Telecommunications and Network Design Strategies Question 1 (12.5 points) Networ
ID: 3835462 • Letter: T
Question
Telecommunications and Network Design Strategies
Question 1 (12.5 points)
Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?
Question 1 options:
packet
segment
frame
datagram
Save
Question 2 (12.5 points)
The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?
Question 2 options:
switch
router
hub
repeater
Save
Question 3 (12.5 points)
The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?
Question 3 options:
application
end users
computer network interface card (NIC)
computer CPU
Save
Question 4 (12.5 points)
TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?
Question 4 options:
SYN, SYN-ACK, ACK
SYN, SYN, ACK
SYN, ACK, RST
SYN, ACK, SYN
Save
Question 5 (12.5 points)
Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?
Question 5 options:
risk assessment
asset inventory
risk management
risk mitigation
Save
Question 6 (12.5 points)
In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?
Question 6 options:
warm site
hot site
mirror site
cold site
Save
Question 7 (12.5 points)
In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?
Question 7 options:
warm site
hot site
mirror site
cold site
Save
Question 8 (12.5 points)
Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?
Question 8 options:
worm
virus
Trojan horse
e-mail virus
Save
a)packet
b)segment
c)frame
d)datagram
Explanation / Answer
1) Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. Frames are used in layer 2.
Ans: a) Frame.
2) Router is the only device among given devices provides this Internet Protocol.
Ans: b) Router.
3) Application decides to use TCP and UDP.
Ans: a) Application
4) SYN, SYN-ACK, ACD makes a three-way handshake in TCP.
Ans: a) SYN, SYN-ACK, ACD.
5)Continous monitoring is an important strategic initiative for the organization. In order to successfully complete teh continouos monitoring effort, what would be the very first step you would have to take is risk assessment.
Ans: a) risk assessment.
6)Ans: Mirror Site.
7)Ans: Cold Site.
8) trojan horse malware appears normal, but can harm computers if exploited.
Ans: trojan horse
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.