Exam 3: Physical and Network Layer Vulnerabilities and Communication System Concepts

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In down-conversion multiplication with cosine wave is followed by

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

A

Properties of impulse function are

Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
Verified

D

Which of the following is an example of network layer vulnerability?

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

C

A base-band signal can be up-converted using

(Multiple Choice)
4.8/5
(38)

A band-pass signal has

(Multiple Choice)
4.8/5
(45)

Which of the following is an example of physical layer vulnerability?

(Multiple Choice)
4.9/5
(32)

Properties of Fourier transform are

(Multiple Choice)
4.7/5
(34)

Which of the following is an example of data-link layer vulnerability?

(Multiple Choice)
4.8/5
(33)

Fourier transform of a signal gives the

(Multiple Choice)
5.0/5
(40)

Bits can be sent over guided and unguided media as analog signal by                        

(Multiple Choice)
4.7/5
(35)

Random things in a communication system are

(Multiple Choice)
4.8/5
(42)

A band-pass signal has a Fourier transform equal to

(Multiple Choice)
4.8/5
(39)

A band-pass signal can be down-converted using

(Multiple Choice)
4.9/5
(29)

Which of the following is an example of physical layer vulnerability?

(Multiple Choice)
4.8/5
(28)

Which of the following is an example of data-link layer vulnerability?

(Multiple Choice)
4.9/5
(36)

In the digital communication system, signals in different frequency bands are

(Multiple Choice)
4.8/5
(39)

Which can be used for periodic and non periodic?

(Multiple Choice)
4.7/5
(39)

The portion of physical layer that interfaces with the media access control sublayer is called                        

(Multiple Choice)
4.8/5
(42)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)