Module 3 Flashcards

1
Q

Which of the following are components of a network?

A) network standards
B) hard drives
C) messages
D) protocols
E) communications devices

A

C) D) E)

As defined in the online lecture the following are components of a network: Applications, Messages, Protocols, Sending (Originating) Devices, Communications channels, Communications Devices, Receiving (Destination) Devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What component(s) are necessary for a WLAN?

A) twisted pair cable
B) access card
C) access point
D) router
E) fiber optic media

A

B) C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following are true about a router?

A) A router is necessary to switch frames within a network.
B) A router transfers packets from one network to another network.
C) A router works at the Internet layer of the 5 layer hybrid OSI/TCP/IP model.
D) A router transmits frames between networks.
E) A router translates DNS names to IP addresses.

A

B) C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the dominant technology used in desktop area networks?

A) RFID
B) infra red
C) Bluetooth
D) DSL
E) Ethernet

A

C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What organization is responsible for establishing standards that govern how the Internet operates?

A) Internet Engineering Task Force (IETF)
B) The American National Standards Institute (ANSI)
C) The International Telecommunications Union – Telecommunications Group (ITU-T)
D) Institute of Electrical and Electronic Engineers (IEEE)
E) The International Organization for Standardization (ISO)

A

A)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The five-layer hybrid OSI/TCP/IP (or Internet) model includes which of the following layers?

A) physical
B) transaction
C) routing
D) application
E) data link

A

A) D) E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A protocol data unit (PDU) contains which of the following?

A) MDU
B) trailer
C) digital signature
D) header
E) payload

A

B) D) E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is the highest layer processed by a router?

A) physical
B) transport
C) data link
D) applications
E) internet

A

E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is the internet layer responsible for?

A) providing communication between two networks
B) the end to end communication between the source and final destination entities
C) representing bits (1 and 0) on the media
D) routing packets
E) moving a protocol data unit (PDU) from sender to receiver within a single network

A

A) D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Message headers contain which of the following?

A) payload
B) message size
C) source and destination address
D) preamble
E) error checking information

A

B) C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following are characteristics of protocols?

A) connection oriented
B) secure
C) compressed
D) connectionless
E) unreliable

A

A) D) E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What technology is primarily used to prevent penetration attacks?

A) encryption
B) hashing
C) cryptographic systems
D) firewall
E) compression

A

D)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of these statements describe a Denial of Service (DoS) attack?

A) Strong authentication techniques using cryptography is the best defense against a DoS attack.

B) Unsuspecting computer users can be part of a DoS attack if their computer has been infected with a malicious bot program.

C) Users of the network usually don’t experience an impact by this type of attack unless they receive a bogus packet.

D) The attacker sends an initial single break-in packet to begin the attack.

E) One or more machines send bogus packets to try to overload the network so valid packets can’t be processed.

A

B) D) E)

Malware can spread an attacker’s bot program so those computers can be remote controlled by the attacker during a DoSattack on a network. A firewall is the best defense against a DoS. One or more machines send bogus packets to try to overload the network so
valid packets can’t be processed. Legitimate users are denied normal service by the network because of the flood of bogus packets. Servers being attacked often crash. The attacker sends an initial single break-in packet to begin the attack.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following are objectives of securing a network?

A) elimination of redundancy by compressing data
B) integrity
C) proper ordering of messages
D) confidentiality
E) availability

A

B) D) E)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A web browser and the web are an example of what type of system architecture?

A) host-based architecture
B) peer-to-peer architecture
C) client-server architecture
D) client-based architecture
E) multitier architecture

A

C)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following statements are true about host-based architectures?

A) put all the processing on a single computer
B) examples today include cloud applications such as Blackboard and Google docs.
C) are ones where each machine is both a client and a server
D) examples today include use of telnet and sensor-based applications
E) evenly distribute processing on two systems

A

A) D)

17
Q

Multitier architectures are characterized by which of the following?

A) are ones where each machine is both a client and a server
B) run client/server applications
C) were popular in the 60s and 70s to run timesharing
D) distribute processing functions over 2 or more computers
E) put data storage logic on one computer and all other logic on another

A

B) D)

18
Q

Which of the following are characteristics of a host-based architecture?

A) time sharing
B) dumb terminals
C) personal computers
D) serial communication
E) heavy network demand

A

A) B) D)

Host-based architectures put all the processing on a single computer and provide a simple text-based interface to a dumb terminal. In this model, time-sharing operating systems allowed many
users to use one machine or processor simultaneously. The state of networking was relatively immature and simple serial communication was the norm.

19
Q

Which of the following were important advancements made in the industry in the 1970s and 1980s that led to a new type of system architecture?

A) the development of inexpensive networks
B) the development of unbounded media
C) the development of commercial off-the-shelf software (COTS)
D) the development of VoIP
E) the development of microprocessors

A

A) C) E)

20
Q

Client-based architectures are characterized by which of the following?

A) run timesharing
B) put data storage logic on one computer and all other logic on another
C) processing is done on the client computer
D) run multitier applications
E) evenly distribute processing on two systems

A

B) C)