All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Ask a Question
Search
Search
Sign In
Register
study help
computer science
business data networks
Questions and Answers of
Business Data Networks
a. If you need to transmit 600 million bits per second 90 meters, what signaling standard and UTP quality standard would you use?7a1.) UTP categories rate the ______ of UTP cabling.a. Qualityb.
Add to your design in the previous question. Add another client next to the first client. Both connect to the same switch. This second client will also communicate with the server and will also need
a. How many wires are there in Ethernet cable?6a1.) What type of copper wiring is widely used in Ethernet?a. Optical fiberb. 4-pair UTPc. Both A and Bd. Neither A nor B6a2.) How many wires are there
Design an Ethernet network to connect a single client PC to a single server. Both the client and the server will connect to their work group switches via UTP. The two devices are 900 meters apart.
a. Distinguish between binary and digital signaling.5a1.) In digital signaling there is(are) _______ state(s).a. Oneb. Twoc. A small number ofd. An infinite number of5a2.) In binary signaling
Can you think of a way to allow a client on one virtual LAN to communicate with a server on another VLAN? Switches typically have no way of doing it. It involves an access control list or some other
a. What four things do physical layer standards govern?4a.) Physical layer standards govern ________.a. Signalingb. Physical connectorsc. Both A and Bd. Neither A nor B4b.) Physical layer standards
In ARP cache poisoning, the attacker poisons the victim’s ARP cache. This allows the attacker to read frames that the victim sends to the router. How can it read the frames that the victim receives
a. _______ switches connect users to the network.3a.) What type of switch connects users to the network?a. User switchesb. Core switchesc. Access switchesd. Work group switchesb. _______ switches
What Work Group of the 802 LAN/MAN Standards Committee developed the 802.1X and 802.1A E standards? This working group, by the way, creates security and management standards for use in all other
a. At what layers are Ethernet standards defined?2a1.) Ethernet standards are specified at the ______ layer.a. Physicalb. Internetc. Both A and Bd. Neither A nor B2a2.) Ethernet standards are
a. If both UTP and optical fiber can be used for a particular physical link, which should I choose? Why?b. If both OM3 fiber and OM4 fiber can be used for a particular physical link, which should I
a. What is a local area network (LAN)?1a.) A local area network operates .a. On a customer premisesb. Between customer premisesc. Both A and Bd. Neither A nor B
a. Distinguish between what firewalls look at and what antivirus programs look at.29a.) ______ look at ______, and ______ mostly look at ______.a. Antivirus programs, packets, firewalls, packetsb.
a .Do IDSs stop packets?28a.) If a packet is highly suspicious but not a provable attack packet, a(n) ______ may drop it.a. SPI firewallb. IDSc. NGFWd. None of the aboveb. Why are they painful to
a. Why are SPI firewalls limited in their ability to detect attack packets?27a.) SPI firewalls are being replaced in large part because they are limited in their ability to detect _______.a. NATb.
a. In Figure 4-18, explain why Rule 1 brings more security than Rule 2.26a.) In SPI firewalls, ACLs are used for packets in the _______ state.a. Connection-openingb. Ongoing communicationc. Both A
a. Why are stateful packet inspection (SPI) firewalls attractive?25a.) Stateful packet inspection firewalls are attractive because of their _________.a. Low cost for a given traffic volumeb. Ability
a. What does a firewall do when an arriving packet is definitely an attack packet?24a.) When a firewall identifies an attack packet, it ________.a. Discards the packetb. Copies information about the
a. What characteristic of the true party is used in access card authentication, iris authentication, and digital certificate authentication?b. Which form of authentication that we looked at depends
a. In digital certificate authentication, what does the supplicant do?22a.) In digital certificate authentication, the supplicant encrypts the challenge message with ______.a. The supplicant's
a. How do you authenticate yourself with an access card?b. What is biometrics?21b.) Using bodily measurements for authentication is ______.a. Illegalb. Biometricsc. Mandatory for good securityd. All
a. What was the traditional recommendation for passwords?20a.) Traditionally, we have told users that passwords ________.a. Should have a mix of characters (uppercase and lowercase letters, digits,
a. What is authentication?19a.) Requiring someone prove his or her identity is _______.a. Confidentialityb. Authenticationc. Authorizationd. Both B and Cb. Distinguish between the supplicant and the
a. Distinguish between private networks and virtual private networks.18a.) The messages of VPNs ________.a. Share the same transmission lines used by other VPNsb. Are encryptedc. Both A and Bd.
a. What two protections do electronic signatures provide?17a1.) Electronic signatures provide message-by-message __________.a. Authenticationb. Confidentialityc. Both A and Bd. Neither A nor B17a2.)
a. What protection does confidentiality provide?16a.) Using encryption, you make it impossible for attackers to read your messages even if they intercept them. This is _______.a. Authenticationb.
a. What are cyber terror and cyber war attacks?15a.) Cyber war attacks are made by ______.a. major cyber criminal gangsb. national governmentsc. Both A and Bd. Neither A nor Bb. Why are cyber war
What three types of attacks may come from your firm’s business competitors?
a. Why may employees attack?13a.) Employees often attack _______.a. For revengeb. For moneyc. Both A and Bd. Neither A nor Bb. For what four reasons are employees especially dangerous?13b.) For what
a. What type of adversary are most hackers today?12a.) What type of attacker are most attackers today?a. Disgruntled employees and ex-employeesb. Career criminalsc. Hackers motivated by a sense of
a. Explain “advanced” in the term advanced persistent threat.11a.) Advanced persistent threats are ________.a. Inexpensive for the attackerb. Extremely dangerous for the victimc. Both A and Bd.
a. What is the purpose of a denial-of-service attack?10a.) DoS attacks attempt to ________.a. Hack a computerb. Reduce the availability of a computerc. Steal information from a computerd. Delete
a. What is the definition of hacking?9a1.) Hacking is defined as using a computer resource without authorization or in excess of authorization.a. Trueb. False9a2.) Which of the following meets the
Keys and passwords must be long. Yet most personal identification numbers (PINs) that you type when you use a debit card are only four or six characters long. Yet this is safe. Why?
a. What are payloads?8a.) Pieces of code that are executed after the virus or worm has spread are called _______.a. Vulnerabilitiesb. Exploitsc. Compromisesd. Payloadsa. What is ransomware?8b.) In a
When a sales clerk accepts a credit card payment, he or she should type the last four digits of the credit card into the terminal in order for the terminal to verify that the last four digits on the
a. How do viruses and worms differ?7a1.) _____ are full programs.a. Virusesb. Wormsc. Both A and Bd. Neither A nor B7a2.) Which of the following attach themselves to other programs?a. Virusesb.
a. If someone in your firm gives you his or her password and you log into that person’s account, is this hacking? Justify your answer in terms of the definition of hacking.b. If you think someone
a. What kind of attack may succeed against a system with no technological vulnerabilities?6a.) What kind of attack is most likely to succeed against a system with no technological vulnerabilities?a.
What are the implications for digital certificate authentication if the true party’s private key is stolen?
a. What is a vulnerability?5a1.) The general name for a security flaw in a program is a _________.a. Virusb. Malwarec. Security faultd. Vulnerability5a2.) A _________ is a flaw in a program
In digital certificate authentication, the supplicant could impersonate the true party by doing the calculation with the true party’s private key. What prevents impostors from doing this?
a. What is malware?4a.) The general name for evil software is ________.a. Virusb. Wormc. Malwared. All of the aboveb. What are the most frequent types of attacks on companies?4b.) The most frequent
Is the supplicant the true party or an impostor?
a. How does security thinking differ from network thinking?3a.) In __________ thinking, the opponent is primarily an intelligent attacker.a. networkingb. securityc. Both A and Bd. Neither A nor B
What is the promise of newer authentication systems?
a. How was Target damaged by the breach?2a.) Which of the following probably suffered the MOST financial damage from the Target breach?a. Targetb. banksc. consumersd. retailersb. Were banks and
a. What form of authentication would you recommend for relatively unimportant resources? Justify your answer.b. What form of authentication would you recommend for your most sensitive resources?
a. How did the attackers gain access to Target’s network?1) The Target attackers probably first broke into Target using the credentials of a(n) _______.a. Low-level Target employeeb. Target IT
What are your choices if you are hit by ransomware? Which would you recommend?
a. What are the benefits of Software-Defined Networking?15a1.) SDN holds the promise of bringing ______.a. Lower costsb. Lower agilityc. Both A and Bd. Neither A nor B15a2.) SDN can ______.a. Permit
a. Why is the automation of network management tasks important?b. Why are standard configurations desirable?14b.) Using standard configurations ______.a. Saves moneyb. Gives management agilityc. Both
a. List the main elements in SNMP.13a.) Which of the following is NOT governed by the SNMP standard?a. Agentsb. The MIBc. The network management programd. The network visibility programb. Does the
a. If you Ping a host and it does not respond, what can you conclude?12a.) To determine if a host is reachable, you would send a(n) ______.a. SNMP SET commandb. MIBc. Trapd. Pingb. What two things
a. What do network visibility tools allow a manager to do?11a.) SNMP agents communicate with the _________.a. Network visibility programb. Network management programc. MIBd. All of the aboveb. Do
a. Distinguish between chronic lack of capacity and momentary traffic peaks.10a.) _______ can be addressed by using prioritya. Chronic lacks of capacityb. Momentary traffic peaksc. Both A and Bd.
a. What leased line do you need if you have a capacity requirement for 2 Gbps?b. For 500 Mbps?c. For the situation in Figure 3-9, what leased line would the link require?d. Repeat for Figure 3-12. Do
a. If the backup line in Figure 3-14 were to connect Seattle and Dublin instead of Honolulu and Ogden, list the path that traffic would take between Honolulu and Dublin if the line between Seattle
a. Complete the traffic table in Figure 3-13.b. In Figure 3-12, add 392 Mbps of traffic for Seattle-Ogden communication. Using a picture like the one in the figure, show your work.c. Do it again
a. What are service level agreements?6a.) Guarantees for quality of service are called ________.a. QoSb. QoS metricsc. SLAsd. QoS guaranteesb. Does an SLA measure the best case or the worst case?6b.)
a. What is availability?5a1.) ________ is the percentage of time that a network is available to users.a. Availabilityb. Downtimec. QoSd. None of the above5a2.) Which of the following usually has
a. Why must the forwarding function remain on the network device? (This will require you to speculate.)b. What might be holding back SDN in many firms? (This will also require you to speculate.)
a. Distinguish between dedicated and multiplexed transmission links.4a.) Trunk lines in the Internet core are ____________.a. Dedicatedb. Multiplexedc. Both A and Bd. Neither A nor Bb. If 100
Figure 3-28 has data from a Traceroute analysis. a. Add a third column showing the change in latency between the router in that row and the router in the preceding row. (Check figure: The change
a. Distinguish between rated speed and throughput.3a.) Throughput is ________.a. The speed a network actually provides to usersb. A network's rated speedc. Both A and Bd. Neither A nor Bb.
Figure 3-27 shows four sites communicating. Each site needs to communicate with each other site at 2 Mbps, except for Paris. Paris needs to communicate with each other site at 5 Gbps. Create a
a. Is transmission speed usually measured in bits per second or bytes per second?2a.) Transmission speed is normally measured in ______.a. Bits per secondb. Bytes per secondc. Octets per secondd.
Redo the analysis in Figure 3-12. Remove the link between Ogden and Seattle but add a link between Seattle and Dublin. On each link, what traffic capacity will be needed, and what leased line would
a. What are QoS metrics? (Do not just spell out the acronym.)1a.) In QoS, the S stands for ______.a. Softwareb. Securityc. Serviced. Satisfactionb. Why are QoS metrics important?1b.) QoS is
Your home is connected to the Internet. You get to create SL As that the ISP must follow. Being reasonable, write SLAs you would like to have for the following things: a) Write an SLA for
a. What protocols that we saw in this chapter are reliable?26a.) Which of the following protocols is reliable?a. IPb. TCPc. Both A and Bd. Neither A nor Bb. Why aren’t all protocols reliable?26b.)
a. In TCP, port number fields are 16 bits long. How many possible port numbers are there?25a.) In TCP, port number fields are 16 bits long. How many possible port numbers are there?a. 16b. 1,024c.
a. How many alternatives can you represent with a 4-bit field? 24a.) A 5-bit field can represent ______ alternatives or different combinations.a. 8b. 16c. 32d. 64b. For each bit you add to an
a. What is an integer?23a.) Which of the following is an integer?a. 4,307b. 45.7c. Both A and Bd. Neither A nor Bb. Is 4,307 an integer?23b.) Which of the following is an integer?a. 5,280b. 98.6c.
a. What is alphanumeric information?b. Explain how many bytes it will take to transmit “Go team” without the quotation marks. 22b.) How many bytes will it take to transmit "Brain Dead"
a. What is encoding?21a.) Converting application messages into bits is called ________.a. Encapsulationb. Encryptionc. Encodingd. Exchangeb. At what layer is the encoding of application messages
a. How is the syntax of Ethernet Ⅱ frames depicted?20a1.) "Octet" is the same as _______.a. "bit"b. "byte"c. Either A or B, depending on the contextd. Neither A nor B20a2.) Ethernet syntax is
a. What is the syntax of a socket?19a1.) The source socket is 60.171.18.22:2707. The source is a(n) ______.a. Clientb. Serverc. Well-known serverd. Ephemeral server19a2.) The destination socket is
a. What type of port numbers do servers use for common server programs?18a.) On a server, well-known port numbers indicate _______.a. Applicationsb. Connections with client computersc. Both A and Bd.
a. What are the four fields in a UDP header?17a.) The UDP header has ______ fields.a. 4b. 8c. 16d. 32b. Describe the third.c. Describe the fourth.d. UDP does error detection and discarding but does
a. What are 1-bit fields called?16a.) T C P has single-bit fields in its headers; these single-bit fields are called ________ fields.a. Portb. Flagc. ACKd. Binaryb. If someone says that a flag field
a. List the first bit number on each IPv4 header row in 2-12, not including options. (Remember that the first bit in Row 1 is Bit 0.)15a.) In IP, the first bit in the second row is ________.a. 0b.
a. What are the three general parts of messages?14a.) Which of the following is NOT one of the three general parts of messages?a. Address fieldb. Headerc. Data fieldd. Trailerb. What higher-layer
a. What are the four steps in the four-way close?13a.) In a four-step close, which side transmits a FIN segment?a. The side that initiates the closeb. The other sidec. Both A and Bd. Neither A nor
a. What kind of message does the destination host send if it receives an error-free segment?12a.) If a destination host receives a correct segment, it will transmit ________.a. An ACK segmentb. A NAC
a. Is TCP connection-oriented or connection less?11a.) TCP is a connection-oriented protocol.a. Trueb. Falseb. What benefits do sequence numbers bring?c. How many segments are transmitted to open a
a. What do we call TCP messages?10a.) TCP messages are called ______.a. Framesb. Packetsc. Segmentsd. Fragmentsb. Describe the three-step opening in TCP.10b.) Host P transmits a SYN segment to Host
a. In HTTP, which application program initiates an interaction?9a.) In an HTTP, which one (browser or Webserver application program) transmits message first?a. Browserb. Webserver application
a. If two hosts are connected by five networks, how many packets will there be when one host sends a packet to the other host?8a.) If two hosts are connected by five networks, how many packets will
a. The port number fields in TCP and UDP are 16 bits long. How many port numbers can they represent?b. In IP, the Time to Live Field is 8 bits in size. How many values can it represent?c. How many
a. At what layer will you find standards for routers?7a.) At what layer will you find standards for routers?a. Transportb. Internetc. Both A and Bd. Neither A nor Bb. Wireless access points?7b.) At
Do the following without using a calculator or a computer, but check your answers with a calculator or a computer. You need to represent 1,026 different city names. How many bits will this take if
a. What layer or layers govern(s) transmission media?6a.) Which layer governs wires?b. Application programs?6b1.) Which standards layer governs e-mail?6b2.) Which standards layer governs the World
Do the following without using a calculator or computer, but check your answers with a calculator or a computer. a. Convert 6 to binary.b. Convert 47 to binary.c. Convert 100 to binary.d.
a. What are the standards agencies for OSI? Just give the abbreviations5a.) A standards agency for OSI is ____________.a. ITU-Tb. IETFc. Both A and Bd. Neither A nor Bb. Distinguish between ISO and
a. In Figure 2-16, what will be the value in the destination port number field if a packet arrives for the e-mail application? (Yes, this is a repeat question.)b. When the HTTP program on a webserver
a. Why do standards architectures have multiple layers?b. To what does a standards layer provide services?4b.) Standards layers provide services directly to ______.a. The next-higher layerb. The
Compute the minimum number of TCP segments required to open a connection, send an HTTP request and response message, and close the connection if the HTTP response message must be fragmented across
a. What standards agency creates Internet standards?3a.) Which standards agency(ies) create(s) Internet standards?a. OSIb. TCP/ IPc. ISO and ITU-Td. IETFb. What other two standards agencies work
Showing 200 - 300
of 337
1
2
3
4