Deck 3: Telecommunications and Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
Play
Full screen (f)
Deck 3: Telecommunications and Network Security
1
Layer 2 of the OSI model is called the transport layer.
False
2
The IP address 192.168.5.5 is a private IP address according to RFC 1918.
True
3
The contention method used in Ethernet is called Token passing.
False
4
A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
802.11g operates at a maximum of 11 Mbps.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
Wired Equivalent Privacy (WEP) was the first security measure used with 802.11.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
To deploy DNSSEC, a Public Key Infrastructure (PKI) must be built.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
The port number for HTTP is 88.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
100Base-FX is a fiber standard.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
Application level proxies have the least impact on performance.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
At which layer of the OSI model does the encapsulation process begin?
A) Application
B) Transport
C) Session
D) Network
A) Application
B) Transport
C) Session
D) Network
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following represents the range of well-known port numbers?
A) 0-1023
B) 1024-49151
C) 2500-3500
D) 49152-65535
A) 0-1023
B) 1024-49151
C) 2500-3500
D) 49152-65535
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
Which cable type uses a source of light that shoots down an inner glass or plastic core?
A) Coaxial
B) UTP
C) STP
D) Fiber optic
A) Coaxial
B) UTP
C) STP
D) Fiber optic
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
What is the contention method used with 802.11?
A) Token passing
B) CSMA/CD
C) Polling
D) CSMA/CA
A) Token passing
B) CSMA/CD
C) Polling
D) CSMA/CA
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
Distance vector routing protocols use which of the following as its metric?
A) Hop count
B) Cost
C) Bandwidth
D) Delay
A) Hop count
B) Cost
C) Bandwidth
D) Delay
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
How many channels are contained in a T1?
A) 3
B) 8
C) 16
D) 24
A) 3
B) 8
C) 16
D) 24
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
What role does the access point play when using a RADIUS server?
A) Authenticator
B) Authentication server
C) Supplicant
D) Relay
A) Authenticator
B) Authentication server
C) Supplicant
D) Relay
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
________________is the weakening of the signal as it travels down the cable and meets resistance.
A) Crosstalk
B) Attenuation
C) Noise
D) EMI
A) Crosstalk
B) Attenuation
C) Noise
D) EMI
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
Which attack takes advantage of the TCP three-way handshake?
A) Smurf
B) SYN ACK attack
C) Fraggle
D) Teardrop
A) Smurf
B) SYN ACK attack
C) Fraggle
D) Teardrop
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck