Accounting
Anthropology
Archaeology
Art History
Banking
Biology & Life Science
Business
Business Communication
Business Development
Business Ethics
Business Law
Chemistry
Communication
Computer Science
Counseling
Criminal Law
Curriculum & Instruction
Design
Earth Science
Economic
Education
Engineering
Finance
History & Theory
Humanities
Human Resource
International Business
Investments & Securities
Journalism
Law
Management
Marketing
Medicine
Medicine & Health Science
Nursing
Philosophy
Physic
Psychology
Real Estate
Science
Social Science
Sociology
Special Education
Speech
Visual Arts
Media Study
Q:
________ tell the attacker that a certain IP address has a live host or router.
A) ICMP Echo replies
B) ICMP error messages
C) Both A and B
D) Neither A nor B
Q:
ICMP ________.
A) is used in ping transmissions
B) is used for error messages
C) Both A and B
D) Neither A nor B
Q:
Ping sends ________ messages and receives replies in the same protocol.
A) DNS
B) DHCP
C) ICMP
D) All of the above.
Q:
TCP/IP's internet layer supervisory protocol is ________.
A) DNS
B) DHCP
C) ICMP
D) All of the above.
Q:
UDP is a good protocol for applications that need reliability.
Q:
________ places a relatively small traffic load on networks.
A) TCP
B) UDP
C) Both A and B
D) Neither A nor B
Q:
TCP electronic signatures ________.
A) do not exist
B) have automatic key exchange
C) Both A and B
D) Neither A nor B
Q:
TCP has a comprehensive security protocol comparable to IPsec for IP.
Q:
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The receiving host is a(n) ________.
A) client
B) TCP server
C) webserver
D) e-mail server
Q:
A Windows host sends a TCP segment with source port number 1200 and destination port number 25. The sending host is a(n) ________.
A) client
B) TCP server
C) webserver
D) e-mail server
Q:
________ uses options frequently.
A) IP
B) TCP
C) Both A and B
D) Neither A nor B
Q:
The TCP ________ field is designed to control the other party's transmission rate.
A) segment
B) flow
C) window
D) maximum
Q:
TCP segment carries octets 4321 through 4371. What will be the acknowledgement number in the TCP segment that acknowledges this segment?
A) 4321
B) 4371
C) 4372
D) None of the above.
Q:
To do TCP session hijacking, the attacker has to be able to predict the sequence number of the TCP segment currently being sent.
Q:
TCP segment carries octets 4321 through 4371. The next segment carries no data. What is that segment's sequence number?
A) 4321
B) 4371
C) 4372
D) None of the above.
Q:
TCP segment carries octets 4321 through 4371. What is its sequence number?
A) 4321
B) 4371
C) 4372
D) None of the above.
Q:
A flag field has the value 1.
A) The TCP segment is an acknowledgement.
B) The field is set.
C) The field is locked.
D) The router will reduce the value to 0 and drop the packet.
Q:
A one-bit field is called a ________ field.
A) binary
B) singlet
C) TCP
D) flag
Q:
The attacker sends a mal-formed TCP segment. The victim host sends back a TCP RST message. This exchange verifies that the victim host exists and has a certain IP address.
Q:
In a TCP half-open DoS attack, ________.
A) the attacker sends the final ACK of a session opening
B) the attacker sends an RST segment
C) Both A and B
D) Neither A nor B
Q:
In TCP, if a receiver receives a damaged TCP segment, it ________.
A) sends a negative acknowledgement
B) sends the segment back to the original sender
C) does nothing
D) None of the above.
Q:
An abrupt TCP close takes ________ segments.
A) 2
B) 3
C) 4
D) None of the above.
Q:
A normal TCP close takes ________ segments.
A) 2
B) 3
C) 4
D) None of the above.
Q:
A TCP session opening ends with a(n) ________ message.
A) SYN
B) FIN
C) ACK
D) URG
Q:
TCP messages are called ________.
A) packets
B) frames
C) datagrams
D) segments
Q:
Which of the following is true?
A) TCP works at the transport layer.
B) UDP works at the transport layer.
C) Both A and B
D) Neither A nor B
Q:
IPsec works with ________.
A) IPv4
B) IPv6
C) Both A and B
D) Neither A nor B
Q:
IPsec a general protection strategy for all internet, transport, and application protocols.
Q:
The main advantage of IPv6 compared to IPv4 is ________.
A) support for more IP addresses
B) faster transmission
C) higher security
D) None of the above.
Q:
A mask is needed to identify the size of the network part or of the combined network and subnet parts.
Q:
The subnet mask is one of the three parts of an IP address.
Q:
IP addresses are 32 octets long.
Q:
IP options are used frequently.
Q:
The IP header checksum field is used for error detection.
Q:
In an IPv4 packet, the ________ field describes the contents of the packet's data field.
A) TTL
B) header checksum
C) protocol
D) next-higher-layer
Q:
If a router receives a packet with a TTL value of 1, what will it do?
A) Increase the TTL value to 2.
B) Keep the TTL value at 1.
C) Drop the packet.
D) None of the above.
Q:
The ________ field in a packet ensures that misaddressed packets will not circulate endlessly.
A) header checksum
B) TTL
C) Both A and B
D) Neither A nor B
Q:
What is the general function of the second row in the IPv4 header?
A) To give the source address
B) To give the destination address
C) To handle fragmentation and reassembly
D) None of the above.
Q:
The ________ standard is designed to prevent impostors from sending false supervisory messages to switches.
A) 802.1X
B) 802.1AE
C) Both A and B
D) Neither A nor B
Q:
Spread spectrum transmission in wireless LANs provides security.
Q:
In ________, signals can be read without tapping the cord.
A) UTP
B) optical fiber
C) Both A and B
D) Neither A nor B
Q:
Spread spectrum transmission is used in wireless LANs ________.
A) to increase transmission speed
B) for security
C) Both A and B
D) Neither A nor B
Q:
A ________ is the path that a frame takes across a single switched network.
A) physical link
B) data link
C) route
D) connection
Q:
A computer connects to the nearest switch via a ________.
A) physical link
B) data link
C) Both A and B
D) Neither A nor B
Q:
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches.
Q:
Physical and data link layer standards govern transmission in ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Q:
The ________ layer in the hybrid TCP/IP-OSI architecture comes from OSI.
A) physical
B) transport
C) Both A and B
D) Neither A nor B
Q:
Most firms actually use the ________ architecture.
A) TCP/IP
B) OSI
C) IETF
D) None of the above.
Q:
The ________ layer is roughly the same in OSI and TCP/IP.
A) transport
B) session
C) Both A and B
D) Neither A nor B
Q:
How many layers does the OSI architecture have?
A) 3
B) 5
C) 7
D) None of the above.
Q:
________ is a standards architecture.
A) ISO
B) OSI
C) Both A and B
D) Neither A nor B
Q:
Which of the following is an OSI standards agency?
A) ISO
B) ITU-T
C) Both A and B
D) Neither A nor B
Q:
In the IETF, a proposed standard is called a Request for Comments.
Q:
The name of the Internet standards architecture is ________.
A) OSI
B) ISO
C) TCP/IP
D) All of the above.
Q:
Which organization creates Internet standards?
A) DARPA
B) IETF
C) ISO
D) TCP
Q:
At what core layer do you find WAN standards?
A) Single-network
B) Internet
C) Application
D) None of the above.
Q:
Single-network core standards are for message delivery through ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Q:
Security problems with protocols include ________.
A) a lack of security in earlier versions
B) awkwardly added security
C) Both A and B
D) Neither A nor B
Q:
If two hosts are separated by five networks, how many frames will there be along the way when a host transmits a packet to another host?
A) 1
B) 2
C) 5
D) 10
Q:
If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host?
A) 1
B) 2
C) 7
D) 14
Q:
Packets are carried inside frames.
Q:
Frames are messages traveling through ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Q:
In internets, different networks are connected by ________.
A) switches
B) routers
C) Both A and B
D) Neither A nor B
Q:
The organization that funded the creation of the Internet is ________.
A) the IETF
B) ISO
C) DARPA
D) the National Science Foundation
Q:
Companies use carriers for WAN transmission because ________.
A) companies lack rights of way
B) carriers have extremely strong security
C) Both A and B
D) Neither A nor B
Q:
Attackers can read signals traveling over UTP without tapping the cord.
Q:
User computers connect to ________ switches.
A) core
B) primary
C) workgroup
D) terminal
Q:
A network that runs on the customer premises is a ________.
A) LAN
B) WAN
C) Both A and B
D) Neither A nor B
Q:
Intercepting wireless LAN transmissions is difficult.
Q:
A residential access router usually contains ________.
A) a DHCP server
B) an Ethernet switch
C) Both A and B
D) Neither A nor B
Q:
In this book, when internet is spelled with a capital I, it means the global Internet.
Q:
When your mobile phone is on a network, it is a host.
Q:
When your home PC is on a network, it is a host.
Q:
A device attached to a network is called a ________.
A) client
B) server
C) host
D) Neither A nor B
Q:
The terms octet and byte mean the same thing.
Q:
Instead of "loyal," when a speaker adds "I mean, he never criticizes friends behind their backs," he or she is using slang
Incorrect
jargon
Incorrect
descriptive details
Correct
idiomatic expression
Incorrect
.
a. slang
b. jargon
c. descriptive details
d. idiomatic expression
Q:
Idiomatic language
Incorrect
Inclusive language
Correct
Pragmatic language
Incorrect
Specific language
Incorrect
aids in improving linguistic sensitivity.
a. Idiomatic language
b. Inclusive language
c. Pragmatic language
d. Specific language
Q:
What is a language? Discuss the various components of a language, and explain the reasons behind distinctions of communities based on language.
Q:
In which of the following situations will the usage of slang or jargon improve semantics?
a. When the occasion demands familiar language
b. When the audience primarily comprises teenagers
c. When the meaning of the slang or jargon is already defined
d. When a conversation deals with any topic of human interest
Q:
Explain the characteristics of language.