Question
QUESTION 1 Delivery of a packet to the closest interface of a set of interfaces by a routing protocol is a/an: a. Multicast b. Unicast
QUESTION 1
Delivery of a packet to the closest interface of a set of interfaces by a routing protocol is a/an:
a. | Multicast | |
b. | Unicast | |
c. | Broadcast | |
d. | Anycast |
2 points
QUESTION 2
Multiprotocol Label Switching (MPLS)
a. | Will work with SONET or Frame Relay | |
b. | Has the potential to replace ATM | |
c. | Uses labels and label switching routers to define flows between endpoints | |
d. | All of the above. |
2 points
QUESTION 3
Power Over Ethernet (PoE):
a. | Cannot be used with Gigabit Ethernets. | |
b. | Can be used with twisted pair cabling or coax. | |
c. | Cannot be used Internationally where AC current differences will degrade performance. | |
d. | High power levels require CAT 5 or higher cabling | |
e. | All of the above |
2 points
QUESTION 4
A contract to the user community defininginput/output characteristics and functionality of a new system with targets for service performance, reliability, & response time is part of:
a. | Feasibility study | |
b. | Options analysis | |
c. | Black box specification | |
d. | Systems architecture | |
e. | Requirements analysis |
2 points
QUESTION 5
A network that is highly reliable, can perform bulk transfer between a limited number of devices over a small area, and interconnects mass storage devices to mainframes and supercomputers is an example of a:
a. | Backbone LAN | |
b. | Back-end network | |
c. | Storage Area Network (SAN) | |
d. | High speed Office Network | |
e. | Factory LAN |
2 points
QUESTION 6
An IP address (32 bits) that starts with 10 is class:
1. | A | |
2. | B | |
3. | C | |
4. | D |
2 points
QUESTION 7
Logical components of an Intrusion Detection System include:
a. | A User Interface, Sensors, and Analysers | |
b. | Firewalls, Anti-virus software, and a Network Management Console | |
c. | Management applications, managed nodes, rules database | |
d. | Scanners, Firewalls, and Network controller | |
e. | None of the above |
2 points
QUESTION 8
In the SSL protocol, the Message Authentication Code (MAC) is:
a. | calculated on a data fragment after optional compression. | |
b. | calculated on the entire original message | |
c. | calculated on the encrypted message only | |
d. | calculated on the encrypted message and added SSL header |
2 points
QUESTION 9
In the IP address: 40.25.1.16 /16
What are the network and host portions?
a. | 40.0.0.0 Network 0.25.1.16 Host | |
b. | 40.25.1.0 Network 0.0.0.16 Host | |
c. | 40.25.0.0 Network 0.0.1.16 Host | |
d. | 40.25.1.16 Network 0.0.0.16 Host |
2 points
QUESTION 10
For 4-G cellular networks the chosen way to divide spectrum among active users is:
a. | Frequency-Division Multiple Access | |
b. | Orthogonal Frequency-Division Multiple Access | |
c. | Time-Division Multiple Access | |
d. | Code-Division Multiple Access | |
e. | Space-Division Multiple Access |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started