Deck 3: Telecommunications and Network Security

Full screen (f)
exit full mode
Question
Layer 2 of the OSI model is called the transport layer.
Use Space or
up arrow
down arrow
to flip the card.
Question
The IP address 192.168.5.5 is a private IP address according to RFC 1918.
Question
The contention method used in Ethernet is called Token passing.
Question
A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city.
Question
802.11g operates at a maximum of 11 Mbps.
Question
Wired Equivalent Privacy (WEP) was the first security measure used with 802.11.
Question
To deploy DNSSEC, a Public Key Infrastructure (PKI) must be built.
Question
The port number for HTTP is 88.
Question
100Base-FX is a fiber standard.
Question
Application level proxies have the least impact on performance.
Question
At which layer of the OSI model does the encapsulation process begin?

A) Application
B) Transport
C) Session
D) Network
Question
Which of the following represents the range of well-known port numbers?

A) 0-1023
B) 1024-49151
C) 2500-3500
D) 49152-65535
Question
Which cable type uses a source of light that shoots down an inner glass or plastic core?

A) Coaxial
B) UTP
C) STP
D) Fiber optic
Question
What is the contention method used with 802.11?

A) Token passing
B) CSMA/CD
C) Polling
D) CSMA/CA
Question
Distance vector routing protocols use which of the following as its metric?

A) Hop count
B) Cost
C) Bandwidth
D) Delay
Question
How many channels are contained in a T1?

A) 3
B) 8
C) 16
D) 24
Question
What role does the access point play when using a RADIUS server?

A) Authenticator
B) Authentication server
C) Supplicant
D) Relay
Question
________________is the weakening of the signal as it travels down the cable and meets resistance.

A) Crosstalk
B) Attenuation
C) Noise
D) EMI
Question
Which attack takes advantage of the TCP three-way handshake?

A) Smurf
B) SYN ACK attack
C) Fraggle
D) Teardrop
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/19
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Telecommunications and Network Security
1
Layer 2 of the OSI model is called the transport layer.
False
2
The IP address 192.168.5.5 is a private IP address according to RFC 1918.
True
3
The contention method used in Ethernet is called Token passing.
False
4
A Metropolitan-area network (MAN) is a type of LAN that encompasses a large area such as the downtown of a city.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
5
802.11g operates at a maximum of 11 Mbps.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
6
Wired Equivalent Privacy (WEP) was the first security measure used with 802.11.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
7
To deploy DNSSEC, a Public Key Infrastructure (PKI) must be built.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
8
The port number for HTTP is 88.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
9
100Base-FX is a fiber standard.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
10
Application level proxies have the least impact on performance.
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
11
At which layer of the OSI model does the encapsulation process begin?

A) Application
B) Transport
C) Session
D) Network
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following represents the range of well-known port numbers?

A) 0-1023
B) 1024-49151
C) 2500-3500
D) 49152-65535
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
13
Which cable type uses a source of light that shoots down an inner glass or plastic core?

A) Coaxial
B) UTP
C) STP
D) Fiber optic
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
14
What is the contention method used with 802.11?

A) Token passing
B) CSMA/CD
C) Polling
D) CSMA/CA
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
15
Distance vector routing protocols use which of the following as its metric?

A) Hop count
B) Cost
C) Bandwidth
D) Delay
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
16
How many channels are contained in a T1?

A) 3
B) 8
C) 16
D) 24
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
17
What role does the access point play when using a RADIUS server?

A) Authenticator
B) Authentication server
C) Supplicant
D) Relay
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
18
________________is the weakening of the signal as it travels down the cable and meets resistance.

A) Crosstalk
B) Attenuation
C) Noise
D) EMI
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
19
Which attack takes advantage of the TCP three-way handshake?

A) Smurf
B) SYN ACK attack
C) Fraggle
D) Teardrop
Unlock Deck
Unlock for access to all 19 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 19 flashcards in this deck.