QUESTION 1
Which generation of wireless network technology uses the packet-switched IP network?
a. |
3G |
|
b. |
4G |
|
c. |
5G |
|
d. |
All of the above |
2.5 points
QUESTION 2
Which layer of the TCP/IP hierarchy is responsible for obtaining the correct address for a message’s destination?
a. |
Application |
|
b. |
Link |
|
c. |
Network |
|
d. |
Transport |
2.5 points
QUESTION 3
The UPDATE statement is used to update table names.
True
False
2.5 points
QUESTION 4
Which of the following is not a means of implementing server-side activities?
a. |
Javascript |
|
b. |
JSP |
|
c. |
ASP |
|
d. |
CGI |
2.5 points
QUESTION 5
Which of the following is not an application of the Internet?
a. |
CERT |
|
b. |
Telnet |
|
c. |
FTP |
|
d. |
|
2.5 points
QUESTION 6
The divide (/) operator is used to return the remainder in division.
True
False
2.5 points
QUESTION 7
The primary purpose of which of the following is not the enhancement of security?
a. |
CERT |
|
b. |
Encryption |
|
c. |
ICANN |
|
d. |
Firewall |
1) 4G 2) Application 3) False. (ALTER is used) 4) Javascript 5) CERT 6) False (used for quotient) 7) ICANN
QUESTION 1 Which generation of wireless network technology uses the packet-switched IP network? a. 3G b....
QUESTION 8 Which layer of the TCP/IP hierarchy presents incoming messages to the computer user? a. Network b. Link c. Transport d. Application 2.5 points QUESTION 9 A relational database is a collection of one or more tables that are related by key values. True False 2.5 points QUESTION 10 Which standards organization produced the OSI reference model for internet communication? a. IEEE b. ISO c. ANSI 2.5 points QUESTION 11 Which of the following is used...
1. Let’s consider the network shown in Figure 1 where Snort is deployed. 1.1: In Figure 1, why is Snort deployed in the DMZ instead of the Internal Network? (9 points) 1.2: In Figure 1, say True or False to the following statement: “Snort can see both incoming packets from the left firewall and outgoing packets from the right firewall”. (5 points) 1.3: In Figure 1, assume a packet P matches the following Snort rule when the packet is analyzed...
Question 26 In the TCP/IP model, what layer combines the responsibilities of the Application, Presentation, and Session layers from the OSI model? a. Internet b. Application c. Transport d. Link 1.25 points Question 27 In the TCP/IP model, what layer is considered so simple that it is ignored entirely? a. Network b. Data Link c. Application d. Physical 1.25 points Question 28 In the United States, who is able to activate the Emergency Alert System at the national level? a....
26. On which of the following protocols is the Internet based? A) TCP/IP B) FTP C) IMAP D) DNS 27. Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? A) Local area network B) Modem C) Twisted wire D) TCP/IP 28. A network that covers entire geographical regions is most commonly referred to as an): A) intranet B) peer-to-peer network. C) wide area network. D)...
1. Which of the following protocols is used by a client to send an email message? a. HTTP SMTP b. FTP d. RDP 2. What is the most common network topology today? a/Star c. Hub Ring d. Mesh 3. A client/server network is the simplest network model. a/ True O False 4. Which client server application allows an administrator to control a remote computer, but does not encrypt or secure the communication between client and server? A Telnet C. Remote...
Question 26 (1 point) In Lab 1 (Exploring Encryption), what did you need to configure on the server or on the client? Question 26 options: Only (a) and (b) (c) The client's public key (a), (b), and (c) (a) The server's certificate (b) Enable TLS on the server Save Question 27 (1 point) The following question is Lab 2 related (Ports and Firewalls). At what point does the HTTP daemon service actively begin listening for traffic on the network? Question...
CST 2400 Assignment Question 1: In a client-server based network, the host is trying to connect to the remote host but is not making an active connection which means the connection has timed out. Specifically, the user uses the telnet command to send a packet to a specific address, but no hosts are responding. Assume that the user from the local TCP/IP host issued the following command: # telnet hostname telnet ....... connection timed out Please diagnose the network connection...
Question 12 (1 point) The Network Address of the IP address 210.2.3.4 is a) 210.2.0.0 b) 210.2.3.0 c) 210.0.0.0 d) 210.2.3.255 Save Question 13 (1 point) The Broadcast Address of the IP address 100.100.03.3 is Oa) 100.100.255.255 O b) 100.0.0.0 c) 100.255.255.255 d) 100.100.0.0 Save Question 14 (1 point) The Broadcast Address of the IP 203.100.03.3 address is a) 203.100.03.255 b) 203.100.03.0 c) 203.100.0.0 d) 203.100.255.255 Save Question 12 (1 point) The Network Address of the IP address 210.2.3.4 is...
Question 34 A TCP socket contain …………………… that uniquely identifies it on a network TCP ID Port number UDP HTTP ( ) a ( ) b ( ) c ( ) d 2 points Question 35 Mail server port number is usually 8080 80 2525 25 ( ) a ( ) b ( ) c ( ) d 2 points Question 36 TCP Head length indicates ( ) The size of the segment ( ) The capacity of data that...
Question 1 The size of the datagram is determined by the application that sends the data. Allowing the size of datagrams to vary makes IP adaptable to a variety of applications. True False Question 2 What is the conceptual network boundary, and where is it located within the protocol stack? Is the transition area between digital and analog signals and can be found between layer 2 and layer 3 of the protocol stack. Identifies application direct messaging and is formed...