Module 3 Flashcards

1
Q

Standard category in which standards are supported by a number of vendors, but do not have any official standing

A

De facto

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the 4 basic functions of application?

A
  1. Data storage
  2. Data access
  3. Application logic
  4. Presentation logic
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are true about a router?

A. A router transfers packets from one network to another network

B. A Router translates DNS names to IP addresses

C. A Router works at the internet layer of the 5 layer hybrid OSI/TCP/IP model

D. A router is necessary to switch frames within a network

E. A router transmits frames between networks

A

A. A router transfers packets from one network to another network

C. A Router works at the internet layer of the 5 layer hybrid OSI/TCP/IP model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Organization that is responsible for establishing standards that govern how the Internet operates

A

Internet Engineering Task Force (IETF)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the dominant technology used in desktop area networks?

A. Bluetooth

B. Ethernet

C. infra red

D. RFID

E. DSL

A

A. Bluetooth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following are components of a network?

A. Hard drives

B. Protocols

C. Network standards

D. Communications devices

E. Messages

F. Applications

A

B. Protocols

D. Communications devices

E. Messages

F. Applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which protocol is used for network management?

A. HTTP

B. TCP

C. SNMP

D. IP

E. SMTP

A

C. SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What technology is primarily used to prevent penetration attacks?

A

Firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of these statements describe a Denial of Service (DoS) attack?

A. Unsuspecting computer users can be part of a DoS attack if their computer has been infected with a malicious bot program

B. Strong authentication techniques using cryptography is the best defense against a DoS attack

C. The attacker sends an initial single break-in packet

D. Users of the network usually don’t experience an impact by this type of attack unless they receive a bogus packet

E. One or more machines send bogus packets to try to overload the network so valid packets can’t be processed

A

A. Unsuspecting computer users can be part of a DoS attack if their computer has been infected with a malicious bot program

C. The attacker sends an initial single break-in packet

E. One or more machines send bogus packets to try to overload the network so valid packets can’t be processed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following are objectives of securing a network?

A. Confidentiality

B. Availability

C. Integrity

D. Proper ordering of messages

E. Elimination of redundancy by compressing data

A

A. Confidentiality

B. Availability

C. Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Multitier architectures are characterized by which of the following?

A. were popular in the 60s and 70s to run timesharing

B. distribute processing functions over 2 or more computers

C. run client/server applications

D. put data storage logic on one computer and all other logic on another

E. are ones where each machine is both a client and a server

A

C. run client/server applications

B. distribute processing functions over 2 or more computers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are characteristics of a host-based architecture?

A. time-sharing

B. dumb terminals

C. personal computers

D. heavy network demand

E. serial communication

A

A. time-sharing

B. dumb terminals

E. serial communication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following were important advancements made in the industry in the 1970s and 1980s that led to a new type of system architecture?

A. the development of VoIP

B. the development of inexpensive networks

C. the development of commercial off-the-shell software (COTS)

D. the development of unbounded media

E. the development of microprocessors

A

B. the development of inexpensive networks

C. the development of commercial off-the-shell software (COTS)

E. the development of microprocessors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following statements are true about host-based architectures?

A. put all the processing on a single computer

B. are ones where each machine is both a client and a server

C. examples today include cloud applications such as Blackboard and Google docs

D. examples today include use of Telnet and sensor-based applications

E. evenly distribute processing on two systems

A

A. put all the processing on a single computer

D. examples today include use of Telnet and sensor-based applications

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following characterize cloud computing?

A. lack of scalability

B. elimination of risk

C. self-service

D. dynamic resource allocation

A

C. self-service

D. dynamic resource allocation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A web browser and the web are an example of what type of system architecture?

A. host-based architecture

B. peer-to-peer architecture

C. client-server architecture

D. client-based architecture

E. multitier architecture

A

C. client-server architecture

17
Q

The highest layer processed by a router

A

Internet

18
Q

What is contained in the header added to the protocol data unit (PDU) by the Internet layer?

A. the payload

B. the sender IP address

C. segmentation information

D. the receiver IP address

E. the destination MAC address

A

B. the sender IP address

D. the receiver IP address

19
Q

Protocols define which of the following aspects of a message?

A. semantics
B. syntax
C. timing
D. routing
E. content

A

A. semantics
B. syntax
C. timing

20
Q

Which of the following is the Internet layer responsible?

A. representing bits (1 and 0) on the media

B. routing packets

C. the end to end communication between the source and final destination entities

D. moving a protocol data unit (PDU) from sender to receiver within a single network

E. providing communication between two networks

A

B. routing packets

E. providing communication between two networks

21
Q

The 5-layer hybrid OSI/TCP/IP (or Internet) model includes which of the following layers?

A. Data link
B. Physical
C. Application
D. Transaction
E. Routing

A

A. Data link
B. Physical
C. Application

22
Q

A protocol data unit (PDU) contains which of the following?

A. MDU
B. payload
C. trailer
D. header
E. digital signature

A

B. payload
C. trailer
D. header

23
Q

What is the transport layer responsible for?

A. routing packets

B. providing communication between two applications

C. moving a PDU from sender to receiver within a single network

D. the end to end communication between the source and final destination entities

E. representing bits (1 and 0) on the media

A

D. the end to end communication between the source and final destination entities

24
Q

Which of the following are true about networking standards?

A. Protocols are formal standards that define how two entities communicate

B. All networking standards are defined by the International Organization of Standardization (ISO) standards body

C. De facto standards go through a three stage process of acceptance by the industry

D. Most networking standards are de facto standards

E. Formal networking standards promote interoperability between computers and networking equipment from different manufacturers

A

A. Protocols are formal standards that define how two entities communicate

E. Formal networking standards promote interoperability between computers and networking equipment from different manufacturers

25
Q

What is the dominant technology used in local area networks?

A. infra red
B. DSL
C. RFID
D. Ethernet
E. Bluetooth

A

D. Ethernet

26
Q

What is true about peer-to-peer networks?

A. Since there isn’t a centralized server, security isn’t an issue on peer-to-peer networks

B. P2P networks can be utilized for file sharing and communication

C. Peer computers share the processing function of an application, but they may not always be available to the network

D. Since there isn’t a centralized server, the network is cheaper to setup and maintain

E. Client computers don’t typically require any special setup to be part of a P2P network

A

B. P2P networks can be utilized for file sharing and communication

D. Since there isn’t a centralized server, the network is cheaper to setup and maintain

27
Q

What distinguishes a desktop area network (DAN) from other types of networks?

A. Bluetooth is often used to connect the personal devices in your life thus creating a DAN

B. You must have a wireless access card and access point to enable a DAN

C. DANs are commonly limited in size to around 30 ft

D. It is preferable to setup DANs with Ethernet cabling to increase speed of the network

E. Most DANs are wireless using the IEEE 802.11 standard

A

A. Bluetooth is often used to connect the personal devices in your life thus creating a DAN

C. DANs are commonly limited in size to around 30 ft

28
Q

What is true about routers and switches?

A. A router transmits packets between networks using IP addresses

B. Decapsulation and encapsulation occur on each switch and router that a PDU encounters during its transmission from the sender to the receiver

C. A switch operates at the data link layer providing connections between devices on a single network

D. A switch can function as a router if a router is not present

E. A router operates at the transport layer to make end-to-end connections across the Internet

A

A. A router transmits packets between networks using IP addresses

C. A switch operates at the data link layer providing connections between devices on a single network

29
Q

Layer responsible for representing bits (0 and 1) on the media

A

Physical layer

30
Q

Which of the following are true about standards organizations?

A. The International Telecommunications Union- Telecommunications Group (ITU-T) focuses only on the public telephone and cell phone networks

B. SQL is an ANSI and ISO standard

C. The ANSI group helps ensure the US national standards comply with ISO recommendations

D. The main wireless networking protocol is defined by the IEEE standards body

E. ISO establishes standards that govern how the Internet will operate

A

B. SQL is an ANSI and ISO standard

C. The ANSI group helps ensure the US national standards comply with ISO recommendations

D. The main wireless networking protocol is defined by the IEEE standards body

31
Q

What network architecture does cloud computing utilize?

A. P2P
B. Multitier
C. Client Server
D. Host-Based

A

B. Multitier