Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Telecommunications and Network Design Strategies Question 1 (12.5 points) Networ

ID: 3835462 • Letter: T

Question


Telecommunications and Network Design Strategies

Question 1 (12.5 points)

Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

Question 1 options:

packet

segment

frame

datagram

Save

Question 2 (12.5 points)

The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

Question 2 options:

switch

router

hub

repeater

Save

Question 3 (12.5 points)

The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

Question 3 options:

application

end users

computer network interface card (NIC)

computer CPU

Save

Question 4 (12.5 points)

TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

Question 4 options:

SYN, SYN-ACK, ACK

SYN, SYN, ACK

SYN, ACK, RST

SYN, ACK, SYN

Save

Question 5 (12.5 points)

Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

Question 5 options:

risk assessment

asset inventory

risk management

risk mitigation

Save

Question 6 (12.5 points)

In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

Question 6 options:

warm site

hot site

mirror site

cold site

Save

Question 7 (12.5 points)

In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

Question 7 options:

warm site

hot site

mirror site

cold site

Save

Question 8 (12.5 points)

Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

Question 8 options:

worm

virus

Trojan horse

e-mail virus

Save

a)

packet

b)

segment

c)

frame

d)

datagram

Explanation / Answer

1) Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. Frames are used in layer 2.

Ans: a) Frame.

2) Router is the only device among given devices provides this Internet Protocol.

Ans: b) Router.

3) Application decides to use TCP and UDP.

Ans: a) Application

4) SYN, SYN-ACK, ACD makes a three-way handshake in TCP.

Ans: a) SYN, SYN-ACK, ACD.


5)Continous monitoring is an important strategic initiative for the organization. In order to successfully complete teh continouos monitoring effort, what would be the very first step you would have to take is risk assessment.

Ans: a) risk assessment.

6)Ans: Mirror Site.


7)Ans: Cold Site.

8) trojan horse malware appears normal, but can harm computers if exploited.

Ans: trojan horse

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote