is widely used in Ethernet?
4-pair UTP
I wish to have a wireless LAN to serve my house. I will use ________.
802.11
What 802 Working Group creates Ethernet standards?
802.3
The most serious problem with wireless transmission in WLANs is ________.
Absorptive Attenuation
At which layer would you find standards for requesting videos from a video-sharing site such as YouTube?
Application
To transmit data very rapidly, you would want a ________ channel
broadband
A specific encryption method is called a ________.
cipher
In ________ file retrieval, your computer downloads a file from a server.
client/server
For human reading, IPv6 fields are separated by ________
colons
SNMPv1 uses ________ for authentication.
community names
The first step in the routing process involves ________.
comparing the packets destination IP address to all rows
When a firewall identifies an attack packet it _____
copies information about the packet into a log file
________ is the general name for proofs of identity in authentication.
credentials
At what layer do you find EUI-48 addresses?
data link
The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________.
destination host
When the source host transmits a packet, the packet is addressed to the ________.
destination host
Address Resolution Protocol is used to find the destination data link layer destination addresses of ________.
destination hosts and routers
Which of the following must be followed
standards
________ is the dominant firewall filtering method used on main border firewalls today.
stateful packet inspection
To use a leased line, the customer requires a(n) ________ at each site.
CSU/DSU
For their transmission medium, cable television companies primarily use ________.
Coaxial Cables
________ is a general naming system for the Internet
DNS
A TCP ________ segment is a request to close a connection.
FIN
Which of the following is used to define webpage bodies?
HTML
Which of the following is used to retrieve Web pages?
HTTP
Which has stronger security?
IPsec
60.49.7.254 is an ________.
IPv4 Address
Who are the most dangerous types of employees?
IT Security people
An EUI-48 address was formerly called a(n) ________ address
MAC
EUI-48 addresses were formerly called ________ addresses
MAC
The general name for evil software is ________
Malware
Which of the following is NOT a standards organization?
OSI
Which of the following provides end-to-end encryption?
PGP
Which of the following can be used within a firm?
Private and Public IP Addresses
The highest layer in SDN consists of ________.
SDN Applications
Which of the following is a processor-sharing application?
SETI@home
To use an access point, you need to know its ________.
SSID
Which is less expensive to implement?
SSL/TSL
Which type of service manages application software for users?
SaaS
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.
Spyware
Malware programs that masquerade as system files are called ________.
Trojan Horses
E-mail bodies that have non-English text use ________.
UNICODE
Which of the following attach themselves to other programs?
Viruses
Antivirus software checks e-mail attachments for ________.
Viruses and Trojan Horses
Jitter is a problem for ________.
Voice over IP and Streaming Media
The Internet is a ________.
WAN
Who controls the internet?
no one
In tunnel mode, IPsec provides protection ________.
only between the IPsec servers
Mesh networking in 802.11 is likely to use _____
only wireless devices
For ADSL service, which of the following typically must be added to the telephone system?
a DSLAM
In distributed DoS attacks, the attacker sends messages directly to ________.
a command and control server
The ability to transmit in two directions simultaneously is ________.
a full-duplex communication
Which of the following is one of the three parts of an IPv4 address?
a subnet
".edu" is a ________.
a top level domain
What propagation problem is especially bad in moist air?
absorptive attenuation
In SNMP, the manager communicates directly with a(n) ________.
agent
Users are primarily concerned with the ________ layer.
application
The messages of VPNs ________.
are encrypted
Electronic signatures provide message-by-message ________.
authentication
Which of the following affects what throughput an individual user will receive?
being in a moving car and being far from cellsite
Transmission speed is normally measured in ________.
bits per second
In binary signaling there is (are) ________ state(s).
two
An SLA for speed should specify a ________.
minimum speed
The PSTN core is organized as a ________.
modified hierarchy
The main advantage of ________ file sharing is that it brings cost savings by using clients rather than server processing power.
BitTorrent
Which of the following was created for PANs?
Bluetooth
When a firewall identifies an attack packet, it ________.
discards the packet and copies information about the packet into a log file
________ is placing a message in the data field of another message.
encapsulation
Converting application messages into bits is called _______
encodining
Ethernet does ______
error detection
Firewall log files should be read ______
everyday
Which of the following is form of biometrics ?
facial recognition
Compared to normal routing, decision caching is ________.
faster
Compared to ADSL service, cable modem service typically is ________.
faster and more expensive
Which of the following is the easiest to understand?
firewall policies
Dividing an application message into a series of smaller message segments is called ________.
fragmentation
Skype offers ________
free calling among skype customers
A message always has a ________.
header
Which of the following tends to be more damaging to the victim?
identity theft
The SNMP manager stores the information it receives from Get commands ________.
in the MIB
BitTorrent's .torrent files are stored on the ________.
index server
If more users move to an access point, this decreases ________.
individual throughput
Standards tend to bring _____
interoperability
In VPNs designed to frustrate evil twin attacks, the shared secret ________.
is not transmitted
Which of the following is true about NAT?
it can enhance security and it presents problems for some protocols
Spread spectrum transmission is used in WLANs because ________.
it is required by regulators and is more reliable.
Why is Carrier Ethernet popular?
it uses familiar technology and it has attractive prices
Ethernet is inexpensive thanks to ________.
its hierarchical topology
When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________.
latency
At what layer(s) do you find single network standards?
layer 1 & 2
To defeat brute-force attacks, a password must be ________.
long and complex
SDN holds the promise of bringing ________
lower cost
Session keys are used to ______
make cryptanalysis more difficult
CSMA/CA+ACK usually is _____
mandatory
________ is a technique for preventing two wireless stations from transmitting at the same time and therefore interfering with each other.
media access control
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________. (Select the most specific answer.)
phishing
Ethernet usually has a 100 meter distance limit for ________.
physical links
To determine if a host is reachable, you would send a(n) ________.
ping
RFC 822 and RFC 2822 standards govern ________.
plain text content of email messages
Which phase of the plan-protect-respond cycle takes the largest amount of work?
protect
A man in the middle attack ________.
reads traffic traveling between one host to another
The main promise of VoIP is to ________.
reduce cost
DoS attacks attempt to _____
reduce the availability of a computer
An unauthorized internal access point is a(n) ________ access point
rogue
The highest-level DNS servers are called ________.
root servers
What device connects different networks into an Internet?
router
Dynamic ________ protocols allow routers to transmit routing table information to one another.
routing
TCP Messages are called ________
segments
2.4 GHz and 5 GHz are ________.
service bands
Cells are used in cellular telephony to provide ________.
service for more customers
Physical layer standards govern ________.
signaling
SIP is a ________ protocol for VoIP.
signaling
Compared to network demand, network budgets are growing ________.
slower
Tricking users into doing something against their security interests is ________.
social engineering
Application message fragmentation is done on the ________.
source host
Unsolicited commercial e-mail is better known as ________.
spam
The main benefit of parallel transmission over serial transmission is ________.
speed
An internal router only connects different IP ________.
subnets
Typically, the most common way for an attacker to get extensive privileges on a computer is to ________.
take over an application program
Which of the following probably suffered the most financial damage from the Target breach?
target
Passive RFID chips are powered by ________.
the scanning unit
Throughput is ______
the speed a network actually provides to its users
How do WAN carriers typically get their trunk lines?
they lease them from telephone companies
Which of the following meets the definition of hacking ?
to intentionally use a computer resource without authorization
MIMO_____
transmits multiple signals in the same channel and increases throughput
WLANs normally use _____
unlicensed bands
IP is _____
unreliable
A lesson of XSS is that programmers should never trust ________
user input
DSL offeres ____
voice transmissions and data transmissions
Which is a problem with IPv4 addresses?
we have ran out of them
SSL/TSL used for _____
web applications
A policy specifies _____
what should be done
An SLA should specify the ________.
worst case
Vulnerability-based attacks that occur before a patch is available are called ________ attacks.
zero-day