Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Transport pdus are typically called

08/12/2021 Client: muhammad11 Deadline: 2 Day

Multiple-Choice Questions:

1. Prior to cellular radio, mobile radio and telephone services required:

A. a high-power transmitter/receiver

B. multiple transmitters/receivers

C. only one or two dedicated channels

D. that many channels be used, which exceed the frequency capacity

2. When using cellular networks, __________.

A. a single base station can serve multiple cells

B. adjacent cells must use the same frequencies

C. adjacent cells are assigned different frequencies

D. non-adjacent cells are assigned different frequencies

3. The ideal design for cells in a cellular network is a hexagonal shape because _____.

A. this makes enforcement of shapes easier

B. this is the easiest to implement

C. this makes all frequencies available to all cells

D. this makes the distance to all adjacent cells the same

4. When a mobile unit moves, it may connect with a different base station. This action is called ____________.

A. a handoff

B. a transfer

C. a reconfiguration

D. a dropped signal

5. Which of the following is NOT one of the ways that frequency spectrum can be divided among active users?

A. frequency division multiple access

B. time division multiple access

C. code division multiple access

D. cell division multiple access

6. Because of the limited frequencies available, a key design element of any cellular system is to ___________.

A. use small cells

B. employ multiple access

C. limit the number of users at one time

D. use as many frequencies as possible

7. The Wireless Application Protocol (WAP) is:

A. proprietary protocol developed in the USA for wireless security

B. dependent on the specific network technologies employed

C. an Internet standard that replaces HTML, HTTP, and XML

D. designed to overcome many of the limitations hindering acceptance of mobile data services

8. Which of the following is NOT one of the components of the WAP specification?

A. A framework for wireless telephony applications

B. A full-featured communications protocol stack

C. A programming model based on the WWW

D. A markup language adhering to XML

9. The WAP Programming Model uses a ________ that acts as a proxy server for the wireless domain.

A. translator

B. WAP server

C. gateway

D. decoder

10. For a given system, multiple access is based on _______.

A. TDMA

B. FDMA

C. CDMA

D. all of the above

11. Important objectives of computer security include:

A. confidentiality

B. integrity

C. availability

D. all of the above

12. One type of attack on the security of a computer system or network that impacts the availability of a system (e.g. destruction of a resource in the system) is referred to as ___________.

A. incapacitation

B. interception

C. modification

D. all of the above

13. The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A. active attacks

B. passive attacks

C. administrative attacks

D. none of the above

14. Of the three classes of intruders into computer systems and networks, the clandestine user is typically:

A. an insider to the organization

B. an outsider to the organization

C. either an insider or an outsider to the organization

D. none of the above

15. Which of the following is not an example of intrusion:

A. guessing and cracking passwords

B. running a packet sniffer on a workstation to capture user names and passwords

C. using an unattended, logged-in workstation without permission

D. all of the above are examples of intrusion

16. A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:

A. logic bomb

B. Trojan horse

C. virus

D. none of the above

17. The stage of a virus where it is activated to perform the function for which it was intended is referred to as the _________.

A. propagation phase

B. triggering phase

C. execution phase

D. none of the above

18. A virus can be attached to a program by _________.

A. prepending

B. postpending

C. embedding other than at the beginning or end

D. all of the above

19. Which of the following statements regarding macro viruses is true?

A. a macro virus is platform independent

B. macro viruses infect documents, not executable portions of code

C. macro viruses are easily spread

D. all of the above

20. Which of the following statements is generally true regarding the original class of email viruses?

A. it sends itself to selected names on the user’s email mailing list

B. arrive in email attachments

C. usually do no local damage on the infected machine

D. all of the above

21. IPSec transport mode provides protection primarily for:

A. the Internet layer

B. upper-layer protocols

C. network and link-layer protocols

D. all of the above

22. The higher-layer protocols defined as part of SSL include:

A. handshake protocol

B. change cipher spec protocol

C. alert protocol

D. all of the above

23. The WiFi standard known as Privacy with message integrity can be described as follows:

A. a way of ensuring the privacy of the individual using WiFi

B. a technique that ensures that the data transmitted using WiFi have not been altered

C. a way of providing mutual authentication between a user and an AS

D. none of the above

24. A key logical component of an IDS is:

A. sensors

B. analyzers

C. user interface

D. all of the above

25. A stateful inspection firewall ________.

A. applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet

B. controls TCP traffic by creating a directory of outbound TCP connections

C. acts as a relay of application-level traffic

D. sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host

26. Which of the following is not a central element of a typical antivirus scheme?

A. detection

B. identification

C. removal

D. deterrence

27. Asynchronous transmission includes a start and stop bit with each character transmitted to ensure:

A. that the total number of bits is a factor of 10

B. to allow a continuous stream of data

C. to prevent single bit errors from occurring

D. to allow the receiver to maintain synchronization with the sender

28. The most complex part of SSL is the ___________ Protocol.

A. Handshake

B. Change Cipher Spec

C. Alert

D. Record

29. Which security area is addressed in IEEE 802.11i ?

A. authentication

B. key management

C. data transfer privacy

D. all of the above

30. The 802.11i architecture consists of ________ main ingredients.

A. one

B. two

C. three

D. four

31. The ________ is one of a number of major Internet interconnection points that serve to tie all the ISPs together.

A. CPE

B. POP

C. IXP

D. NSP

32. The ________ is a company that provides backbone service to an ISP.

A. NSP

B. CO

C. IXP

D. CPE

33. A ________ is a site that has a collection of telecommunications equipment and usually refers to ISP or telephone company sites.

A. POP

B. NSP

C. CPE

D. IXP

34. _________ are programs that extract information from name servers in response to client requests.

A. Name servers

B. DNS

C. Resolvers

D. IP datagram

35. The domain ________ is for network support centers, Internet service providers, and other network-related organizations.

A. org

B. info

C. com

D. net

36. Transport PDUs are typically called ________.

A. channels

B. segments

C. bridges

D. frames

37. The ________ layer covers the physical interface between a data transmission device and a transmission medium or network.

A. physical

B. transport

C. application

D. network

38. IP appends a header of control information to each segment to form a(n) __________.

A. IP datagram

B. end system

C. checksum

D. port

39. The ________ supports a basic electronic mail facility by providing a mechanism for transferring messages among separate hosts.

A. SNMP

B. SSH

C. HTTP

D. SMTP

40. The _________ is used to send files from one system to another under user command.

A. UDP

B. SMTP

C. FTP

D. SSH

41. The physical layer for IEEE 802.11 has been issued in _______ stages.

A. 3

B. 5

C. 7

D. 9

42. Any entity that has station functionality and provides access to the distribution system via the wireless medium for associated stations.

A. access point

B. basic service set

C. extended service set

D. coordination function

43. The logical function that determines when a station operating within a BSS is permitted to transmit and may be able to receive PDUs.

A. access point

B. basic service set

C. extended service set

D. coordination function

44. A set of one or more interconnected BSSs and integrated LANs that appear as a single BSS to the LLC layer at any station associated with one of these BSSs.

A. MPDU

B. ESS

C. MSDU

D. DS

45. Information that is delivered as a unit between MAC users.

A. MPDU

B. ESS

C. MSDU

D. DS

46. Data communications via circuit switching involves three phases:

A. connect, transfer, hang-up

B. ring, talk, hang-up

C. dial, transfer, disconnect

D. establishment, data transfer, disconnect

47. A public telecommunications network can be described using four generic components:

A. senders, receivers, lines, and nodes

B. subscribers, local loops, exchanges, and trunks

C. subscribers, trunks, nodes, and loops

D. local loops, subscriber lines, exchanges, and trunks

48. Which of the following is NOT one of classes of function for control signaling?

A. establishment

B. supervisory

C. call information

D. network management

49. Which of the following is NOT one of the stated advantages of packet switching over circuit switching?

A. there is less network delay

B. data rate conversion can be provided

C. priorities can be used

D. connections are never rejected

50. Which of the following is NOT a reason for network jitter when using packet switching networks?

A. packets may vary in length

B. packets may take different paths through the network

C. packets may encounter network congestion

D. data rates will vary from one trunk line to the next

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Write My Coursework
Exam Attempter
Top Rated Expert
Top Academic Tutor
Quality Homework Helper
24/7 Assignment Help
Writer Writer Name Offer Chat
Write My Coursework

ONLINE

Write My Coursework

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$49 Chat With Writer
Exam Attempter

ONLINE

Exam Attempter

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$46 Chat With Writer
Top Rated Expert

ONLINE

Top Rated Expert

I can assist you in plagiarism free writing as I have already done several related projects of writing. I have a master qualification with 5 years’ experience in; Essay Writing, Case Study Writing, Report Writing.

$48 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$30 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$19 Chat With Writer
24/7 Assignment Help

ONLINE

24/7 Assignment Help

This project is my strength and I can fulfill your requirements properly within your given deadline. I always give plagiarism-free work to my clients at very competitive prices.

$33 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Security architecture and design - Basic skills and drills in badminton - Examples of operant conditioning - Risk analysis for medium scale expansion excel - Sex linked traits answer key - Topic: Simulating Hamiltonians - Financial Analysis - C bus superannuation login - Dyson distribution and supply chain strategy - Floating leaf disk photosynthesis lab answers - Multiplicative group of integers modulo n calculator - National geographic taboo food - Ibm odm 8.8 knowledge center - 200 Words - Toils on a trireme crossword clue - Generals die in bed sparknotes - CEER - The coase theorem relies on internalizing externalities through ________ - Fui a el corte inglés, un almacén (department store) que (1) (quedar) un poco lejos de mi hotel. - Say it with symbols investigation 2.2 answers - 5 theories of forgetting - Age structure diagram worksheet - Discussion Week 7 - Pvg 32 technical manual - Management leading and collaborating in a competitive world 9e - Capstone sales forecast spreadsheet - Please - Royal homes peshawar sunrise marketing - Health and wellbeing responsibility of all poster - Earth the biography oceans - Zen Buddhism - Old unhappy far off things poem - 132 canterbury road middle park - Business research methods william g zikmund - Dataset - Prepare the stockholders equity section of the balance sheet - Str 581 week 6 strategic plan and presentation - Cmist acronym first aid - What do the credit terms 2 15 n 30 mean - Meditech surgical case study - The leadership experience 7th edition chapter 1 - Father and son relationship in the kite runner - Associative learning vs classical conditioning - 1 2 journal areas of interest in human services - Bones of the skull worksheet - Functions of National Security Plans - Robin hill serviceberry problems - Accounts receivable minus accounts payable - Antivirus inc expects its sales - Literature Analysis Paper - Dhr state ga us - Sodium acetate trihydrate pka - Whats half of a teaspoon - Persian war worksheet answers - Unit VIII Case Study - Amazon vs walmart case study answers - Plymouth art centre films - Alvin the production manager at the paragon company - What is the difference between job analysis and job design - Bereft robert frost analysis sparknotes - Hcf gym membership discount - Confederate Monuments Essay - 87.5 as a fraction - Business communication building critical skills pdf - Data and statistics unit test - Various gas expansions pv plots and work mastering physics - Crypto Week 8 discussion - Siemens rcr10 433 installation manual - Incontinency definition hamlet - Acct 301 week 5 homework - Komatsu axo 80 oil specifications - Dyes and dyeing organic chemistry lab report - Sexual health clinic camberwell - Speed velocity and acceleration notes - Finance for nonfinancial managers bergeron pierre edition nelson - 12 hour cough relief target - Operations management - Is lizzy greene related to joan cusack - Project management portfolio of evidence example - Electron configuration worksheet and lots more answers - Brush-tailed phascogale nest box - Best practice aged care program active service model - Confessions and Admissions after a Request for a Lawyer - Torrance j.colvin - If an idea is restated in a nonfiction article, what does this most likely signal for the reader? - Case study - Visual basic 2012 6th edition pdf - Conservation of angular momentum lab - 2 assignments, Less than 48 hours - Model of elements of strategic management - Residency - Army manual of dress - Circle square triangle rectangle - Individual: salesperson java™ application part ii - Strategic management in international context - What were aztec houses made of - Commentary Peer Review Worksheet - What Is a Work of Art? ((APA format)) - Forum: Weekly Homework 3 - How to export spss to word