Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Design
Q:
The main benefit of IPv6 over IPv4 is ________.
A) two more bits in the IP address
B) two more bytes in the IP address
C) the ability to have quality-of-service guarantees
D) the ability to support more possible hosts
Q:
The new version of Internet Protocol that is coming into use is IP version ________.
A) 1
B) 2
C) 6
D) 8
Q:
Which is a problem with IPv4 addresses?
A) They cannot be used on wireless devices.
B) They are too complex.
C) Routers find it difficult to handle them.
D) We have run out of them.
Q:
In an IPv4 packet, the ________ field value tells the type of message contained in the IP packet's data field.
A) data
B) next-hop
C) next-header
D) protocol
Q:
A router will discard a packet if the Time to Live (TTL) value in an arriving packet is ________.
A) 0
B) 1
C) 254
D) 256
Q:
Which IPv4 header field is used to specify quality of service?
A) type of service
B) version number
C) ECN
D) differentiated services control point
Q:
The main version of Internet Protocol in use today is IP version ________.
A) 1
B) 4
C) 5
D) 6
Q:
ARP operates at ________.
A) Layer 2
B) Layer 3
C) both A and B
D) neither A nor B
Q:
Address Resolution Protocol is used to find the destination data link layer destination addresses of ________.
A) destination hosts
B) routers
C) both A and B
D) neither A nor B
Q:
A router must use the Address Resolution Protocol process ________.
A) when a new router comes online
B) when a router goes offline
C) whenever it forwards an IP packet
D) whenever it forwards an IP packet to a host that is not in its ARP cache
Q:
What does a router do with Address Resolution Protocol request messages?
A) It broadcasts them.
B) It sends them directly to the destination host.
C) It sends them to a next-hop router.
D) It sends them to the default next-hop router.
Q:
To deliver an arriving packet to a destination host on a subnet connected to a router, the router needs to know the destination host's ________ before the router can send the packet on to the destination host.
A) IP address
B) data link layer address
C) both A and B
D) neither A nor B
Q:
Compared to normal routing, decision caching is ________.
A) faster
B) less dangerous
C) both A and B
Q:
According to the IETF standards, if a router receives a series of packets from the same IP address to the same IP address, it should ________.
A) go through the entire process for each packet
B) cache the decision made for the first packet and use this decision on subsequent packets
C) skip the first step in the routing process but go through other steps for each subsequent packet
D) none of the above
Q:
The router selects a row in which the next-hop router is labeled local. The router will send the packet to the ________.
A) default router
B) local next-hop router
C) local host
D) destination host
Q:
After selecting a row on a routing table, a router will send packets out to the ________.
A) port
B) socket
C) interface
D) plug
Q:
Deciding what interface and to what device to send the packet back out is step ________ in the routing process.
A) 1
B) 2
C) 3
D) 4
Q:
Row 2707 has the mask /16 and the reliability metric 20. Row 4400 has the mask /16 and the reliability metric 10. Which row will the router choose if both are matches?
A) 2707
B) 4400
C) either A or B
D) The router will choose the default row.
Q:
Row 2707 has the mask /16 and the cost metric 20. Row 4400 has the mask /14 and the cost metric 10. Which row will the router choose if both are matches?
A) 2707
B) 4400
C) either A or B
D) The router will choose the default row.
Q:
The first step in the routing process involves ________.
A) selecting the best match row
B) comparing the packet's destination IP address to all rows
C) comparing the packet's destination IP address to matching rows
D) selecting an interface
Q:
In a routing table, Rows 47 and 3497 both match the destination IP address of an arriving packet's IP address. Which row will the router look at first when trying to find matches?
A) 1
B) 47
C) 3497
D) the default row
Q:
The default row ________.
A) always has the mask /32
B) will always match the destination IP address of an incoming packet
C) both A and B
D) neither A nor B
Q:
A(n) ________ must find the best-matching row in its ________ table by comparing multiple row matches.
A) Ethernet switch, switching
B) router, routing
C) both A and B
D) neither A nor B
Q:
For 100,000 addresses, which will have fewer rows?
A) a routing table
B) an Ethernet switching table
C) Both will be about the same length.
Q:
There is a row for each individual Ethernet address in a(n) ________.
A) Router table
B) Ethernet switching table
C) both A and B
D) neither A nor B
Q:
Routers usually are connected in a ________ topology.
A) point-to-point
B) mesh
C) hierarchical
D) bus
Q:
For a given volume of traffic, which are more expensive?
A) switches
B) routers
C) Both of the above are about equally expensive.
Q:
Express the mask /18 in dotted decimal notation.
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) none of the above
Q:
Express the mask /24 in dotted decimal notation.
A) 255.0.0.0
B) 255.255.0.0
C) 255.255.255.0
D) none of the above
Q:
In the mask /14, how many 1s are there?
A) 8
B) 16
C) 24
D) none of the above
Q:
In the mask 255.255.255.0, how many 1s are there?
A) 8
B) 16
C) 24
D) We cannot say.
Q:
In a subnet mask, the 1s correspond to the ________.
A) network part
B) subnet part
C) host part
D) none of the above
Q:
In a network mask, the 1s correspond to the ________.
A) network part
B) subnet part
C) host part
D) none of the above
Q:
A mask has ________ bits.
A) 8
B) 16
C) 32
D) We cannot say.
Q:
An internal router only connects different IP ________.
A) subnets
B) networks
C) both A and B
D) neither A nor B
Q:
In the IPv4 address 1.2.3.4, what is the network part?
A) 1
B) 1.2
C) 1.2.3
D) It is hard to say with limited information.
Q:
The total length of an IPv4 address is ________ bits.
A) 8
B) 16
C) 32
D) We cannot say.
Q:
The network part of an IPv4 address is ________ bits long.
A) 8
B) 16
C) 32
D) It is hard to say with limited information.
Q:
Which of the following is one of the three parts of an IPv4 address?
A) subnet part
B) mask
C) both A and B
D) neither A nor B
Q:
When a router forwards incoming packets closer to their destination hosts, this is ________.
A) routing
B) switching
C) bridging
D) relaying
Q:
Router connectors are called ________.
A) sockets
B) plugs
C) interfaces
D) ports
Q:
In NFC, an attacker several meters away cannot read the transaction.
Q:
Which of the following uses an access point?
A) traditional Wi-Fi
B) Wi-Fi Direct
C) both A and B
D) neither A nor B
Q:
Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) the scanning unit
Q:
Passive RFID chips are powered by ________.
A) a battery
B) the sun
C) body temperature
D) none of the above
Q:
In which frequency band does NFC operate?
A) 2.4 GHz
B) 5 GHz
C) both A and B
D) neither A nor B
Q:
Near-field communication has a maximum transmission distance of about ________.
A) 400 cm/200 in
B) 40 cm/20 in
C) 4 cm/2 in
D) The devices must be physically touching.
Q:
Which Bluetooth profile would a desktop use with a Bluetooth keyboard?
A) Bluetooth input profile
B) Bluetooth I/O profile
C) human interface device profile
D) none of the above
Q:
At the beginning of a telephone call placed through a Bluetooth headset with the Hands-Free Profile, which device is initially the master?
A) the Bluetooth phone
B) the Bluetooth headset
C) Both are simultaneously masters and slaves.
Q:
In Bluetooth, a master can have up to ________ slaves at any moment.
A) 1
B) 3
C) 12
D) none of the above
Q:
Which of the following can use access points?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B
Q:
Which form of Bluetooth has a typical transmission speed of about 24 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) enterprise Bluetooth
D) none of the above
Q:
Which form of Bluetooth has a typical transmission speed of less than 3 Mbps?
A) classic Bluetooth
B) high-speed Bluetooth
C) personal Bluetooth
D) none of the above
Q:
Bluetooth is standardized by the ________.
A) 802.11 Working Group
B) Wi-Fi Alliance
C) Bluetooth Special Interest Group
D) none of the above
Q:
Which of the following was created for PANs?
A) 802.11
B) Bluetooth
C) both A and B
D) neither A nor B
Q:
Bluetooth is for ________.
A) large WLANs
B) cable replacement
C) both A and B
D) neither A nor B
Q:
I wish to have a wireless LAN to serve my house. I will use ________.
A) 802.11
B) Bluetooth
C) either A or B
Q:
A radio that has a power of 8 mW represents a ratio of about ________ dBm.
A) 2
B) 8
C) 9
D) 10
Q:
1 Watt represents a dBm value of about ________.
A) 10
B) 20
C) 30
D) We cannot say because only one power is given.
Q:
A 100/1 increase in power corresponds to approximately ________ decibels.
A) 6
B) 10
C) 20
D) none of the above
Q:
A power ratio of 8/1 decrease in power corresponds to approximately ________ decibels.
A) 3
B) 6
C) 9
D) none of the above
Q:
An 8/1 increase in power corresponds to approximately ________ decibels.
A) 3
B) 6
C) 20
D) none of the above
Q:
Which is the correct formula for decibels?
A) 10 * P2/P1
B) 10 * (P2/P1)2
C) Log10(P2/P1)
D) none of the above
Q:
Managed access points should ________.
A) identify rogue access points
B) be able to push updates out to access points
C) both A and B
D) neither A nor B
Q:
Managed access points should ________.
A) allow access point power to be adjusted remotely
B) provide constant transmission quality monitoring
C) both A and B
D) neither A nor B
Q:
Centralized access point management ________.
A) increases management costs but provides better control
B) reduces management costs
Q:
In VPNs designed to frustrate evil twin attacks, the shared secret ________.
A) is transmitted in the clear
B) is transmitted with cryptographic protections
C) is not transmitted
D) Any of the above.
Q:
Which of the following secures communication between the wireless computer and the server it wishes to use against evil twin attacks?
A) VLANs
B) VPNs
C) PEAP
D) 802.1X mode
Q:
If a company uses 802.11i for its core security protocol, an evil twin access point will set up ________ 802.11i connection(s).
A) one
B) two
C) four
D) 16
Q:
Which of the following is usually set up by a hacker outside the building?
A) a rogue access point
B) an evil twin access point
C) both A and B
D) neither A nor B
Q:
A notebook computer configured to act like a real access point is a(n) ________.
A) evil twin access point
B) rogue access point
Q:
A rogue access point ________.
A) is an unauthorized internal access point
B) often has very poor security
C) often operates at high power
D) All of the above are true.
Q:
A rogue access point is created by ________.
A) an employee
B) an external attacker
C) the IT security department
D) an evil twin
Q:
An unauthorized internal access point is a(n) ________ access point.
A) evil twin
B) rogue
C) shadow
D) counterfeit
Q:
802.1X requires security between the supplicant and the authenticator in ________.
A) Ethernet
B) 802.11
C) both A and B
D) neither A nor B
Q:
In ________, the authenticator is the ________.
A) 802.1X, wireless access point
B) 802.11i, switch
C) 802.11i, wireless access point
D) 802.1X, central authentication server
Q:
The Wi-Fi Alliance calls 802.1X mode ________ mode.
A) enterprise
B) personal
C) WEP
D) WPA
Q:
If a firm has many access points, it should use ________ mode in 802.11i.
A) PSK
B) 802.1X
C) IPsec
D) PEAP
Q:
Which of the following has a dangerous vulnerability that is causing problems today?
A) PEAP
B) 802.11i
C) WPA
D) WPS
Q:
Part of WPS weakness is caused by ________.
A) 802.1X mode
B) WPA2 preshared key mode
C) dividing the 8 digit PIN into two 4 digit halves
D) IPsec