Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1. Wireless ad-hoc mode A) allows network nodes to organize themselves without t

ID: 3769366 • Letter: 1

Question

1. Wireless ad-hoc mode

A) allows network nodes to organize themselves without the need for a base station
B) requires the base station to communicate
C) uses ad-hoc security protocols that are designed as the connection is established to create security through obscurity
D) allows cell towers of competing wireless companies to communicate directly during disasters

2.

This wireless networking protocol has an approximate range of 30 meters and a maximum transmission rate of 11 Mbps

A) 802.11 b
B) Bluetooth
C) Wireless-N
D) 4G/LTE

3.

Wireless network security

A) relies on ARP - the Airway Recryption Protocol
B) should not rely on WEP - the Wired Equivalence Protocol
C) is not needed in a point-to-point wireless link because no one else can receive the radio signal
D) is impossible because the data is transmitted through the air and anyone can capture those signals

4.

The AES Protocol

A) uses a 64 bit block size and two 56 bit keys, encrypting with key 1, decrypting with key 2, and encrypting with key 1 again
B) processes data in 128 bit blocks and can use a 128, 192 or 256 bit keys
C) uses a a random order of the ASCII table to encrypt the data
D) uses two keys, one for encryption and the other for decryption

5.

Confidentiality is

A) that messages cannot be modified without detection
B) that messages can be communicated at any time when desired by the sender and receiver
C) the sending and receiving of messages securely, so that only the sender and receiver can understand the contents of their messages
D) that messages can only be sent anonymously between senders and receivers

6.

Conversational audio and video

A) relies on the network to be able to deliver the data with high latency and variable network delay
B) must overcome variable network delay and latency
C) should deliver network data with more than a 1000 ms delay
D) can overcome any network delivery issues with sufficient buffering

7.

If Bob and Alice use symmetric key encryption, they need

A) one key that they both use for both encryption and decryption
B) two keys - one for encryption and one for decryption
C) four keys - two for Bob and two for Alice
D) three keys - one each for Bob, Alice and Trudy

8.

The IPSec protocol secures data by adding encryption

A) at the network layer
B) between the application and transport layers
C) at the data link layer
D) at the physical layer

9.

If Bob and Alice use public-key encryption, they need

A) one key that they both use for both encryption and decryption
B) two keys - one for encryption and one for decryption
C) three keys - one each for Bob, Alice and Trudy
D) four keys - two for Bob and two for Alice

10.

In terms of network management, MIB is

A) the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don't cause them to forget the OSI data model
B) a distributed store/database of network management data
C) the data definition langauge for network management data
D) the protocol for communicating network management data between managed devices and managing entities

11.

Streaming stored audio and video

A) requires that network delays do not exceed 400 ms
B) overcomes many network related issues by relying on the inherent re-transmission capability in UDP
C) can be stored on different servers at different bitrates to meet the needs of users
D) requires that the entire file is downloaded by the client prior to playback

12.

Video over IP using the H.323 protocol

A) is transmitted using RTP (real-time protocol) which relies on TCP
B) Uses the SIP protocol over TCP
C) is transmitted using RTP (real-time protocol) which relies on UDP
D) is transmitted using the DASH protocol which relies on the HTTP and TCP protocols

13.

Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because

A) wireless network nodes cannot "hear" all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or not
B) wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions
C) signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn't needed
D) wireless nodes can move, so radio wave collision must be avoided as nodes move around the network

14.

SNMP, Simple network management protocol, does not include

A) security through encryption of messages using WPA2 and AES
B) management information base (MIB)
C) transmission of messages using the UDP transport layer protocol
D) managed devices

15.

The SSL protocol secures data by adding encryption

A) at the data link layer
B) at the physical layer
C) between the application and transport layers
D) at the network layer

16.

The following are goals for network security except

A) integrity
B) availability
C) anonymity
D) confidentiality

17.

The SNMP Request/Response messages

A) data is requested from the managed device, requiring a response from the managing entity
B) data is sent from the managed device to the managing entity when there is some event or exception that occurs
C) data is sent from the managing entity to the managed device when there is some event or exception that occurs
D) data is requested from the managing entity, requiring a response from the managed device

18.

If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except

A) eavesdrop - intercept messages
B) impersonate either Bob or Alice
C) hijack the connection, and become a "man-in-the-middle"
D) crack the AES encryption key easily because of how poorly AES was designed

19.

Select the best authenitcation method that Alice can use to prove who she is to Bob

A) she can send Bob a hash of her username to prove she is Alice
B) she can send an encrypted version of her password to Bob to prove that she is Alice
C) Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to Bob
D) she can just send her password to Bob and Bob can validate the password against the database

20.

Message integrity is

A) that messages can only be sent anonymously between senders and receivers
B) the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages
C) that messages cannot be modified without detection
D) that messages can be communicated at any time when desired by the sender and receiver

21.

In the SSL protocol

A) a complex substitution cipher using a random order of the ASCII table is used
B) the WPA2 protocol with 3DES encryption is used
C) both the RSA protocol during the connection phase and the AES Protocol for bulk encryption are used
D) only the Caesar cipher is used

22.

Jitter in digital video transmission

A) is caused by variable network delay
B) is caused by the user shaking the camera violently
C) is caused by green blocks of video being transmitted to the receiver
D) is caused by constant network delay

23.

ASN.1 addresses the problem of

A) translation between different types of SNMP messages
B) asynchronous system notation between similar systems
C) autonomous system networking
D) the study of national networks through the association for the study of nationalities

24.

The following are issues with wireless networks except

A) temperature gradients as heat waves interfere with radio waves
B) signal strength issues as radio signals travel through walls, trees, concrete, water and air at different rates
C) interference from other intentional and unintentional radio wave sources like other networks, background radiation, electrical equipment and medical devices
D) multipath propagation as radio signals reflect off objects and arrive at receivers at slightly different times

25.

In the case of the SNMP Trap message,

A) data is sent from the managing entity to the managed device when there is some event or exception that occurs
B) data is requested from the managing entity, requiring a response from the managed device
C) data is sent from the managed device to the managing entity when there is some event or exception that occurs
D) data is requested from the managed device, requiring a response from the managing entity

26.

Suppose that you are designing a new video streaming service. You have chosen the DASH system (Dynamic Adaptive Streaming over HTTP), so you have created a method to store different versions of the video encoded at different bitrates. This allows your end-user to select the bitrate they want to see when they play the video. Explain the how this system can be utilized to overcome network related issues, especially if your service controls the video player application. Describe the interaction that should occur as the client program encounters common network issues like delay, jitter or packet loss.

Explanation / Answer

1. A
2.A
3.B
4.B
5.C
6.B
7.A
8.A
9.D
10.B
11.B
12.A
13.B
14.A
15.C
16.C
17.D
18.D
19.C
20.C
21.C
22.A
23.A
24.A
25.D