Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. IP Addresses are/do: (check all that apply) a. Exist in the Data Link Layer b. Physical addresses c. Connect LANs to each other d.

image text in transcribed
image text in transcribed
image text in transcribed
1. IP Addresses are/do: (check all that apply) a. Exist in the Data Link Layer b. Physical addresses c. Connect LANs to each other d. Grouped to classes and/or sub-nets 2. Each LAN has a Network IP address a. True b. False 3. An IP Mask is used to separate a Network address from a NodefHost address a. True b. False 4. IP address classes A,B,C, do not have a range of private reserved addresses a. True b. False 5. IP addresses of all classes can be further divided into "sub-nets" to more efficiently use the IP address space a. True b. False 6. Role of a router(s) is to: (check all that apply) a. Translate illegal private IP addresses to legal external ones b. Forward IP addressed packets from source to destination c. Notify all other network routers of its network connections 7. Program that routers use to forward data packets is called a Switching Algorithm a. True b. False 8. Which Routing Algorithm can adopt to a changing network topology and is suitable for large networks a. Static b. Dynamic 9. Routing information Protocol (RIP) is part of a. Link State b. Distance-Vector 49. Which kind of attack attempts to gain sensitive data by pretending to be a trustworthy user; through e-mail attachment or fake web site a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse: f. Session hijacking g. Phishing 50. A malicious software disguised to perform legitimate function in order to corrupt end user's applications or operating system a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse f. Session hijacking g. Phishing 51. Network/data security requires which type of service(s) (check all that apply) a. Authentication b. Data integrity c. Confidentiality d. Nonrepudiation 52. Process of recovering unintelligible data/text to a humanly readable is called a. Cleartext b. Ciphertext c. Encryption d. Decryption 53. A Digital Signature is created by generating a "Hash" or "Message Digest" from payload data that is much smaller than the payload itself. It is a unique fingerprint of the text used to determine if payload data were corrupted in transit. a. True b. False 54. .edy, which is intended for higher education institutions, is an example of: a. COTLD b. gTLD 55. Bandwidth refers to the available traffic capacity of a link. a. True b. False: 49. Which kind of attack attempts to gain sensitive data by pretending to be a trustworthy user; through e-mail attachment or fake web site. a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse f. Session hijacking g. Phishing 50. A malidous software disguised to perform legitimate function in order to corrupt end user's applications or operating system a. Spoofing b. Man-in-the-middle c. Replay attack d. Denial-of-service e. Trojan horse f. Session hijacking g. Phishing 51. Network/data security requires which type of service(s) (check all that apply) a. Authentication b. Data integrity c. Confidentiality d. Nonrepudiation 52. Process of recovering unintelligible data/text to a humanly readable is called a. Cleartext b. Ciphertext c. Encryption d. Decryption 53. A Digital Signature is created by generating a "Hash" or "Message Digest" from payload data that is much smaller than the payload itself. It is a unique fingerprint of the text used to determine if payload data were corrupted in transit. a. True b. False 54. .edu, which is intended for higher-education institutions, is an example of: a. CCTLD b. gTLD 55. Bandwidth refers to the available traffic capacity of a link. a. True b. False

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

More Books

Students also viewed these Databases questions

Question

Distinguish between flow and job shops.

Answered: 1 week ago