Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 1 pts Which two layers of the Open Systems Interconnection ( OSI ) Reference Model are closely associated due to the use of

Question 11 pts
Which two layers of the Open Systems Interconnection (OSI) Reference Model are closely associated due to the use of Transmission Control Protocol/Internet Protocol (TCP/IP)?
Group of answer choices
Transport and Presentation (Layers 4 and 6)
Data Link and Network (Layers 2 and 3)
Physical and Data Link (Layers 1 and 2)
Network and Transport (Layers 3 and 4)
Flag question: Question 2
Question 21 pts
True or False? Internet Protocol version 4(IPv4) uses a 128-bit address scheme, whereas Internet Protocol version 6(IPv6) uses a 32-bit address scheme.
Group of answer choices
True
False
Flag question: Question 3
Question 31 pts
True or False? Communication at the Data Link Layer of the Open Systems Interconnection (OSI) Reference Model enables routers to move packets across the network.
Group of answer choices
True
False
Flag question: Question 4
Question 41 pts
True or False? The seamless transfer of an Internet Protocol (IP) address from one network to another without losing IP sessions is referred to as "IP mobility."
Group of answer choices
True
False
Flag question: Question 5
Question 51 pts
True or False? In cellular design, microcells are needed for rural areas.
Group of answer choices
True
False
Flag question: Question 6
Question 61 pts
True or False? A SIM card is a small smart card that fits into a slot on a mobile phone and contains the subscriber's information.
Group of answer choices
True
False
Flag question: Question 7
Question 71 pts
True or False? From the perspective of mobile communications, the term "cellular" refers to the portioning of frequency coverage maps.
Group of answer choices
True
False
Flag question: Question 8
Question 81 pts
True or False? In mobile communications cellular design, each cell has its own antenna tower.
Group of answer choices
True
False
Flag question: Question 9
Question 91 pts
True or False? A mobile cloud app is installed and runs directly on a mobile device.
Group of answer choices
True
False
Flag question: Question 10
Question 101 pts
Which of the following is a network protocol designed to work on existing IEEE802.15.4 devices and supports a mesh network capable of handling up to 250 nodes with high levels of authentication and encryption?
Group of answer choices
Zigbee IP
Thread
Bluetooth Low Energy
Z-Wave
Flag question: Question 11
Question 111 pts
True or False? An organization may build a private LTE network using the lightly licensed spectrum such as Citizen Band Radio Spectrum (CBRS).
Group of answer choices
True
False
Flag question: Question 12
Question 121 pts
True or False? Security is a concern for both mobile cloud apps and native mobile apps.
Group of answer choices
True
False
Flag question: Question 13
Question 131 pts
True or False? A demilitarized zone (DMZ) exists between the untrusted Internet and the trusted (secure) internal network.
Group of answer choices
True
False
Flag question: Question 14
Question 141 pts
True or False? Few threats that exist on wired networks also exist on wireless and mobile networks.
Group of answer choices
True
False
Flag question: Question 15
Question 151 pts
The principle of information security that is concerned with ensuring that systems and services are not withheld from users by unauthorized means is:
Group of answer choices
integrity.
confidentiality.
nonrepudiation.
availability.
Flag question: Question 16
Question 161 pts
True or False? Mobile device management pushes configuration settings to mobile devices, and can provide remote locking, location tracking, and device wiping.
Group of answer choices
True
False
Flag question: Question 17
Question 171 pts
Which of the following wireless topologies uses seamless roaming, nomadic roaming, and collocation?
Group of answer choices
Independent basic service set (IBSS)
Mesh basic service set (MBSS)
Basic service set (BSS)
Extended service set (ESS)
Flag question: Question 18
Question 181 pts
You are a network administrator. Your company recently approved of employees working from home one day a week and the use of employee-owned mobile devices at work. You want to ensure that employees follow wireless security best practices. What is your most important first step?
Group of answer choices
Establish a Bring Your Own Device (BYOD) policy.
Ask users to lower the radio power on their home wireless access points.
Ensure that WPA2 or WPA3 encryption is enabled and enforced on all personal wireless devices.
Ask users for the Media Access Control (MAC) addresses of their home wireless access points.
Flag question: Question 19
Question 191 pts
True or False? A wireless access point (WAP) can serve as a wireless bridge.
Group of answer choices
True
False
Flag question: Question 20
Qu

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Database And Expert Systems Applications 33rd International Conference Dexa 2022 Vienna Austria August 22 24 2022 Proceedings Part 1 Lncs 13426

Authors: Christine Strauss ,Alfredo Cuzzocrea ,Gabriele Kotsis ,A Min Tjoa ,Ismail Khalil

1st Edition

3031124227, 978-3031124228

More Books

Students also viewed these Databases questions

Question

1 Does the positive psychology movement have legs?

Answered: 1 week ago