Exam 3: Communication

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following wireless LAN user authentication methods provides maximum security?

Free
(Multiple Choice)
4.9/5
(33)
Correct Answer:
Verified

A

Which of the following security options are included in most wireless residential gateways?

Free
(Multiple Choice)
4.9/5
(23)
Correct Answer:
Verified

C

What type of transmission signals are binary digits as electrical pulses?

Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
Verified

A

What technology is a portion of the 802.15 standard and has a transfer rate of 1-to-3 Mbps within a ten meter range?

(Multiple Choice)
4.9/5
(38)

Marsha can't find anything wrong with her computer, but there seems to be a disruption taking place that is causing data corruption. Where would this disruption come from?

(Multiple Choice)
4.9/5
(39)

What types of transmission signals are continuously varying electromagnetic waves?

(Multiple Choice)
4.9/5
(35)

What type of protocol is used by remote users to authenticate over PPP lines and is the least secure authentication method?

(Multiple Choice)
4.8/5
(21)

Madeline travels all day and all night around the United States and no matter where she goes, her IP address is always the same. What technology is this?

(Multiple Choice)
4.8/5
(38)

What type of high-speed connection technology provides up to a 52-Mbps transmissions speed without replacing the carrier's copper wire?

(Multiple Choice)
4.7/5
(35)

Rebecca wishes to control how data can flow into and out of her network. She spoke to her boss about problems the office is experiencing with data flow. He took it upon himself to purchase a program, but the program cannot prevent attacks that employ application-specific vulnerabilities. What did the boss purchase?

(Multiple Choice)
4.8/5
(33)

Protocols determine how computer systems communicate across networks through encapsulation. What is true about encapsulation?

(Multiple Choice)
4.9/5
(38)

What technology has a control frame that travels in a logical circle and is "picked up" when a system needs to communicate?

(Multiple Choice)
4.8/5
(34)

Neal and Bob are working on an Ethernet network and are trying to send information at the same time. What can happen to the network?

(Multiple Choice)
4.8/5
(38)

Dedicated links have a single transverse, thus needing to know only two points of reference for delivering packets. When thousands of networks are connected to each other, switching is used. What type(s) of switching is/are there?

(Multiple Choice)
4.7/5
(33)

What was developed by the American National Standards Institute as high-speed token-passing media accessing across technology?

(Multiple Choice)
4.8/5
(32)

A protocol at each layer has specific responsibilities and functions that it must perform. What layer does not include an application, but rather, the protocols that support applications?

(Multiple Choice)
4.9/5
(35)

Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to communicate with a database either locally or remotely?

(Multiple Choice)
4.8/5
(29)

What is the first line of defense for a network's security and is another name for a locked-down system?

(Multiple Choice)
4.7/5
(33)

Baseband uses an entire communication channel for its transmissions. What divides the communication channel into individual and independent channels?

(Multiple Choice)
4.9/5
(43)

The two main types of routing protocols are used to make routing decision based on either distance-vector routing protocols or link-state routing protocols. However, there are a handful of De facto and proprietary interior protocols in use. Which De facto protocol uses link-state algorithms to send out routing table information?

(Multiple Choice)
4.9/5
(45)
Showing 1 - 20 of 39
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)