All Matches
Solution Library
Expert Answer
Textbooks
Search Textbook questions, tutors and Books
Oops, something went wrong!
Change your search query and then try again
Toggle navigation
FREE Trial
S
Books
FREE
Tutors
Study Help
Expert Questions
Accounting
General Management
Mathematics
Finance
Organizational Behaviour
Law
Physics
Operating System
Management Leadership
Sociology
Programming
Marketing
Database
Computer Network
Economics
Textbooks Solutions
Accounting
Managerial Accounting
Management Leadership
Cost Accounting
Statistics
Business Law
Corporate Finance
Finance
Economics
Auditing
Hire a Tutor
AI Tutor
New
Search
Search
Sign In
Register
study help
computer science
business data networks
Questions and Answers of
Business Data Networks
Delete
Give a non-network example of hierarchical addressing, and discuss how it reduces the amount of work needed in physical delivery. Do not use the postal service, or the telephone network.
Delete
Redo Figure 9-20 for transport mode.
a.Voice over IP and Video over IP.17a1.C.Both A and B17a2.A.Always
In VoIP, which of the following is transport or signaling:a. SIP: Signalingb. The delivery of voice between users: Transportc. RTP: Transportd. Call setup: Signalinge. CODEC data? Transport
Consult the Wikipedia Webpage April Fools' Day Request for Comments (https://en.wikipedia.org/wiki/April_Fools%27_Day_Request_for_Comments). Select one of the R F Cs listed on the page and write a
a. Continuing the analysis of the IDS query in Figure A-26, scrutinize Events 10 and 11. You need to know that the Trivial File Transfer Protocol is a way to download a file from a remote computer
a. What do firewalls do that IDSs do not?20a.) ______ stop definite attack packets.a. Firewallsb. IDSsc. Both A and Bd. Neither A nor Bb. What do IDSs do that firewalls do not?20b.) ______
a. What is the advantage of real-time fail-over with synchronized data centers?19a.) Real-time fail-over with synchronized data centers ______.a. is expensiveb. minimizes downtimec. Both A and Bd.
a. What is the definition of a major incident?b. What group handles a major incident?17b.) Major incidents are handled by the ________.a. On-duty staffb. CSIRTc. Outside consultantd. FBIc. What
a. Distinguish between desktop exercises and live exercises in CSIRT rehearsals.18a.) CSIRTs rehearse an incident by talking about what should be done without actually doing in_______.a.
a. What are the two types of normal incidents?16a.) Which of the following is a normal incident?a. A false alarmb. A major security breachc. Both A and Bd. Neither A nor Bb. Who handles normal
a. What are the three names for successful attacks?15a1.) Successful attacks are called ______.a. Breachesb. Compromisesc. Bothd. Neither15a2.) Successful attacks are called ______.a. Incidentsb.
a. Distinguish between firewall policies and firewall ACL rules.14a.) The statement that people in quality control should have access to robots on the shop floor is an example of a firewall
a. Compare the specificity of policies, implementation guidance, and implementation.13a.) Implementation guidance is less specific than _____.a. Policiesb. Implementationc. Both A and Bd. Neither A
a. Why is oversight important?12a.) Policies should drive ________.a. Implementationb. Oversightc. Both A and Bd. Neither A nor Bb. List the three types of oversight described in the text.12b.)
a. What is a policy?11a.) A policy specifies _______.a. What should be doneb. How to do itc. Both A and Bd. Neither A nor Bb. Distinguish between policy and implementation.11b.) Which of the
a. What is an organizational system?10a.) Security must be considered at the level of ________.a. Information systemsb. Organizational systemsc. Both A and Bd. Neither A nor Bb. Why is it necessary
a. Why is it important to segment networks into multiple security domains?9a.) Companies should have ________ for each site.a. Multiple security domainsb. A single security domainc. At least two D M
a. How does a company address the problem of changing login credentials and permissions on various servers for an employee when he or she moves to a different department?8a.) To address uniformity of
a. Distinguish between authentication and authorizations.7a1.) A user is allowed to edit files in a particular directory. This is an example of ________. (Select the most specific answer.)a.
a. Why must companies identify single points of takeover?6a.) A central firewall management program that pushes changes to firewalls is ________. (Select the most specific answer.)a. A weakest linkb.
a. What is comprehensive security?4a.) Attackers only need to find a single weakness to break in. Consequently, companies must _________.a. Have comprehensive securityb. Have insurancec. Do risk
a. What is defense in depth?5a.) An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)a. Comprehensive
a. Comment on the statement, “The goal of security is to eliminate risk.”3a.) The goal of security is to eliminate risk.a. Trueb. Falseb. What is risk analysis?3b.) Balancing threats against
a. What security mistake did Fazio Mechanical Services make?1a.) The Target attackers probably first broke into Target using the credentials of a(n) ________.a. Low-level Target employeeb. Target IT
a. What happens in each stage of the Plan–Protect–Respond cycle?2a.) Firewall operation takes place during the _______ phase.a. Planb. Protectc. Responsed. None of the aboveb. Which stage
a. Does Tor try to achieve confidentiality for the original message?24a.) Tor provides confidentiality _________.a. Only between the source host and the first Tor routerb. All the way to the
a. What service or services does Skype provide?23a.) Skype provides _______.a. Voice over IPb. Video over IPc. Both A and Bd. Neither A nor Bb. List and define Skype’s three main elements.23b.) In
a. What is the promise of P2P applications?22a.) Which of the following is considered a bigger problem with traditional client/server based architectures than with peer-to-peer architectures?a.
a. In a VoIP traffic transport packet, what does the data field contain?21a.) In VoIP traffic, the data field in a signaling packet usually carries codec data.a. Trueb. Falseb. What standards are for
a. Is SIP a signaling protocol or a transport protocol?20a.) SIP is a ________ protocol for VoIP.a. Signalingb. Transportc. Both A and Bd. Neither A nor Bb. Describe how SIP initiates a communication
a. What are the two options for VoIP clients?19a.) Telephones that can plug directly into a VoIP network are called PCs with multimedia hardware and added software.a. Trueb. Falseb. What are the
a. What two things do CODECs do?18a.) Speech codecs _______.a. Translate human voice signals into digital signals for transmissionb. Translate human voice signals into analog signals for
a. If a message sender uses SSL/TLS when it sends a message, how is protection likely to be limited?16a.) When an e-mail user encrypts an outgoing message with SSL/TLS, how far will this
a. Text messages are limiting, but they introduced an important innovation. What was it?b. How can e-mail deliver content suitable for specific applications, such as word processing programs?c. What
a. In traditional e-mail, when the receiver’s e-mail client downloads new mail from its mail host, what standard is it likely to use?14a.) A traditional e-mail user retrieving messages from his or
a. In traditional e-mail, when a client sends a message to its mail host, what standard does it use?13a.) In traditional e-mail, when a client sends a message to its mail host, what standard does it
a. Which tends to have a data field, HTTP request or response messages?12a.) Which tends to have a data field?a. An HTTP request messageb. An HTTP response messagec. Both A and Bd. Neither A nor Bb.
a. You are downloading a webpage that has six graphics and two sound clips. How many request–response cycles will be needed?11a.) How many HTTP request-response cycles are needed to transfer a
a. What are the two major sets of standards for the World Wide Web?10a1.) Which of the following is a file format standard?a. HTMLb. HTTPc. Both A and Bd. Neither A nor B10a2.) Which of the following
a. How is cloud computing affecting networking?9a.) On networks, cloud computing is increasing the need for _______.a. Sudden changes in trafficb. Reliabilityc. Controlled latencyd. All of the
a. What concerns do customers have about cloud security?8a.) Cloud customers are concerned that _______.a. Their data might be hackedb. The government may access their data secretlyc. Both A and Bd.
a. With cloud services for clients, what happens when a user moves from one physical client device to another?7a.) When a cloud client customer moves from one client machine to another, _______.a.
a. What is a CSP? (Do not just spell out the acronym.)6a.) CSP s often offer _______.a. ISP serviceb. LaaS servicec. Both A and Bd. Neither A nor Bb. Distinguish between IaaS CSPs and SaaS CSPs.6b.)
a. Distinguish between physical servers and virtual machines.5a.) A ______ may have multiple ______.a. Physical server; virtual machinesb. Virtual machine; physical serversc. Both A and Bd. Neither A
a. Why does Netflix make many transcoded versions of each movie?4a.) Netflix transcoding is based on _______.a. Network speedb. The user’s display device characteristicsc. Both A and Bd. Neither A
a. Why is reflecting a user’s input dangerous?3a.) When you login to a website and it responds by saying, “Hello your name,” this primarily creates a _______ problem.a. Securityb. Privacyc.
Skype uses super nodes, which do more work than ordinary P2P nodes. How do you think nodes become super nodes? There is nothing in the text that will help you with this question. Think broadly in
a. Why are hackers now focusing on taking over applications?2a.) Typically, the most common way for an attacker to get extensive privileges on a computer is to ________.a. Take over an application
The sender uses HTTP to transmit mail. What standard or standards will the receiver use to download the message?
a. What is a networked application?1a.) A networked application is an application that requires a network to operate.a. Trueb. Falseb. What is an application architecture?1b.) The way in which
a. Where are WAN optimization devices found?18a.) WAN optimization devices are deployed ______.a. At the ends of leased linesb. By the telephone carrierc. By the MPLS carrierd. By the ISPb. List the
a. In MPLS, is selecting the best interface for each packet at each router done when the packet enters the network or before?17a.) In MPLS, the router interface to send the packet back out will be
a. Why is it attractive for companies to use Layer 2 and Layer 3 WAN services offered by carriers?16a.) Compared to the Internet, Layer 2 and Layer 3 carrier WAN services usually _________.a. Offer
a. If you need a speed of 1.2 Mbps between two corporate sites, what leased line would you specify in the United States and in Europe?15a1.) T1 leased lines run at a speed of about _______.a. 250
a. When a customer uses a leased line to connect to its ISP, what two points does the leased line connect?14.) A customer's leased line to its ISP connects to the ISP's __________.a. POPb. Terminal
a. What are the characteristics of leased lines?13a.) Leased lines offer ________ service.a. Fastb. Any-to-anyc. Both A and Bd. Neither A nor Bb. Distinguish between leased lines and access
a. What does “G” stand for in cellular telephony?12a.) In cellular technology, G stands for ________.a. Goodnessb. Gradec. Ground waved. Generationb. Which generation first brought decent Web
a. What factors affect what throughput an individual user will receive?11a.) Which of the following affects what cellular throughput an individual user will receive?a. Being in a moving carb. Being
a. Why does cellular telephony use cells?10a.) If a cell site uses Channel 237, which other cell sites can reuse the channel?a. Adjacent cell sitesb. Cell sites one beyond adjacent cellsc. Cell sites
a. In cellular technology, what is a cell?9a.) In cellular technology, a ________ is a small geographical area.a. Cellb. Cellsitec. Both A and Bd. Neither A nor Bb. What is a cell site?9b.) In
a. What are the important things to consider when deciding between ADSL and cable modem service for your residence?b. In the past, how has ADSL compared to cable modem service?8b.) Compared to ADSL
a. What transmission media do cable television companies use?7a.) For their transmission medium, cable television companies primarily use _________.a. 2-pair VG UTP cablingb. 2-pair DG UTP cablingc.
a. Does residential DSL offer simultaneous voice and data service?6a.) DSL offers ________.a. Voice transmissionb. Data transmissionc. Both A and Bd. Neither A nor Bb. Why is asymmetric speed
a. Why is the PSTN important in WAN data transmission?5a.) How do WAN carriers typically get their trunk lines?a. They construct them.b. They lease them from telephone companies.c. They use wireless
a. What two wired WAN technologies are growing rapidly?b. Compare their relative attractions and main uses.c. Why will leased lines continue to be important even if networks of leased lines are no
a. List the three basic components of wide area networks.b. Are access links wired or wireless?c. What is CPE?4c.) Which of the following does the carrier NOT own?a. The network coreb. Customer
In ADSL service, there is a single UTP pair running from the end office switch to the individual household. In cable in the neighborhood is shared by many subscribers. Yet, typically, cable modem
a. Why do MANs have higher typical speeds than broader-scope WANs?3a.) MAN speeds are faster than WAN speeds. This is because of ________.a. Technological limitationsb. Regulatory limitationsc. Slow
If you have a network of leased lines, you have options for how many sites you connect. Sites can communicate directly or through intermediate sites. a. In a full mesh, every pair of sites will
a. Why are typical WAN speeds slower than typical LAN speeds? Give a clear and complete argument.2a1.) Which of the following usually offer higher speeds?a. LANsb. WANsc. Both A and B are about equal
Distinguish between dial-up telephone service you use as a consumer and leased line services used in business.
a. Distinguish between LANs and WANs.1a.) A network that runs on the customer premises is a _______.a. LANb. WANc. Both A and Bd. Neither A nor Bb. What are rights of way?1b.) Which of the following
a. List the strengths of IP sec compared to SSL/TLS.19a.) Which has stronger security?a. SSL/TLSb. IP secc. Both have about equal security.b. What is the attraction of SSL/TLS compared to
a. What are the two stages in IP sec protection?b. What standard is used in the first stage?18b.) The first stage of IP sec uses the _________ protocol.a. SSL/TLSb. AESc. IKEd. SHAc. In which stage
a. Distinguish between cryptographic methods and options.17a.) SLAs define ________.a. Cryptographic methodsb. Cryptographic optionsc. Both A and Bd. Neither A nor Bb. What is an SA?17b.) In IP sec,
a. What are the three added fields when IP sec ESP is used?16a.) Which of the following is used in ESP?a. ESP headerb. ESP trailerc. Integrity check valued. All of the aboveb. What do they surround
a. What three types of VPN do IP sec support?15a.) IP sec is used for ________ VPNs.a. Remote-accessb. Site-to-sitec. Both A and Bd. Neither A nor Bb. What nonhost device is a terminating point in
a. For what general class of messages at what layer is ICMP used?13a.) ICMP is used for ________.a. Error messagesb. Configuration messagesc. Routing messagesd. None of the aboveb. Distinguish
a. How does IP sec provide a great deal of protection?14a.) IP sec protects ______ layer content.a. data linkb. applicationc. Both A and Bd. Neither A nor Bb. Why do we focus on ESP and not on
a. What is the purpose of dynamic routing protocols?12a.) Dynamic ________ protocols allow routers to transmit routing table information to one another.a. Routingb. Transportc. Synchronizationd. None
a. Explain the difference between managed devices and objects.11a1.) In SNMP, the manager communicates directly with a(n) _______.a. Managed deviceb. Agentc. Objectd. Access point11a2.) Which of the
a. What four pieces of configuration information does a DHCP server typically provide?10a.) ADHCP server provides a client with __________.a. One or more IP addresses for it to useb. The IP address
a. Does a DNS server have one record for a particular domain (including a host), or does it have more than one?9a.) For a particular domain name, a DNS server will have _______.a. A single recordb.
Your computer sends a DNS request message to your local DNS server. After an unusually long time, your computer receives a DNS response message that the host name in your request message does not
After you get a second-level domain name, what more must you do to have a working website for your company?
a. Is the Domain Name System only used to send back IP addresses for given host names? Explain.8a1.) The domain name system ________.a. is a way to find a host's IP addresses if your computer only
a. What field in an IPv6 global uni-cast address corresponds to the network part of an IPv4 address?3a1.) Which is NOT one of the three parts of a public IPv6 uni-cast address?a. Subnet IDb. Routing
a. What field in a global uni-cast IP address corresponds to the host part of an IPv4 address?4a.) The part of an IPv6 global uni-cast address that designates the host is called the ________.a. Host
a. What server will your local DNS server contact if it does not know the IP address of a host?7a.) If your local DNS server does not know the host name of an IP address, it will get the address from
a. Describe NAT operation.6a.) _______ is the process of presenting external IP addresses that are different from internal IP addresses used within the firm.a. DNSb. NATc. DHCPd. None of the
a. What are the three ranges of private IP addresses?b. If a firm chooses 10.x.x.x for its internal IP addresses, how many hosts can it have internally?c. Repeat for 192.168.x.x.d. Repeat for
Should you use canonical text representation (RFC 5952) to reduce the modified EUI-64 interface ID by itself, or should you do it only for the entire IPv6 address?
A firm is assigned the network part 128.171. It selects a 10-bit subnet part.a. Draw the bits for the four octets of the IP address of the first host on the first subnet.b. Convert this answer into
A firm is assigned the network part 128.171. It selects an 8-bit subnet part.a. Write the bits for the four octets of the IP address of the first host on the first subnet.b. Convert this answer to
Assume that an average SNMP response message is 100 bytes long. Assume that a manager sends 4,000 SNMP Get commands each second.a. What percentage of a 1 Gbps LAN link’s capacity would the
Both DNS servers and DHCP servers send your client PC an IP address. What is different about these two addresses?
a. Your firm has an 8-bit network part. If you need at least 250 subnets, what must your subnet part size be?2a.) In IP subnet planning, you need to have at least 130 subnets. How large should your
Showing 1 - 100
of 344
1
2
3
4