Deck 3: Communication

Full screen (f)
exit full mode
Question
Madeline travels all day and all night around the United States and no matter where she goes, her IP address is always the same. What technology is this?

A)Mobile Access Ports
B)Mobile IP
C)Mobile Roaming IP Operations
Use Space or
up arrow
down arrow
to flip the card.
Question
Protocols determine how computer systems communicate across networks through encapsulation. What is true about encapsulation?

A)It keeps all information within one area.
B)It allows for the building of a message through protocol stacks.
C)Layers can only communicate within their own levels.
D)Protocols must use closed networks to work.
Question
A protocol at each layer has specific responsibilities and functions that it must perform. What layer does not include an application, but rather, the protocols that support applications?

A)Presentation Layer
B)Application Layer
C)Transport Layer
D)Network Layer
Question
A protocol at each layer has specific responsibilities and functions that it must perform. What layer allows for communication between two applications?

A)Presentation Layer
B)Session Layer
C)Transport Layer
D)Network Layer
Question
A protocol at each layer has specific responsibilities and functions that it must perform. What layer formats application layer protocols in the OSI model?

A)Presentation Layer
B)Session Layer
C)Transport Layer
D)Network Layer
Question
What are the two main protocols that work at the transport layer?

A)TCP and UDP
B)TCP and PUD
C)PCT and UDP
D)None of the Above
Question
Henry's computer is sending information by dividing it into small, logical, and more tangible network segments. What is Henry's computer doing?

A)Subletting
B)Submersing
C)Subnetting
D)None of the Above
Question
What types of transmission signals are continuously varying electromagnetic waves?

A)Digital
B)Analog
C)Subbing
D)All of the Above
Question
What type of transmission signals are binary digits as electrical pulses?

A)Digital
B)Analog
C)Subbing
D)None of the Above
Question
What technology has a control frame that travels in a logical circle and is "picked up" when a system needs to communicate?

A)Fiber Distributed Data Interface
B)Token Ring
C)Logic Ring
D)Fast Ethernet
Question
What was developed by the American National Standards Institute as high-speed token-passing media accessing across technology?

A)Fiber Distributed Data Interface
B)Token Ring
C)Logic Ring
D)Fast Ethernet
Question
Marsha can't find anything wrong with her computer, but there seems to be a disruption taking place that is causing data corruption. Where would this disruption come from?

A)Electricity
B)Cabling
C)Airwaves
D)None of the Above
Question
Neal and Bob are working on an Ethernet network and are trying to send information at the same time. What can happen to the network?

A)Nothing
B)Interference
C)Collision
D)Data Intermixing
Question
What control method delivers status messages, report errors, and is used to test connectivity?

A)Resolution Attacks
B)Digital Quotation
C)Internet Control Message Protocol (ICMP)
D)Address Resolution Protocol (RARP)
Question
The two main types of routing protocols are used to make routing decision based on either distance-vector routing protocols or link-state routing protocols. However, there are a handful of De facto and proprietary interior protocols in use. Which De facto protocol uses link-state algorithms to send out routing table information?

A)Routing Information Protocol
B)Open Shortest Path First
C)Interior Gateway Routing Protocol
D)None of the Above
Question
The two main types of routing protocols are used to make routing decisions based on either distance-vector routing protocols or link-state routing protocols. However, there are a handful of De facto and proprietary interior protocols in use. Which De facto protocol was created by Cisco Systems and uses five criteria to make a decision?

A)Routing Information Protocol
B)Open Shortest Path First
C)Interior Gateway Routing Protocol
D)None of the Above
Question
There are several devices used in LANs, MANs, and WANs that provide communication between networks and computers with functionalities, intelligences, network placement, and capabilities. Which device provides the simplest type of connectivity?

A)Switches
B)Routers
C)Repeaters
D)Bridges
Question
LAN technologies are used to communicate over a small geographic area. What is used to communicate over large geographical areas?

A)LAN
B)WAN
C)WEF
D)FAN
Question
Dedicated links have a single transverse, thus needing to know only two points of reference for delivering packets. When thousands of networks are connected to each other, switching is used. What type(s) of switching is/are there?

A)Circuit Switching
B)Packet Switching
C)Both A and B
D)Neither A nor B
Question
What type of high-speed connection technology provides up to a 52-Mbps transmissions speed without replacing the carrier's copper wire?

A)Cable Modems
B)Digital Subscriber Line
C)Virtual Private Network
D)Both A and C
Question
What technology is a portion of the 802.15 standard and has a transfer rate of 1-to-3 Mbps within a ten meter range?

A)Bluetooth Wireless
B)i-Mode
C)Wireless Application
D)Address Resolution Protocol (RARP)
Question
If wireless connectivity between different locations are to take place via satellite links, they must be within the satellite's_________?

A)Line of Sight
B)Footprint
C)Both A and B
D)Neither A nor B
Question
Baseband uses an entire communication channel for its transmissions. What divides the communication channel into individual and independent channels?

A)CCTV for security viewing
B)Broadband
C)Continuous Analog
D)All of the above
Question
Ethernet is as a LAN-sharing technology that enables several devices to communicate on the same networks. How fast does Fast Ethernet go?

A)100 Mbps
B)50 Mbps
C)150 Mbps
D)200 Mbps
Question
There are two main types of coaxial cable used within LAN environments, 50-ohm cable and 75-ohm cable. What is the core of these cables?

A)Silver binding
B)Copper
C)Tin Twists
D)Platinum
Question
What has the capability that allows a protocol to distinguish between different classes of messages and assign priority levels?

A)Best-effort Service
B)Quality of Service
C)Differentiated Service
D)Guaranteed Service
Question
Which of the following protocols operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?

A)802.11g
B)802.11a
C)802.11b
D)802.11
Question
Rebecca wishes to control how data can flow into and out of her network. She spoke to her boss about problems the office is experiencing with data flow. He took it upon himself to purchase a program, but the program cannot prevent attacks that employ application-specific vulnerabilities. What did the boss purchase?

A)Stateful Firewall
B)Proxy Firewall
C)Firewall Inspector
D)Packet-filtering Firewall
Question
Rebecca returned the Packet-filtering Firewall that she bought to control the data that can flow into and out of a network. Instead, Rebecca went and bought the fifth-generation firewall that creates dynamic, customized TCP/IP stacks when a packet needs to be evaluated. What firewall did Rebecca purchase?

A)Stateful Firewall
B)Kernel Proxy Firewall
C)Firewall Inspector
D)Packet-filtering Firewall
Question
What is the main gate between users and corporate web-based resources?

A)Web Portal
B)Internet Security
C)Identity Management
D)Web Access Management
Question
What is the first line of defense for a network's security and is another name for a locked-down system?

A)Firewall Architecture
B)Dual-homed Firewall
C)Bastion Host
D)Screened Host
Question
Which of the following specifies why Shared Key authentication is considered a security risk?

A)Access points transmit unencrypted challenge text and receive the same challenge text encrypted with the WEP key
B)Keys are shared broadcasted to all network nodes
C)A hacker can sniff the keys with a protocol analyzer
D)All computers use identical WEP keys
Question
Why is SSID filtering not considered a secure form of access control?

A)SSID is uni-casted in the clear to every access point beacon by default.
B)The SSID of a wireless LAN client must match the SSID on the access point in order for the client to authenticate and associate to the access point.
C)SSID of a network can be easily found out using a protocol analyzer.
D)SSID encryption is easy to decrypt using freeware utilities.
Question
Why should access points be connected to switches instead of hubs?

A)Hubs are faster than switches and can handle high-utilization networks.
B)Hubs are full duplex and switches are only half duplex.
C)Hubs are broadcast devices and pose an unnecessary security risk.
D)Access points are not capable of full-duplex mode.
Question
Which of the following wireless LAN user authentication methods provides maximum security?

A)Device independent user names and passwords
B)SSID
C)MAC addresses
D)SSID and MAC address
Question
What type of protocol is used by remote users to authenticate over PPP lines and is the least secure authentication method?

A)Password Authentication Protocol (PAP)
B)Routing Information Protocol (RIP)
C)Internet Control Message Protocol (ICMP)
D)Address Resolution Protocol (RARP)
Question
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to communicate with a database either locally or remotely?

A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
Question
Which of the following security options are included in most wireless residential gateways?

A)PPPoE
B)Routing
C)VPN Client
D)NAT
Question
Which of the following is the best solution to mitigate a jamming attack?

A)Use a spectrum analyzer to locate the RF source and then remove it.
B)Increase the power on the wireless LAN to overpower the jamming signal.
C)Shut down the wireless LAN segment and wait for the jamming signal to dissipate.
D)Arrange for the FCC to shut down the jamming signal's transmitter.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/39
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Communication
1
Madeline travels all day and all night around the United States and no matter where she goes, her IP address is always the same. What technology is this?

A)Mobile Access Ports
B)Mobile IP
C)Mobile Roaming IP Operations
Mobile Roaming IP Operations
2
Protocols determine how computer systems communicate across networks through encapsulation. What is true about encapsulation?

A)It keeps all information within one area.
B)It allows for the building of a message through protocol stacks.
C)Layers can only communicate within their own levels.
D)Protocols must use closed networks to work.
It allows for the building of a message through protocol stacks.
3
A protocol at each layer has specific responsibilities and functions that it must perform. What layer does not include an application, but rather, the protocols that support applications?

A)Presentation Layer
B)Application Layer
C)Transport Layer
D)Network Layer
Application Layer
4
A protocol at each layer has specific responsibilities and functions that it must perform. What layer allows for communication between two applications?

A)Presentation Layer
B)Session Layer
C)Transport Layer
D)Network Layer
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
5
A protocol at each layer has specific responsibilities and functions that it must perform. What layer formats application layer protocols in the OSI model?

A)Presentation Layer
B)Session Layer
C)Transport Layer
D)Network Layer
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
6
What are the two main protocols that work at the transport layer?

A)TCP and UDP
B)TCP and PUD
C)PCT and UDP
D)None of the Above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
7
Henry's computer is sending information by dividing it into small, logical, and more tangible network segments. What is Henry's computer doing?

A)Subletting
B)Submersing
C)Subnetting
D)None of the Above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
8
What types of transmission signals are continuously varying electromagnetic waves?

A)Digital
B)Analog
C)Subbing
D)All of the Above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
9
What type of transmission signals are binary digits as electrical pulses?

A)Digital
B)Analog
C)Subbing
D)None of the Above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
10
What technology has a control frame that travels in a logical circle and is "picked up" when a system needs to communicate?

A)Fiber Distributed Data Interface
B)Token Ring
C)Logic Ring
D)Fast Ethernet
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
11
What was developed by the American National Standards Institute as high-speed token-passing media accessing across technology?

A)Fiber Distributed Data Interface
B)Token Ring
C)Logic Ring
D)Fast Ethernet
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
12
Marsha can't find anything wrong with her computer, but there seems to be a disruption taking place that is causing data corruption. Where would this disruption come from?

A)Electricity
B)Cabling
C)Airwaves
D)None of the Above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
13
Neal and Bob are working on an Ethernet network and are trying to send information at the same time. What can happen to the network?

A)Nothing
B)Interference
C)Collision
D)Data Intermixing
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
14
What control method delivers status messages, report errors, and is used to test connectivity?

A)Resolution Attacks
B)Digital Quotation
C)Internet Control Message Protocol (ICMP)
D)Address Resolution Protocol (RARP)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
15
The two main types of routing protocols are used to make routing decision based on either distance-vector routing protocols or link-state routing protocols. However, there are a handful of De facto and proprietary interior protocols in use. Which De facto protocol uses link-state algorithms to send out routing table information?

A)Routing Information Protocol
B)Open Shortest Path First
C)Interior Gateway Routing Protocol
D)None of the Above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
16
The two main types of routing protocols are used to make routing decisions based on either distance-vector routing protocols or link-state routing protocols. However, there are a handful of De facto and proprietary interior protocols in use. Which De facto protocol was created by Cisco Systems and uses five criteria to make a decision?

A)Routing Information Protocol
B)Open Shortest Path First
C)Interior Gateway Routing Protocol
D)None of the Above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
17
There are several devices used in LANs, MANs, and WANs that provide communication between networks and computers with functionalities, intelligences, network placement, and capabilities. Which device provides the simplest type of connectivity?

A)Switches
B)Routers
C)Repeaters
D)Bridges
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
18
LAN technologies are used to communicate over a small geographic area. What is used to communicate over large geographical areas?

A)LAN
B)WAN
C)WEF
D)FAN
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
19
Dedicated links have a single transverse, thus needing to know only two points of reference for delivering packets. When thousands of networks are connected to each other, switching is used. What type(s) of switching is/are there?

A)Circuit Switching
B)Packet Switching
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
20
What type of high-speed connection technology provides up to a 52-Mbps transmissions speed without replacing the carrier's copper wire?

A)Cable Modems
B)Digital Subscriber Line
C)Virtual Private Network
D)Both A and C
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
21
What technology is a portion of the 802.15 standard and has a transfer rate of 1-to-3 Mbps within a ten meter range?

A)Bluetooth Wireless
B)i-Mode
C)Wireless Application
D)Address Resolution Protocol (RARP)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
22
If wireless connectivity between different locations are to take place via satellite links, they must be within the satellite's_________?

A)Line of Sight
B)Footprint
C)Both A and B
D)Neither A nor B
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
23
Baseband uses an entire communication channel for its transmissions. What divides the communication channel into individual and independent channels?

A)CCTV for security viewing
B)Broadband
C)Continuous Analog
D)All of the above
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
24
Ethernet is as a LAN-sharing technology that enables several devices to communicate on the same networks. How fast does Fast Ethernet go?

A)100 Mbps
B)50 Mbps
C)150 Mbps
D)200 Mbps
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
25
There are two main types of coaxial cable used within LAN environments, 50-ohm cable and 75-ohm cable. What is the core of these cables?

A)Silver binding
B)Copper
C)Tin Twists
D)Platinum
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
26
What has the capability that allows a protocol to distinguish between different classes of messages and assign priority levels?

A)Best-effort Service
B)Quality of Service
C)Differentiated Service
D)Guaranteed Service
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following protocols operates on 2.4GHz and has a bandwidth of 1Mbps or 2Mbps?

A)802.11g
B)802.11a
C)802.11b
D)802.11
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
28
Rebecca wishes to control how data can flow into and out of her network. She spoke to her boss about problems the office is experiencing with data flow. He took it upon himself to purchase a program, but the program cannot prevent attacks that employ application-specific vulnerabilities. What did the boss purchase?

A)Stateful Firewall
B)Proxy Firewall
C)Firewall Inspector
D)Packet-filtering Firewall
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
29
Rebecca returned the Packet-filtering Firewall that she bought to control the data that can flow into and out of a network. Instead, Rebecca went and bought the fifth-generation firewall that creates dynamic, customized TCP/IP stacks when a packet needs to be evaluated. What firewall did Rebecca purchase?

A)Stateful Firewall
B)Kernel Proxy Firewall
C)Firewall Inspector
D)Packet-filtering Firewall
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
30
What is the main gate between users and corporate web-based resources?

A)Web Portal
B)Internet Security
C)Identity Management
D)Web Access Management
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
31
What is the first line of defense for a network's security and is another name for a locked-down system?

A)Firewall Architecture
B)Dual-homed Firewall
C)Bastion Host
D)Screened Host
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following specifies why Shared Key authentication is considered a security risk?

A)Access points transmit unencrypted challenge text and receive the same challenge text encrypted with the WEP key
B)Keys are shared broadcasted to all network nodes
C)A hacker can sniff the keys with a protocol analyzer
D)All computers use identical WEP keys
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
33
Why is SSID filtering not considered a secure form of access control?

A)SSID is uni-casted in the clear to every access point beacon by default.
B)The SSID of a wireless LAN client must match the SSID on the access point in order for the client to authenticate and associate to the access point.
C)SSID of a network can be easily found out using a protocol analyzer.
D)SSID encryption is easy to decrypt using freeware utilities.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
34
Why should access points be connected to switches instead of hubs?

A)Hubs are faster than switches and can handle high-utilization networks.
B)Hubs are full duplex and switches are only half duplex.
C)Hubs are broadcast devices and pose an unnecessary security risk.
D)Access points are not capable of full-duplex mode.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following wireless LAN user authentication methods provides maximum security?

A)Device independent user names and passwords
B)SSID
C)MAC addresses
D)SSID and MAC address
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
36
What type of protocol is used by remote users to authenticate over PPP lines and is the least secure authentication method?

A)Password Authentication Protocol (PAP)
B)Routing Information Protocol (RIP)
C)Internet Control Message Protocol (ICMP)
D)Address Resolution Protocol (RARP)
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
37
Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to communicate with a database either locally or remotely?

A)Object Linking and Embedding Database
B)ActiveX Data Objects
C)Java Database Connectivity
D)Open Database Connectivity
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following security options are included in most wireless residential gateways?

A)PPPoE
B)Routing
C)VPN Client
D)NAT
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
39
Which of the following is the best solution to mitigate a jamming attack?

A)Use a spectrum analyzer to locate the RF source and then remove it.
B)Increase the power on the wireless LAN to overpower the jamming signal.
C)Shut down the wireless LAN segment and wait for the jamming signal to dissipate.
D)Arrange for the FCC to shut down the jamming signal's transmitter.
Unlock Deck
Unlock for access to all 39 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 39 flashcards in this deck.