Shared Flashcard Set

Details

MISC372
MISC372 EWU
63
Computer Networking
12/01/2011

Additional Computer Networking Flashcards

 


 

Cards

Term
Circuits are reasonably efficient for
Definition
ONLY voice NOT data
Term
If a packet passes thru seven switches between the source and destination host there will be _____ physical links
Definition
Eight
Term
2 hosts are separated by 7 networks, there will be ____ packets along the way when a host transmits a packet to another host?
Definition
ONE
Term
Different ISPs interconnect at
Definition
Network Access Points
Term
Is IP reliable?
Definition
NO
Term
What are well known port number(s) for SMTP?
Definition
25
Term
a 7-bit field can represent ______ alternatives
Definition
128
Term
After the internet layer process does encapsulation, it passes the IP packet to the ________ layer process.
Definition
data link
Term
The OSI ________ layer is designed to handle compression and encryption for applications.
Definition
Presentation
Term
If two hosts are separated by seven networks, how many frames will there be along the way when a host transmits a packet to another host?
Definition
7
Term
TCP messages are called ________.
Definition
segments
Term
Hosts on the Internet have ________ address(es)
Definition
2
Term
In internets, different networks are connected by ________.
Definition
Routers
Term
If you did not need error correction or could not use error correction at the transport layer, you would choose ________.
Definition
UDP
Term
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.
Definition
Spyware
Term
Hackers send probe packets to identify ________.
Definition
Both IP addresses with active hosts and hosts running certain applications
Term
In distributed DoS attacks, the attacker sends messages directly to ________.
Definition
The intended victim
Term
PERIMETER DEFENSE is NOT one of the four major security planning principles
Definition
TRUE
Term
The digital certificate provides the ________.
a.private key of the supplicant
b.private key of the true party
c.public key of the supplicant
d.public key of the true party
Definition
d.public key of the true party
Term
Which is less expensive to implement?
a. SSL/TLS.
b. IPsec.
Definition
A. SSL/TLS
Term
________ the physical arrangement of a network's computers, switches, routers, and transmission lines.
a.Network architecture is
b.Network topology is
c.Network layout is
d.Physical layer standards are
Definition
B Network topology
Term
Priority is assigning high priority to ________ applications while giving low priority to ________ applications.
a.latency-tolerant, latency-intolerant
b.latency-intolerant, latency-tolerant
Definition
b.latency-intolerant, latency-tolerant
Term
A packet will definitely get through if it has ________.
a.QoS reserved capacity
b.high priority
c.Both A and B
Definition
A. QoS reserved capacity
Term
he acronym OAM&P stands for ________.
a.organization, authorization, management, and planning
b.operations, administration, maintenance, and provisioning
c.operations, administration, management, and provisioning
d.organization, administration, maintenance, and planning
Definition
A organization, authorization, management, and planning
Term
A high signal-to-noise ratio reduces ________ errors.
a.signal
b.noise
c.interference
d.attenuation
Definition
attenuation
Term
In Ethernet, limiting UTP cord runs to 100 meters normally limits ________ to an acceptable level.
a.attenuation
b.noise errors
c.Both A and B
Definition
C both A & B
Term
Untwisting wire pairs no more than 1.25 cm (a half inch. at their ends reduces ________.
a.interference
b.crosstalk interference
c.terminal crosstalk interference
d.None of the above.
Definition
C - terminal crosstalk interfernce
Term
Cat 5e and Cat 6 wiring can carry Ethernet traffic 100 meters up to ________.
a.1 Mbps
b.10 Mbps
c.100 Mbps
d.1 Gbps
e.10 Gbps
Definition
D - 1 Gbps
Term
Which light wavelength propagates farthest in optical fiber?
a.50 nm.
b.850 nm.
c.1550 nm.
Definition
C - 1550 nm.
Term
Modal dispersion limits transmission distance in ________.
a.multimode fiber
b.single-mode fiber
c.Both A and B
d.Neither A nor B
Definition
A - multimode
Term
The lowest-speed leased lines (under about 2 Mbps) use ________.
a.one-pair voice-grade UTP
b.two-pair voice-grade UTP
c.one-pair data-grade UTP
d.two-pair data-grade UTP
Definition
D - two-pair data grade UTP
Term
Which layer process does NOT do encapsulation when an application layer process transmits a message?
a.Physical.
b.Transport.
c.Data link.
d.Internet.
Definition
A - physical
Term
Which of the following is NOT an OSI layer?
a.Data link.
b.Internet.
c.Session.
d.Presentation.
Definition
B - internet
Term
What is (are) the well-known port number(s) for FTP?
a.20 and 21.
b.25.
c.80.
Definition
A - 20 & 21
Term
What type of interference is the most frequently encountered?
a.Electromagnetic interference.
b.Crosstalk interference.
c.Terminal crosstalk interference.
d.Noise interference.
Definition
C - terminal crosstalk interference
Term
What 802 Working Group creates Ethernet standards?
a.802.1.
b.802.2.
c.802.3.
d.802.5.
Definition
C - 802.3
Term
The most widely used Ethernet standard for connecting switches to other switches is ________.
a.100BASE-TX
b.1000BASE-LX
c.Both A and B
d.Neither A nor B
Definition
D - neither
Term
LANs that span distances of several kilometers by using multimode fiber are made possible by ________.
a.multimode optical fiber
b.high modal dispersion
c.high modal bandwidth
d.regeneration
Definition
D - regeneration
Term
Ethernet addresses are called ________ addresses.
a.MAC
b.physical
c.Both A and B
d.Neither A nor B
Definition
C - both
Term
H2-BC-66-0D-5E-BA is a valid MAC address.
a.True.
b.False.
Definition
B - FALSE
Term
An Ethernet switch knows ________.
a.the IP address for each MAC address
b.a single port number for each MAC address
c.multiple port numbers for each MAC address
d.the entire path from the source host to the destination host
Definition
B - a single port number for each MAC address
Term
Which of the following can be used to increase reliability considerably in an Ethernet LAN?
a.Using a hierarchical topology.
b.Using a mesh topology.
c.Using a ring topology.
d.Using the Rapid Spanning Tree Protocol.
Definition
D - Rapid Spanning Tree Protocol
Term
Which of the following is a layer within the data link layer?
a.
LLC layer.
b.MAC layer.
c.Both A and B
Definition
C - BOTH
Term
An Ethernet switch knows ________.
a.the IP address for each MAC address
b.a single port number for each MAC address
c.multiple port numbers for each MAC address
d.the entire path from the source host to the destination host
Definition
B - a single port number for each MAC address
Term
The signal strength at 20 meters is 90 mW; the signal strength at 60 meters would be ________ mW.
Definition
B - 10
Term
The most serious problem with wireless transmission in WLANs is ________.
a.inverse square law attenuation
b.absorptive attenuation
c.shadow zones
d.multipath interference
Definition
D - multipath
Term
Wireless LAN standards are created by the ________ Working Group.
a.802.1
b.802.3
c.802.11
Definition
C - 802.11
Term
The total range of possible 802.11 WLAN frequencies in the 2.4 GHz band constitutes ________.
a.a frequency spectrum
b.a broadband
c.a channel
d.a service band
Definition
D - a service band
Term
802.11 standards are being developed to work in the ________ unlicensed band.
a.2.4 GHz
b.5 GHz
c.Both A and B
Definition
C - Both
Term
The 2.4 GHz band supports ________ nonoverlapping channels.
a.1
b.3
c.7
d.11
Definition
B - 3
Term
What aspect of 802.11 standards affects interference between nearby access points?
a.The number of possible nonoverlapping channels.
b.The standard's minimum spacing parameter.
c.RTS/CTS.
d.All of the above.
Definition
A.The number of possible nonoverlapping channels.
Term
Spread spectrum transmission is used in WLANs for ________.
a.higher transmission speed
b.more reliable transmission
c.greater security
d.All of the above.
Definition
B - more reliable transmission
Term
A wireless host sends a packet to a server on the company's wired Ethernet LAN via an access point. How many frames will be involved in this one-way transmission?
a.1.
b.2.
c.3.
d.4.
e.There will be one frame for each switch along the way.
Definition
B - 2
Term
There is an access point that serves eight wireless hosts. On how many channels will these devices transmit during the course of an hour or two?
a.1.
b.2 (one in each direction).
c.7.
d.8.
e.9.
Definition
A - 1
Term
802.11n is designed to operate in the ________ unlicensed band.
a.2.4 GHz
b.5 GHz
c.Both A and B
Definition
C - both
Term
What is the strongest security protocol for 802.11 today?
a.802.11i.
b.802.11s.
c.802.11X.
d.WPA.
e.WEP.
Definition
A - 802.11i
Term
In what mode of 802.11i operation is a central authentication server used?
a.802.1X mode.
b.PSK mode.
c.Both A and B
d.Neither A nor B
Definition
A - 802.1X mode
Term
What damage can an evil twin access point do?
a.Eavesdrop on communication.
b.Steal important keys or other information transmitted by the client.
c.Launch attacks against corporate servers.
d.All of the above
Definition
D - all of above
Term
An MTSO ________.
a.controls cellsites in a cellular system
b.links mobile users to wired telephone customers
c.Both A and B
Definition
C - both
Term
Which 4G technology do most carriers intend to use?
a.LTE.
b.WiMAX.
c.Both A and B
d.Neither A nor B
Definition
A - LTE
Term
Which transmission medium is dominant for the wired access line between a host and the switch that serves the host?
a.4-pair UTP.
b.Optical fiber.
c.Both are used about equally.
d.Neither A nor B
Definition
A - 4-pair UTP
Term
In 802.11i ________, hosts must know a shared key.
a.802.1X mode
b.PSK mode
c.Both A and B
d.Neither A nor B
Definition
B - PSK mode
Term
Which of the following can be used to centrally manage remote access points?
a.Smart access points.
b.WLAN switches.
c.Both A and B
d.Neither A nor B
Definition
C - both