1. IP Addresses are/do: (check all that apply) a. Exist in the Data Link Layer b. Physical addresses c. Connect LANs to each other d. Grouped to classes and/or sub-nets 2. Each LAN has a Network IP address a. True b. False 3. An IP Mask is used to separate a Network address from a NodefHost address a. True b. False 4. IP address classes A,B,C, do not have a range of private reserved addresses a. True b. False 5. IP addresses of all classes can be further divided into "sub-nets" to more efficiently use the IP address space a. True b. False 6. Role of a router(s) is to: (check all that apply) a. Translate illegal private IP addresses to legal external ones b. Forward IP addressed packets from source to destination c. Notify all other network routers of its network connections 7. Program that routers use to forward data packets is called a Switching Algorithm a. True b. False 8. Which Routing Algorithm can adopt to a changing network topology and is suitable for large networks a. Static b. Dynamic 9. Routing information Protocol (RIP) is part of a. Link State b. Distance-Vector 49. Which kind of attack attempts to gain sensitive data by pretending to be a trustworthy user; through e-mail attachment or fake web site a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse: f. Session hijacking g. Phishing 50. A malicious software disguised to perform legitimate function in order to corrupt end user's applications or operating system a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse f. Session hijacking g. Phishing 51. Network/data security requires which type of service(s) (check all that apply) a. Authentication b. Data integrity c. Confidentiality d. Nonrepudiation 52. Process of recovering unintelligible data/text to a humanly readable is called a. Cleartext b. Ciphertext c. Encryption d. Decryption 53. A Digital Signature is created by generating a "Hash" or "Message Digest" from payload data that is much smaller than the payload itself. It is a unique fingerprint of the text used to determine if payload data were corrupted in transit. a. True b. False 54. .edy, which is intended for higher education institutions, is an example of: a. COTLD b. gTLD 55. Bandwidth refers to the available traffic capacity of a link. a. True b. False: 49. Which kind of attack attempts to gain sensitive data by pretending to be a trustworthy user; through e-mail attachment or fake web site. a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse f. Session hijacking g. Phishing 50. A malidous software disguised to perform legitimate function in order to corrupt end user's applications or operating system a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse f. Session hijacking g. Phishing 51. Network/data security requires which type of service(s) (check all that apply) a. Authentication b. Data integrity c. Confidentiality d. Nonrepudiation 52. Process of recovering unintelligible data/text to a humanly readable is called a. Cleartext b. Ciphertext c. Encryption d. Decryption 53. A Digital Signature is created by generating a "Hash" or "Message Digest" from payload data that is much smaller than the payload itself. It is a unique fingerprint of the text used to determine if payload data were corrupted in transit. a. True b. False 54. .edu, which is intended for higher-education institutions, is an example of: a. CCTLD b. gTLD 55. Bandwidth refers to the available traffic capacity of a link. a. True b. False