Filters
Question type

Study Flashcards

Marsha can't find anything wrong with her computer, but there seems to be a disruption taking place that is causing data corruption. Where would this disruption come from?


A) Electricity
B) Cabling
C) Airwaves
D) None of the Above

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

What type of high-speed connection technology provides up to a 52-Mbps transmissions speed without replacing the carrier's copper wire?


A) Cable Modems
B) Digital Subscriber Line
C) Virtual Private Network
D) Both A and C

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following security options are included in most wireless residential gateways?


A) PPPoE
B) Routing
C) VPN Client
D) NAT

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

C

Protocols determine how computer systems communicate across networks through encapsulation. What is true about encapsulation?


A) It keeps all information within one area.
B) It allows for the building of a message through protocol stacks.
C) Layers can only communicate within their own levels.
D) Protocols must use closed networks to work.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

The two main types of routing protocols are used to make routing decision based on either distance-vector routing protocols or link-state routing protocols. However, there are a handful of De facto and proprietary interior protocols in use. Which De facto protocol uses link-state algorithms to send out routing table information?


A) Routing Information Protocol
B) Open Shortest Path First
C) Interior Gateway Routing Protocol
D) None of the Above

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Baseband uses an entire communication channel for its transmissions. What divides the communication channel into individual and independent channels?


A) CCTV for security viewing
B) Broadband
C) Continuous Analog
D) All of the above

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What types of transmission signals are continuously varying electromagnetic waves?


A) Digital
B) Analog
C) Subbing
D) All of the Above

E) A) and C)
F) B) and C)

Correct Answer

verifed

verified

Applications need to be able to interact with information stored in databases for data to be useful. What application programming interface language allows an application to communicate with a database either locally or remotely?


A) Object Linking and Embedding Database
B) ActiveX Data Objects
C) Java Database Connectivity
D) Open Database Connectivity

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Madeline travels all day and all night around the United States and no matter where she goes, her IP address is always the same. What technology is this?


A) Mobile Access Ports
B) Mobile IP
C) Mobile Roaming IP Operations

D) A) and C)
E) B) and C)

Correct Answer

verifed

verified

Neal and Bob are working on an Ethernet network and are trying to send information at the same time. What can happen to the network?


A) Nothing
B) Interference
C) Collision
D) Data Intermixing

E) C) and D)
F) A) and D)

Correct Answer

verifed

verified

What technology is a portion of the 802.15 standard and has a transfer rate of 1-to-3 Mbps within a ten meter range?


A) Bluetooth Wireless
B) i-Mode
C) Wireless Application
D) Address Resolution Protocol (RARP)

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

What type of protocol is used by remote users to authenticate over PPP lines and is the least secure authentication method?


A) Password Authentication Protocol (PAP)
B) Routing Information Protocol (RIP)
C) Internet Control Message Protocol (ICMP)
D) Address Resolution Protocol (RARP)

E) A) and C)
F) A) and D)

Correct Answer

verifed

verified

What type of transmission signals are binary digits as electrical pulses?


A) Digital
B) Analog
C) Subbing
D) None of the Above

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

A

Dedicated links have a single transverse, thus needing to know only two points of reference for delivering packets. When thousands of networks are connected to each other, switching is used. What type(s) of switching is/are there?


A) Circuit Switching
B) Packet Switching
C) Both A and B
D) Neither A nor B

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

A protocol at each layer has specific responsibilities and functions that it must perform. What layer does not include an application, but rather, the protocols that support applications?


A) Presentation Layer
B) Application Layer
C) Transport Layer
D) Network Layer

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

What technology has a control frame that travels in a logical circle and is "picked up" when a system needs to communicate?


A) Fiber Distributed Data Interface
B) Token Ring
C) Logic Ring
D) Fast Ethernet

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following wireless LAN user authentication methods provides maximum security?


A) Device independent user names and passwords
B) SSID
C) MAC addresses
D) SSID and MAC address

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

A

What is the first line of defense for a network's security and is another name for a locked-down system?


A) Firewall Architecture
B) Dual-homed Firewall
C) Bastion Host
D) Screened Host

E) None of the above
F) All of the above

Correct Answer

verifed

verified

What was developed by the American National Standards Institute as high-speed token-passing media accessing across technology?


A) Fiber Distributed Data Interface
B) Token Ring
C) Logic Ring
D) Fast Ethernet

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Rebecca wishes to control how data can flow into and out of her network. She spoke to her boss about problems the office is experiencing with data flow. He took it upon himself to purchase a program, but the program cannot prevent attacks that employ application-specific vulnerabilities. What did the boss purchase?


A) Stateful Firewall
B) Proxy Firewall
C) Firewall Inspector
D) Packet-filtering Firewall

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Showing 1 - 20 of 39

Related Exams

Show Answer