Shared Flashcard Set

Details

ISQA 380 Exam 6
Chapters 14, 15 & 18
45
Computer Science
Undergraduate 3
12/07/2009

Additional Computer Science Flashcards

 


 

Cards

Term

WMAN

 

A) can operate as fast as 100 Mbps.

B) is a high-data-rate broadband system that can operate over substantial distances.

C) is also called WiMAN.

D) can range more than 50 miles.

Definition

B) is a high-data-rate broadband system that can operate over substantial distances.

Term

Industrial, scientific, medical (ISM) bands


A) are not licensed in the United States.
B) are not defined within the NII.
C) are licensed in most other countries.
D) are not utilized by private communications networks.

Definition

A) are not licensed in the United States.

Term

Bluetooth


A) cannot be used with camera or mp3 players.
B) is the predominant WPAN technology of today.
C) is not readily able to be used by individuals.
D) cannot connect laptops to printers and other peripherals.

Definition

B) is the predominant WPAN technology of today.

Term

A basic service set (BSS)


A) has a minimum of four stations.
B) computers may not be mobile stations.
C) is the fundamental structure of WLANs.
D) cannot be an independent standalone LAN.

Definition

C) is the fundamental structure of WLANs.

Term

A voice coder (vocoder)


A) transform digital data into spoken voice.
B) are cell phones with PDA features.
C) are not similar to codecs used for analog to digital conversion in wired networks.
D) are built into the cell phones to transform spoken voice (analog) into digital data.

Definition

D) are built into the cell phones to transform spoken voice (analog) into digital data.

Term

Wireless security


A) is not presently a primary consideration.
B) does not put emphasis on ways to make transmissions unreadable to inceptors.
C) does not place emphasis that delivery is to the intended recipient without interception.
D) bears the additional burden of its transmissions being more easily captured.

Definition

D) bears the additional burden of its transmissions being more easily captured.

Term

An access point (AP)


A) permits its stations to communicate with stations outside the BSS.
B) cannot be connected by wire to the organization's wired networks.
C) is a node connected wirelessly to the BSS stations.
D) cannot be a node connected via of a backbone.

Definition

C) is a node connected wirelessly to the BSS stations.

Term

Mobile switching centers (MSC)


A) do not provide links to the wired telephone network and the Internet.
B) connect and control the base stations.
C) cannot maintain calling and billing records.
D) do not provide base station coordination.

Definition

B) connect and control the base stations.

Term

A wireless local area network (WLAN)


A) uses radio wave carriers to transmit signals among its nodes.
B) .do not provide flexibility and mobility for connecting users to wired networks.
C) do not share the networking burden with their wired counterparts.
D) operate between 5 GHz and 8 GHz bands.

Definition

A) uses radio wave carriers to transmit signals among its nodes.

Term

An independent basic service set (IBSS)


A) needs a dedicated server.

B) is also called an ad hoc network.
C) cannot operate as a peer-to-peer LAN.

D) can not have more than one server.

Definition

B) is also called an ad hoc network.

Term

FDMA


A) provided security against fraudulent use.
B) multiplexed the analog systems of voice channels of the first-generation cell phones.
C) were free of analog-based communication problems.
D) provided extensive coverage.

Definition

B) multiplexed the analog systems of voice channels of the first-generation cell phones.

Term

Frequency bands


A) are not based on the needs of various services that use them.
B) are a number of subgroups partitioned by the FCC from the available wireless frequency
spectrum.
C) are allocated very freely by the FCC.
D) .are not in demand by users.

Definition

B) are a number of subgroups partitioned by the FCC from the available wireless frequency

Term

Downlink refers to


A) signals sent from one location on earth to an orbiting satellite.
B) retransmission of signals to another earthbound station in a different location.
C) retransmission of signals to another station that is not in line of sight with the satellite.
D) the use of satellites relay stations.

Definition

B) retransmission of signals to another earthbound station in a different location.

Term

The cell phone


A) was first demonstrated in 1983 by Motorola.
B) is a low-power transmitter/receiver (transceiver) for voice and data.
C) communicates wirelessly through a collection of satellites.
D) cannot be used as the sole phone that people have.

Definition

B) is a low-power transmitter/receiver (transceiver) for voice and data.

Term

Satellites in geosynchronous earth orbits (GEOs)


A) are not in as high an orbit as almost all other communications satellites.
B) appear to be in motion to an observer on the ground.
C) are not always in the line of sight.
D) match the rotation of the earth.

Definition

D) match the rotation of the earth.

Term

A detection system (IDS)


A) does not refuse access to certain sites.

B) isolates and quarantines suspected files.
C) does not protect network data or host activity.

D) does not refuse to download or certain files.

Definition

B) isolates and quarantines suspected files.

Term

Social engineering


A) is a form of packet sniffing.
B) is tricking people or systems into providing confidential or sensitive information.
C) does not use e-mail on a regular basis.
D) can be avoided if you are on guard.

Definition

B) is tricking people or systems into providing confidential or sensitive information.

Term

Circuit level firewalls


A) are also called multilayer firewalls.
B) delve into the transport headers, monitoring connection-oriented session (circuit) establishment attempts
by TCP.
C) are the principal corporate firewalls.
D) is the same as an application firewall.

Definition

B) delve into the transport headers, monitoring connection-oriented session (circuit) establishment attempts

Term

A packet sniffer


A) is a device used to eavesdrop on network traffic.
B) is immune to all forms of encryption.
C) does not include any software to discover the protocols being used.
D) cannot interpret the overheard bit stream.

Definition

A) is a device used to eavesdrop on network traffic.

Term

Worms


A) have to attach themselves to other programs to reproduce.
B) are not designed to travel along with transmissions.
C) cannot propagate on their own.
D) are self-replicating.

Definition

D) are self-replicating.

Term

Encryption


A) requires very simple algorithms.
B) does not use keys to convert plaintext to ciphertext.
C) obfuscates the data so that it will not be intelligible to anyone but the intended recipient.
D) when used in a document is called plaintext.

Definition

C) obfuscates the data so that it will not be intelligible to anyone but the intended recipient.

Term

Spam


A) may be used to trick users to open a malware attachment.
B) is never solicited.
C) is not a form of social engineering when it is solicited.
D) is bulk e-mail

Definition

D) is bulk e-mail

Term

A virtual private network (VPN)


A) does not simulate a dedicated private network.
B) do not discard packets with checksum failures.
C) rarely make use of IPsec.
D) is a way to transmit secure data over a network that may not be secure.

Definition

D) is a way to transmit secure data over a network that may not be secure.

Term

Spoofing


A) may be used to trick users to open a malware attachment.
B) is not as dangerous as spam.
C) is unsolicited spam.
D) refers to falsifying source addresses to lure you to reveal confidential information.

Definition

D) refers to falsifying source addresses to lure you to reveal confidential information.

Term

Malware


A) does not affect executable program code.
B) is software aimed at a network or computer-related disruption of one sort or another.
C) is poorly written software.
D) is not similar to a Trojan horse.

Definition

B) is software aimed at a network or computer-related disruption of one sort or another.

Term

Denial-of-service (DoS) attacks


A) are also designed to destroy files and steal data.
B) are used by hackers to shut down particular resources by overloading them.
C) are triggered by an IDS-based flood.
D) are never a problem for newer systems.

Definition

B) are used by hackers to shut down particular resources by overloading them.

Term

Spyware


A) watches your activity on the computer without your knowledge or consent.
B) cannot transfer captured information to other parties over the Internet.
C) is not similar to adware.
D) cannot capture keystrokes.

Definition

A) watches your activity on the computer without your knowledge or consent.

Term

A backdoor


A) is a purposely created route to one or more corporate networks that bypasses IDSs.
B) is rarely discovered by hackers.
C) does not allow IT personnel to work with the network.
D) should be open at all times.

Definition

A) is a purposely created route to one or more corporate networks that bypasses IDSs.

Term

Host based intrusion detection systems


A) monitor download attempts.

B) inspect layer headers.
C) check for valid security certificates.

D) does not guard against access to certain sites.

Definition

A) monitor download attempts.

Term

Packet filtering firewalls


A) routs all traffic from the Internet by IP (datalink layer) addresses.
B) checks all packets coming from Layer 2 headers.
C) will not allow unchecked packets to reach any higher than the network layer.
D) run on corporate border routers.

Definition

D) run on corporate border routers.

Term

Fiber-optic systems


A) are an inexpensive solution.

B) cannot bb split off to multimode fiber.
C) do not utilize single-mode fiber.

D) can handle the full variety of current services.

Definition

D) can handle the full variety of current services.

Term

Higher Speed Study Group (HSSG)


A) expect to create a standard that will operate at distances greater than 19.2 kilometers.
B) focuses on 100 gigabit Ethernet.
C) operates on multi-mode fiber.
D) focuses on 40 gigabit Ethernet.

Definition

B) focuses on 100 gigabit Ethernet.

Term

Legacy copper networks


A) cannot handle HDTV.
B) can transmit bundled services — voice, Internet access, music, and video.
C) are capable of real-time full motion conferencing.
D) were designed as double-service systems.

Definition

A) cannot handle HDTV.

Term

Next generation Internet (NGI)


A) was officially launched in 1997 with the publication of an implementation plan.
B) was designed as a ten year project to supplement the other projects taking place — vBNS, Internet2, and
Abilene.
C) did not aim at developing a replacement for the current Internet.
D) began with a 1996 announcement by President Bush.

Definition

A) was officially launched in 1997 with the publication of an implementation plan.

Term

Cable TV companies


A) have completely converted from analog to digital transmission.
B) have not converted to high-speed, symmetric, and wide-bandwidth systems.
C) are moving toward fiber-optic cables like the telephone companies.
D) are beginning to face competition from telephone companies.

Definition

D) are beginning to face competition from telephone companies.

Term

Optical switch development


A) is the key to creating optical networks.
B) are not capable of supporting an all optical network.
C) was the work of a group of engineers at Cal Poly.
D) are not capable of very high data rates between interconnected devices.

Definition

A) is the key to creating optical networks.

Term

Single-mode fiber


A) cannot be utilized as a link to high-demand business.
B) cannot be considered for the last mile.
C) is the medium of choice for long haul.
D) is a less expensive solution.

Definition

C) is the medium of choice for long haul.

Term

The European Telecommunications Standards Institute (ETSI)


A) deals with broadband systems.
B) develops specifications to submit as proposals to standard bodies.
C) has an agreed-on standard.
D) promotes interoperability standards between in-house and external power line networks.

Definition

D) promotes interoperability standards between in-house and external power line networks.

Term

Power over Ethernet (POE)


A) sends data over power lines.
B) requires the location of devices near electrical outlets.
C) does not curtail the amount of power available to any one device.
D) provides up to 48 volts of electrical power over standard unshielded twisted pair (UTP) LAN cables to
network-attached devices.

Definition

D) provides up to 48 volts of electrical power over standard unshielded twisted pair (UTP) LAN cables to
network-attached devices.

Term

Light—electric conversion


A) is the same as optical-switch development.

B) cannot be used with light-based computers.
C) increases overall speed.

D) increases complexity and cost.

Definition

D) increases complexity and cost.

Term

All optical networking (AON)


A) are not practical as long-haul networks.
B) consists of all optical transport, switching, and bandwidth management.
C) require electrical/optical conversions.
D) use DWDM.

Definition

B) consists of all optical transport, switching, and bandwidth management.

Term

Power-line communications (PLC)


A) is a narrowband system.
B) cannot be used for digitally encoded analog signals.
C) is the process of delivering data over power lines.
D) do not require an addressing mechanism.

Definition

C) is the process of delivering data over power lines.

Term

Internet2


A) is not considered to be an eventual Internet replacement.
B) is an alliance of over 200 U.S. universities that are involved with learning and research projects.
C) does not provide appropriate infrastructure to support the work.
D) is an expensive hybrid optical and packet network.

Definition

B) is an alliance of over 200 U.S. universities that are involved with learning and research projects.

Term

Abilene


A) was intended to be a vBNS competitor.
B) began with an OC-96 SONET backbone and an IPv6 as an overlay network.
C) was to provide a test bed for Internet2 researchers similar to vBNS.
D) was a high-performance backbone first implemented in 1999.

Definition

D) was a high-performance backbone first implemented in 1999.

Term

An optical-electrical-optical (O-E-O) switch


A) make the most sense for optical networks, particularly at the network edges.
B) is coded in such a way that the outer letter refers to the switch itself.
C) are not capable of multiplexing.
D) is coded in such a way that the middle letter.refers to input and output.

Definition

A) make the most sense for optical networks, particularly at the network edges.

Supporting users have an ad free experience!