100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Business Data Networks and Security, 10e Panko TestBank Complete with a marking scheme

Rating
-
Sold
1
Pages
228
Grade
A+
Uploaded on
17-10-2022
Written in
2022/2023

Business Data Networks and Security, 10e Panko TestBank Complete with a marking scheme Business Data Networks and Security, 10e Panko1 Copyright © 2015 Pearson Education, Inc. Business Data Networks and Security, 10e (Panko) Chapter 1 Welcome to the Cloud 1) Depicting the Internet as a cloud symbolizes that ________. A) the Internet is amorphous B) the Internet is no longer understandable by humans C) the Internet is too complex for anyone to depict D) users do not have to know how the Internet operates and where resources are located Answer: D Diff: 1 Question: 1a Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept 2) A networking device that plays an important role in directing network communication is called a ________. A) client B) server C) host D) router Answer: C Diff: 1 Question: 2a Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept 3) Which of the following is a host when it is on a network? A) a client PC B) a server C) a mobile phone D) all of the above Answer: D Diff: 1 Question: 2b Objective: Describe basic networking devices, including networking hosts, networking devices, the Internet, and Internet service users. Classification: Concept2 Copyright © 2015 Pearson Education, Inc. 4) Application programs on ________ communicate by sending messages between each other. A) the same host B) different hosts C) the same network D) different networks Answer: B Diff: 1 Question: 2d Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept 5) What kind of address do hosts have on the Internet? A) World Wide Web URLs B) MAC addresses C) EUI-48 addresses D) IP addresses Answer: D Diff: 1 Question: 3a Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application 6) 60.49.7.254 is an ________. A) IPv4 address B) IPv6 address C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 3b Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application3 Copyright © 2015 Pearson Education, Inc. 7) The address 60.49.7.254 is represented in ________. A) dotted decimal notation B) EUI-48 notation C) hexadecimal notation D) binary notation Answer: A Diff: 1 Question: 3c Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept 8) Dotted decimal notation is used by ________. A) networks B) computers C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 3d Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept 9) What type of address is 32 bits long? A) IPv4 B) IPv6 C) EUI-48 D) all of the above Answer: A Diff: 1 Question: 3g Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept4 Copyright © 2015 Pearson Education, Inc. 10) What type of address is 100 bits long? A) IPv4 B) IPv6 C) EUI-48 D) none of the above Answer: D Diff: 2 Question: 3h Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application 11) ________ collectively form the core of the Internet service. A) CSPs B) ISO, the IETF, and ITU-T C) ISPs D) Telephone companies Answer: C Diff: 2 Question: 4b Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 12) Who controls the Internet? A) the U.S. government B) the United Nations C) the IETF D) no one Answer: D Diff: 1 Question: 4c Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application5 Copyright © 2015 Pearson Education, Inc. 13) Netflix uses AWS for its ________. A) recommendation system B) content delivery appliances C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 5d Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 14) Content delivery networks mainly ________. A) increase transmission speed B) increase program selection C) decrease program selection D) reduce latency Answer: D Diff: 2 Question: 5e Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 15) A ________ may have multiple ________. A) physical server, virtual machines B) virtual machine, physical servers C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 6a Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 16) Which can be moved more easily? A) a physical server B) a virtual machine C) Both are about equally easy to move. D) Neither can be moved easily. Answer: B Diff: 1 Question: 6b Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application6 Copyright © 2015 Pearson Education, Inc. 17) Netflix uses the most VMs ________. A) on weekends B) on weekdays C) in the evenings D) during the day Answer: C Diff: 1 Question: 6d Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 18) Which type of service manages application software for users? A) IaaS B) SaaS C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 7b Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 19) IaaSs own _________. A) application software B) servers C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 7c Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 20) For Netflix, Google is a(n) ________. A) IaaS B) SaaS C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 7d Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application7 Copyright © 2015 Pearson Education, Inc. 21) For Netflix, ________ is a(n) ________, and ________ is a(n) ________. A) Google, IaaS, AWS, IaaS B) Google, SaaS, AWS, SaaS C) Google, IaaS, AWS, SaaS D) Google, SaaS, AWS, IaaS Answer: D Diff: 2 Question: 7f Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 22) An IaaS provides ________. A) servers B) application programs C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 7g Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 23) When a cloud client customer moves from one machine to another machine, ________. A) the same data files are available B) the same application software personalization is in effect C) both A and B D) neither A nor B Answer: C Diff: 2 Question: 8a Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 24) In SaaS, the user normally ________. A) purchases software B) pays for software by amount of use C) both A and B D) neither A nor B Answer: B Diff: 1 Question: 8c Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Concept8 Copyright © 2015 Pearson Education, Inc. 25) Cloud customers are concerned that ________. A) their data might be hacked B) the government may access their data secretly C) both A and B D) neither A nor B Answer: C Diff: 2 Question: 9 Objective: Explain how the Internet works, how Netflix uses Amazon Web Services IaaS (Infrastructure as a Service) with virtual machines, and a Google SaaS (Software as a Service). Classification: Application 26) Guarantees by a provider to meet certain delivery quality specifications are called ________. A) speed quality guarantees B) service level agreements C) service warranties D) contracts Answer: B Diff: 1 Question: 11a Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept 27) Network speeds usually are measured in ________. A) bits per second B) bytes per second C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 11c Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Concept9 Copyright © 2015 Pearson Education, Inc. 28) 320,000 kbps is ________. A) 320 bps B) 320 Mbps C) 320 Gbps D) none of the above Answer: B Diff: 2 Question: 11d Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application 29) 20,000 bits per second is ________. A) 20 Kbps B) 20 Mbps C) 20 Gbps D) none of the above Answer: A Diff: 1 Question: 11e Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application 30) 200,000M bits per second is ________. A) 200 Kbps B) 200 Mbps C) 200 Gbps D) none of the above Answer: C Diff: 1 Question: 11e Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application10 Copyright © 2015 Pearson Education, Inc. 31) 7,000 bps can also be written as ________. A) 7 Kbps B) 7 Mbps C) 7 Gbps D) none of the above Answer: A Diff: 1 Question: 12a Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application 32) 0.02 Gbps can also be written as ________. A) 2 Mbps B) 20 Mbps C) 200 Mbps D) none of the above Answer: B Diff: 2 Question: 12d Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application 33) Writing 37,400 Mbps properly in metric notation would be________. A) It is written properly. B) 37.4 kbps C) 37.4 Mbps D) 37.4 Gbps Answer: D Diff: 1 Question: 13b Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application11 Copyright © 2015 Pearson Education, Inc. 34) Writing 37kbps properly in metric notation would be ________. A) 37 bps B) 3700 bps C) 37,000 bps D) 37,000 Mbps Answer: C Diff: 1 Question: 13d Objective: Describe basic networking, including why networks are drawn as clouds, hosts, addresses, the Internet, Internet service providers, transmission speed, and service level agreements. Classification: Application 35) Dividing an application message into a series of smaller message segments is called ________. A) fragmentation B) packetization C) serialization D) multiplexing Answer: A Diff: 1 Question: 14a Objective: Describe messages, fragmentation, multiplexing, and frames versus packets. Classification: Concept 36) If a transmission link has a relatively high error rate, ________. A) fragmentation is likely to reduce delivery time for the entire application message B) fragmentation is likely to increase delivery time for the entire application message C) either A or B D) neither A nor B Answer: A Diff: 2 Question: 14c Objective: Describe messages, fragmentation, multiplexing, and frames versus packets. Classification: Application 37) When messages of different users share a transmission line, this is ________. A) fragmentation B) packetization C) multiplexing D) parallel transmission Answer: C Diff: 1 Question: 14d Objective: Describe messages, fragmentation, multiplexing, and frames versus packets. Classification: Concept12 Copyright © 2015 Pearson Education, Inc. 38) Multiplexing ________. A) reduces cost B) increases transmission speed C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 14e Objective: Describe messages, fragmentation, multiplexing, and frames versus packets. Classification: Application 39) The most widely used single network address is the ________. A) EUI-48 address B) MAC address C) IP address D) PPP address Answer: A Diff: 1 Question: 16a Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Concept 40) All single network addresses are ________ addresses. A) EUI-48 B) IP C) both A and B D) neither A nor B Answer: D Diff: 1 Question: 16d Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 41) Data link layer standards govern ________. A) connectors B) frame organization C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 17c Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application13 Copyright © 2015 Pearson Education, Inc. 42) Data link layer standards govern ________. A) switch operation B) frame organization C) both A and B D) neither A nor B Answer: C Diff: 2 Question: 17c Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 43) At what layer do you find EUI-48 addresses? A) physical B) data link C) Internet D) two or more of the above Answer: B Diff: 1 Question: 17d Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 44) At what layer are frames standardized? A) physical B) data link C) Internet D) all of the above Answer: B Diff: 1 Question: 17e Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application14 Copyright © 2015 Pearson Education, Inc. 45) The second-lowest standards layer is the ________ layer. (Read the question and answers carefully.) A) physical B) data link C) Internet D) none of the above Answer: D Diff: 2 Question: 18c Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 46) At what layer(s) do you find single network standards? A) Layer 1 B) Layer 2 C) both A and B D) neither A nor B Answer: C Diff: 1 Question: 18d Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 47) PPP is standardized at the ________ layer. A) physical B) data link C) Internet D) transport Answer: B Diff: 2 Question: 18e Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application15 Copyright © 2015 Pearson Education, Inc. 48) 802.11 data link layer standards govern ________. A) frame organization B) access point operation C) both A and B D) neither A nor B Answer: C Diff: 3 Question: 19b Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 49) In a single network transmission, there is always ________. A) a single frame B) a single data link C) both A and B D) neither A nor B Answer: C Diff: 1 Question: 19c Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 50) Switches make decisions based on the ________. A) physical link address B) source data link layer address C) destination data link layer address D) phase of the moon Answer: C Diff: 2 Question: 20c Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 51) An individual switch knows the frame's entire ________. A) session B) data link C) route D) none of the above Answer: D Diff: 2 Question: 20d Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application16 Copyright © 2015 Pearson Education, Inc. 52) In switched networks, to what device is a frame addressed? A) the destination host B) switches C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 20e Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 53) In hybrid Ethernet—802.11 networks, wireless clients use the Ethernet network to gain access to ________. A) internal servers B) their access point C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 21b Objective: Describe how single point-to-point, wireless, switched, and hybrid wireless-switched networks operate-especially how switches forward incoming frames. Classification: Application 54) What device connects different networks into an Internet? A) router B) workgroup switch C) Network Access Point D) core switch Answer: A Diff: 1 Question: 23a Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application17 Copyright © 2015 Pearson Education, Inc. 55) In Internets, different networks are connected by ________. A) switches B) routers C) PCs D) hot spots Answer: B Diff: 1 Question: 23a Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 56) Single network addresses in different single networks are ________. A) unique B) unique if the two single networks use the same technology standard C) both A and B D) neither A nor B Answer: D Diff: 2 Question: 24 Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Concept 57) ________ are carried inside ________. A) Packets, frames B) Frames, packets C) Frames, application message segments D) Packets, application message segments Answer: A Diff: 2 Question: 25b Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application18 Copyright © 2015 Pearson Education, Inc. 58) When an application program transmits a message, what will the first field be in the message that is sent over the transmission link? A) application header B) packet header C) transport header D) frame header Answer: D Diff: 3 Question: 25d Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 59) When an application program transmits a message, what will the SECOND field be in the message that is sent over the transmission link? A) application header B) packet header C) transport header D) frame header Answer: B Diff: 3 Question: 25d Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 60) The path that a packet takes across an internet is a ________. A) physical link B) data link C) route D) all of the above Answer: C Diff: 1 Question: 26a Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Concept19 Copyright © 2015 Pearson Education, Inc. 61) The path that a frame takes across a single network is a ________. A) physical link B) data link C) route D) all of the above Answer: B Diff: 1 Question: 26b Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Concept 62) When a packet travels through an internet, there are usually ________. A) more data links than routes B) exactly the same number of data links and routes C) approximately the same number of data links and routes D) more routes than data links Answer: A Diff: 2 Question: 26c Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 63) If two hosts are separated by seven networks, how many packets will there be along the way when a host transmits a packet to another host? A) 1 B) 2 C) 7 D) 14 Answer: A Diff: 2 Question: 26e Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application20 Copyright © 2015 Pearson Education, Inc. 64) If two hosts are separated by seven networks, how many frames will there be along the way when a host transmits a packet to another host? A) 1 B) 2 C) 7 D) 14 Answer: C Diff: 2 Question: 26f Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 65) The source host and destination host are separated by seven networks. There will be seven ________. A) packets B) frames C) physical links D) none of the above Answer: B Diff: 2 Question: 26h Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 66) If a frame passes through seven switches between the source and destination hosts, how many physical links will there be? (Careful!) A) 1 B) 6 C) 7 D) 8 Answer: D Diff: 3 Question: 28a Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application21 Copyright © 2015 Pearson Education, Inc. 67) If a frame passes through eight switches between the source and destination hosts on a single network, how many data links will there be? A) 1 B) 2 C) 8 D) 9 Answer: A Diff: 2 Question: 28a Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 68) If a frame passes through two routers between the source and destination hosts, how many routes will there be? A) 1 B) 2 C) 8 D) 9 Answer: A Diff: 2 Question: 28a Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 69) At what layer would you find IP addresses? A) 1 B) 2 C) 3 D) 4 Answer: C Diff: 2 Question: 29a Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application22 Copyright © 2015 Pearson Education, Inc. 70) At what layer would you find EUI-48 addresses? A) 1 B) 2 C) 3 D) 4 Answer: B Diff: 2 Question: 29b Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 71) At what layer would you find packets? A) 1 B) 2 C) 3 D) 4 Answer: C Diff: 2 Question: 29c Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 72) At what layer would you find frames? A) 1 B) 2 C) 3 D) 4 Answer: B Diff: 2 Question: 29d Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 73) At what layer would you find wire connections? A) 1 B) 2 C) 3 D) 4 Answer: A Diff: 1 Question: 29f Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application23 Copyright © 2015 Pearson Education, Inc. 74) At what layer would you find switches? A) 1 B) 2 C) 3 D) 4 Answer: B Diff: 1 Question: 28g Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 75) At what layer would you find routers? A) 1 B) 2 C) 3 D) 4 Answer: C Diff: 1 Question: 29 Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application 76) Packets are ________. A) switched B) routed C) both A and B D) neither A nor B. Answer: B Diff: 2 Question: 30 Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application24 Copyright © 2015 Pearson Education, Inc. 77) Standards tend to bring _________. A) interoperability B) higher prices C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 31b Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Application 78) What layer number is the transport layer? A) 1 B) 2 C) 3 D) 4 Answer: D Diff: 1 Question: 31d Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept 79) What layer number is the physical layer? A) 1 B) 2 C) 3 D) 4 Answer: A Diff: 1 Question: 31d Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept25 Copyright © 2015 Pearson Education, Inc. 80) What layer number is the Internet layer? A) 1 B) 2 C) 3 D) 4 Answer: C Diff: 1 Question: 31d Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept 81) What layer number is the data link layer? A) 1 B) 2 C) 3 D) 4 Answer: B Diff: 1 Question: 31d Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept 82) Which layer's standards govern signaling? A) 1 B) 2 C) 3 D) 4 Answer: A Diff: 2 Question: 31e Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept26 Copyright © 2015 Pearson Education, Inc. 83) Which layer's standards govern delivering frames? A) 1 B) 2 C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 31f Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept 84) Which layer's standards govern router operation? A) 1 B) 2 C) 3 D) 4 Answer: C Diff: 1 Question: 31g Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept 85) In the Five General Layers Standard, which layer's standards govern application message fragmentation? A) 2 B) 3 C) 4 D) 5 Answer: C Diff: 3 Question: 31g Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept27 Copyright © 2015 Pearson Education, Inc. 86) In the Five General Layers Standard, which layer's standards govern application World Wide Web exchanges over the Internet? A) 2 B) 3 C) 4 D) 5 Answer: D Diff: 2 Question: 31h Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Application 87) Application message fragmentation is done on the ________. A) source host B) destination host C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 31h Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Application 88) Application message reassembly is done on the ________. A) source host B) destination host C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 31h Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Application28 Copyright © 2015 Pearson Education, Inc. 89) Which of the following is NOT a standards organization? A) ISO B) OSI C) IETF D) All of the above are standards organizations. Answer: B Diff: 3 Question: 32a Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Application 90) OSI standards are dominant at the ________. A) data link layer B) physical layer C) both A and B D) neither A nor B Answer: C Diff: 2 Question: 32b Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Application 91) Which of the following layers governs internet transmission? A) data link layer B) transport layer C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 32d Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept29 Copyright © 2015 Pearson Education, Inc. 92) Which of the following is a host's official address on the Internet? A) its IP address B) its host name C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 33b Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept 93) If a host wishes to transmit packets to another host, it must find the other host's ________. A) IP address B) host name C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 33b Objective: List the five standards layers commonly encountered in networking, describe what each layer does, describe concepts and terms in each layer, identify at which layer a given process is operating, and identify which standards agencies and standards architecture are relevant to that process. Classification: Concept 94) When the source host transmits a frame, the frame is addressed to the ________. A) destination host B) first switch C) first router D) destination application Answer: C Diff: 3 Question: 1-3 Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application30 Copyright © 2015 Pearson Education, Inc. 95) When the source host transmits a packet, the packet is addressed to the ________. A) destination host B) first switch C) first router D) destination application Answer: A Diff: 2 Question: 1-3 Objective: Describe how internets and routers make it possible for hosts on different networks to work together. Classification: Application1 Copyright © 2015 Pearson Education, Inc. Business Data Networks and Security, 10e (Panko) Chapter 2 Network Standards 1) Internet standards are published as ________. A) RFCs B) IETFs C) TCP/IPs D) Internet Protocols Answer: A Diff: 1 Question: 1a Objective: Explain how internet standards are made and why this approach is valuable. Classification: Concept 2) Standards mean the same thing as ________. A) semantics B) syntax C) rules D) protocols Answer: D Diff: 1 Question: 2a Objective: Provide the definitions of network standards and protocols, message syntax, semantics, and order. Classification: Concept 3) Standards govern ________. A) semantics B) syntax C) both A and B D) neither A nor B Answer: C Diff: 1 Question: 3a Objective: Provide the definitions of network standards and protocols, message syntax, semantics, and order. Classification: Concept2 Copyright © 2015 Pearson Education, Inc. 4) The meaning of a message is referred to as the message's ________. A) protocol B) order C) syntax D) semantics Answer: D Diff: 1 Question: 3b Objective: Provide the definitions of network standards and protocols, message syntax, semantics, and order. Classification: Concept 5) How a message is organized is its ________. A) protocol B) order C) syntax D) semantics Answer: C Diff: 1 Question: 3c Objective: Provide the definitions of network standards and protocols, message syntax, semantics, and order. Classification: Concept 6) A message's semantics is its ________. A) protocol B) message order C) meaning D) structure Answer: C Diff: 1 Question: 3d Objective: Provide the definitions of network standards and protocols, message syntax, semantics, and order. Classification: Concept 7) A message's syntax is its ________. A) protocol B) message order C) meaning D) structure Answer: D Diff: 1 Question: 3e Objective: Provide the definitions of network standards and protocols, message syntax, semantics, and order. Classification: Concept3 Copyright © 2015 Pearson Education, Inc. 8) In an HTTP, which one (browser or Webserver application program) transmits message first? A) browser B) Webserver application program C) They transmit simultaneously. D) It depends on the situation. Answer: A Diff: 1 Question: 4a Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application 9) In HTTP, which program may initiate communication? A) browser B) Webserver program C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 4b Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application 10) Host P transmits a SYN segment to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment. A) ACK B) SYN C) SYN/ACK D) none of the above Answer: C Diff: 1 Question: 4c Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application 11) If a destination host does not receive a segment, it will ________. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment D) none of the above Answer: D Diff: 2 Question: 4d Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application4 Copyright © 2015 Pearson Education, Inc. 12) If the destination host receives a segment that has an error, it will ________. A) transmit an ACK segment B) transmit a NAC segment C) transmit an RSND segment D) none of the above Answer: C Diff: 2 Question: 4e Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application 13) A sending host will retransmit a TCP segment if it ________. A) receives an ACK segment B) receives a NAC segment C) receives an RPT segment D) none of the above Answer: D Diff: 2 Question: 4f Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application 14) In a four-step close, which side transmits a FIN segment? A) the side that initiates the close B) the other side C) either side D) neither side Answer: C Diff: 1 Question: 4g Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application 15) After the side wishing to close a TCP connection sends a FIN segment, the other side will ________. A) not send any more segments B) only send ACK segments C) only send FIN segments D) none of the above Answer: B Diff: 2 Question: 4h Objective: Discuss message ordering in general and in HTTP and TCP. Classification: Application5 Copyright © 2015 Pearson Education, Inc. 16) Which of the following is inside the header of messages? A) address field B) IP address field C) data field D) trailer Answer: A Diff: 3 Question: 5a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 17) The ________ contains the content being delivered by a message. A) address field B) header C) data field D) trailer Answer: C Diff: 1 Question: 5b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 18) A message always has a ________. A) header B) data field C) both A and B D) neither A nor B Answer: A Diff: 3 Question: 5c Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 19) Which part of a message is less often in a message compared to the other two parts? A) header B) data field C) trailer D) All of the above are commonly seen in all messages. Answer: C Diff: 2 Question: 5d Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application6 Copyright © 2015 Pearson Education, Inc. 20) "Octet" is the same as ________. A) "bit" B) "byte" C) either A or B, depending on the context D) neither A nor B Answer: B Diff: 1 Question: 5e Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 21) EUI-48 addresses are ________. A) 32 bits long B) 48 bits long C) 128 bits long D) Address length varies. Answer: B Diff: 1 Question: 6a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 22) An EUI-48 address was formerly called a(n) ________ address. A) IPv4 B) IPv6 C) MAC D) DNS Answer: C Diff: 1 Question: 6b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application7 Copyright © 2015 Pearson Education, Inc. 23) ________ read(s) the destination address in an Ethernet frame. A) The destination host B) Switches in the network C) both A and B D) neither A nor B Answer: C Diff: 3 Question: 6c Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 24) If the destination host finds an error in an Ethernet frame, it ________. A) sends back a NAK B) sends back a ACK C) both A and B D) neither A nor B Answer: D Diff: 1 Question: 6d Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 25) Ethernet does ________. A) error detection B) error correction C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 6e Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 26) In IP, the first bit in the second row is ________. A) 0 B) 31 C) 32 D) 63 Answer: C Diff: 3 Question: 7a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application8 Copyright © 2015 Pearson Education, Inc. 27) How long are IPv4 addresses? A) 4 bits B) 32 bits C) 48 bits D) 128 bits Answer: B Diff: 1 Question: 7b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 28) How long are IPv4 addresses in octets? A) 4 octets B) 32 octets C) 48 octets D) 128 octets Answer: A Diff: 3 Question: 7c Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 29) To make a forwarding decision, a router looks at the arriving packet's ________. A) destination IP address B) destination EUI-48 address C) both A and B D) MAC addresses Answer: A Diff: 3 Question: 7d Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application9 Copyright © 2015 Pearson Education, Inc. 30) IP is ________. A) reliable B) unreliable C) semi-reliable D) unreliable or reliable depending on the situation Answer: B Diff: 1 Question: 7e Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 31) TCP messages are called ________. A) segments B) fragments C) packets D) datagrams Answer: A Diff: 1 Question: 8a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 32) TCP has six single-bit fields in headers and these single-bit fields are called ________ fields. A) port B) flag C) ACK D) binary Answer: B Diff: 1 Question: 9a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 33) If someone says that a 1-bit flag is set, this means that it is given the value ________. A) 0 B) 1 C) either A or B D) neither A nor B Answer: B Diff: 1 Question: 9b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept10 Copyright © 2015 Pearson Education, Inc. 34) The UDP has ________ fields. A) 4 B) 8 C) 16 D) 32 Answer: A Diff: 1 Question: 10a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 35) The UDP ________. A) is unreliable B) has a checksum field C) both A and B D) neither A nor B Answer: C Diff: 2 Question: 10b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 36) UDP is ________. A) reliable B) unreliable C) It depends on the situation. D) none of the above Answer: B Diff: 1 Question: 10c Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept11 Copyright © 2015 Pearson Education, Inc. 37) On a server, well-known port numbers indicate ________. A) applications B) connections with client computers C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 11a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 38) For every conversation, a client randomly generates an ephemeral port number for ________. A) applications B) conversations C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 11b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 39) The range of port 1024 to port 4999 is the usual range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B Answer: B Diff: 3 Question: 11c Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept12 Copyright © 2015 Pearson Education, Inc. 40) 2500 is in the range for ________ port numbers. A) well-known B) ephemeral C) both A and B D) neither A nor B Answer: B Diff: 3 Question: 11d Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 41) The source socket is 60.171.18.22:2707. The source is a(n) ________. A) client B) server C) well-known server D) ephemeral server Answer: A Diff: 2 Question: 11e Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 42) Which of the following is a socket? A) 80 B) 21 C) both A and B D) neither A nor B Answer: D Diff: 2 Question: 12a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 43) The source socket is 60.171.18.22:2707. The source host is a(n) ________. A) client B) server C) well-known server D) ephemeral server Answer: A Diff: 2 Question: 12b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application13 Copyright © 2015 Pearson Education, Inc. 44) The destination socket is 60.171.18.22:161. The destination host is a(n) ________. A) client B) server C) well-known server D) ephemeral server Answer: B Diff: 2 Question: 12c Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 45) The application standard is almost always ________. A) HTTP B) TCP C) reliable D) None of the above is true. Answer: D Diff: 2 Question: 13a Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 46) Which of the following layers has more standards than the other three layers? A) data link B) Internet C) transport D) application Answer: D Diff: 2 Question: 13b Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept14 Copyright © 2015 Pearson Education, Inc. 47) At which layer would you find standards for requesting videos from a video-sharing site such as YouTube? A) application B) transport C) Internet D) none of the above Answer: A Diff: 2 Question: 13c Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 48) At which layer would you find file transfer protocol (FTP) standards for downloading files from an FTP server? A) application B) transport C) Internet D) none of the above Answer: A Diff: 2 Question: 13d Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application 49) In HTTP headers, the end of a header field is usually indicated by a ________. A) . B) : C) ; D) none of the above Answer: D Diff: 2 Question: 13e Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Application15 Copyright © 2015 Pearson Education, Inc. 50) In HTTP, the end of a header field is usually indicated by a ________. A) bit position B) CRLF C) colon D) blank line Answer: B Diff: 2 Question: 13f Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 51) An HTTP request message usually has a ________. A) header B) data field C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 13g Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 52) An HTTP response message usually has a ________. A) trailer B) data field C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 13h Objective: Discuss message syntax in general and in Ethernet frames, IP packets, TCP segments, UDP datagrams, and HTTP request and response messages. Classification: Concept 53) Converting application messages into bits is called ________. A) encapsulation B) encryption C) encoding D) exchange Answer: C Diff: 1 Question: 14a Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Concept16 Copyright © 2015 Pearson Education, Inc. 54) At what layer is encoding done? A) application B) transport C) Internet D) none of the above Answer: A Diff: 3 Question: 14b Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Concept 55) How many bytes will it take to transmit "Brain Dead" without the quotation marks? A) 2 B) 3 C) 9 D) none of the above Answer: D Diff: 3 Question: 15a Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application 56) Which of the following is an integer? A) 4,307 B) 45.7 C) both A and B D) neither A nor B Answer: A Diff: 1 Question: 16a Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application 57) Convert the binary number 100 to decimal. A) It is in decimal. B) 2 C) 4 D) 8 Answer: C Diff: 2 Question: 16b Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application17 Copyright © 2015 Pearson Education, Inc. 58) Convert a decimal number 15 to the binary number. A) It is a binary number. B) 1100 C) 1101 D) 1111 Answer: D Diff: 3 Question: 16c Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application 59) Convert decimal 8 to binary. A) 100 B) 1000 C) 10000 D) 111 Answer: B Diff: 3 Question: 16d Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application 60) A 5-bit field can represent ________ alternatives or different combinations. A) 8 B) 16 C) 32 D) 64 Answer: C Diff: 2 Question: 17a Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application 61) A 7-bit field can represent ________ alternatives or different combinations. A) 14 B) 49 C) 128 D) 256 Answer: C Diff: 2 Question: 17b Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application18 Copyright © 2015 Pearson Education, Inc. 62) To represent 65 alternatives, your alternatives field would have to be at least ________ bits long. A) 5 B) 6 C) 7 D) 8 Answer: C Diff: 2 Question: 17c Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application 63) The five senses can be represented with a ________-bit field. A) 2 B) 3 C) 4 D) 5 Answer: B Diff: 2 Question: 17d Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application 64) The electrical signal generated by a microphone is called a(n) ________ signal. A) binary B) digital C) analog D) Either A or B. Answer: C Diff: 1 Question: 18a Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Concept 65) A codec ________. A) encodes voice sounds into digital signals for transmission B) encodes voice sounds into analog signals for transmission C) encrypts the signal D) converts binary voice signals into digital signals for transmission Answer: D Diff: 3 Question: 18b Objective: Explain how to encode application messages into bits (1s and 0s). Classification: Application19 Copyright © 2015 Pearson Education, Inc. 66) ________ is placing a message in the data field of another message. A) Encoding B) Vertical communication C) Layering D) Encapsulation Answer: D Diff: 2 Question: 19a Objective: Explain vertical communication on hosts. Classification: Concept 67) After the Internet layer process does encapsulation, it passes the IP packet to the ________ layer process. A) transport B) data link C) physical D) none of the above Answer: B Diff: 2 Question: 19b Objective: Explain vertical communication on hosts. Classification: Application 68) After the data link layer process does encapsulation, it passes the IP packet to the ________ layer process. A) physical B) internet C) transport D) none of the above Answer: A Diff: 1 Question: 19c Objective: Explain vertical communication on hosts. Classification: Application 69) Which layer process does NOT do any encapsulation when an application layer process transmits a message? A) physical B) data link C) Internet D) All layers do encapsulation. Answer: A Diff: 1 Question: 19d Objective: Explain vertical communication on hosts. Classification: Application1 Copyright © 2015 Pearson Education, Inc. Business Data Networks and Security, 10e (Panko) Chapter 3 Network Security 1) The Target attackers probably first broke into Target using the credentials of a(n) ________. A) low-level Target employee B) Target IT employee C) Target security employee D) employee in a firm outside Target Answer: D Diff: 1 Question: 1b Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 2) The Target attackers sold their stolen card information to ________. A) crimeware shops B) card shops C) card counterfeiters D) Hallmark Answer: B Diff: 2 Question: 1b Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 3) Which of the following probably suffered the most financial damage from the Target breach? A) Target B) banks C) consumers D) POS vendors Answer: A Diff: 2 Question: 2a Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 4) Which of the following probably suffered the most financial damage from the Target breach? A) retailers other than Target B) banks C) consumers D) POS terminal vendors Answer: A Diff: 2 Question: 2b Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Application2 Copyright © 2015 Pearson Education, Inc. 5) The general name for evil software is ________. A) virus B) worm C) exploit D) malware Answer: D Diff: 1 Question: 4a Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 6) The general name for a security flaw in a program is a ________. A) virus B) malware C) security fault D) vulnerability Answer: D Diff: 1 Question: 5a Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 7) A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem. A) malware B) security error C) vulnerability D) security fault Answer: C Diff: 1 Question: 5b Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 8) Users typically can eliminate a vulnerability in one of their programs by ________. A) installing a patch B) doing a zero-day installation C) using an antivirus program D) all of the above Answer: A Diff: 1 Question: 5c Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept3 Copyright © 2015 Pearson Education, Inc. 9) Vulnerability-based attacks that occur before a patch is available are called ________ attacks. A) preinstallation B) stealth C) malware D) zero-day Answer: D Diff: 1 Question: 5d Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 10) ________ are full programs. A) Viruses B) Worms C) both A and B D) neither A nor B Answer: B Diff: 2 Question: 6a Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 11) Which of the following attach themselves to other programs? A) Viruses B) Worms C) both A and B D) neither A nor B Answer: A Diff: 2 Question: 6b Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 12) Viruses most commonly spread from one computer to another ________. A) via e-mail B) by propagating directly by themselves C) through obfuscation D) all of the above Answer: A Diff: 1 Question: 6c Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Application4 Copyright © 2015 Pearson Education, Inc. 13) Which of the following sometimes uses direct propagation between computers? A) viruses B) worms C) Trojan horses D) downloaders Answer: B Diff: 2 Question: 6d Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 14) Which of the following can spread more rapidly? A) directly-propagating viruses B) directly-propagating worms C) Both of the above can spread with approximately equal speed. Answer: B Diff: 2 Question: 6e Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 15) Mobile code is another name for ________. A) virus B) worm C) both A and B D) neither A nor B Answer: D Diff: 2 Question: 7a Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 16) Malware programs that masquerade as system files are called ________. A) viruses B) scripts C) payloads D) Trojan horses Answer: D Diff: 1 Question: 7b Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept5 Copyright © 2015 Pearson Education, Inc. 17) Trojan horses can spread by ________. A) e-mailing themselves to victim computers B) directly propagating to victim computers C) both A and B D) neither A nor B Answer: D Diff: 2 Question: 7c Objective: Describe the threat environment, including types of attacks and types of attackers. Classification: Concept 18) The general

Show more Read less
Institution
Business Data Networks And Security,
Course
Business Data Networks and Security,











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Business Data Networks and Security,
Course
Business Data Networks and Security,

Document information

Uploaded on
October 17, 2022
Number of pages
228
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
grade_bender Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
1035
Member since
5 year
Number of followers
958
Documents
1871
Last sold
1 month ago
Grade_bender all documents, bundles, and flashcards

Access the most current and rigorously authenticated examination materials, including actual tests with 100% verification. Our comprehensive repository encompasses ATI, Nursing, PMHNP, TNCC, USMLE, ACLS, WGU, and all associated certification and academic assessments—each designed to ensure guaranteed success. Should a specific resource be unavailable in our catalog, our dedicated support team will procure it promptly upon request. Purchase with absolute confidence. We strongly encourage all clients to submit a review post-acquisition to affirm complete satisfaction and uphold our commitment to academic excellence.

Read more Read less
3.8

146 reviews

5
71
4
31
3
14
2
8
1
22

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions