Answer only if you are sure its right Wireless ad-hoc mode A) allows network nod
ID: 3769637 • Letter: A
Question
Answer only if you are sure its right
Wireless ad-hoc mode
A) allows network nodes to organize themselves without the need for a base station
B) requires the base station to communicate
C) uses ad-hoc security protocols that are designed as the connection is established to create security through obscurity
D) allows cell towers of competing wireless companies to communicate directly during disasters
2.
This wireless networking protocol has an approximate range of 30 meters and a maximum transmission rate of 11 Mbps
A) 802.11 b
B) Bluetooth
C) Wireless-N
D) 4G/LTE
3.
Wireless network security
A) relies on ARP - the Airway Recryption Protocol
B) should not rely on WEP - the Wired Equivalence Protocol
C) is not needed in a point-to-point wireless link because no one else can receive the radio signal
D) is impossible because the data is transmitted through the air and anyone can capture those signals
4.
The AES Protocol
A) uses a 64 bit block size and two 56 bit keys, encrypting with key 1, decrypting with key 2, and encrypting with key 1 again
B) processes data in 128 bit blocks and can use a 128, 192 or 256 bit keys
C) uses a a random order of the ASCII table to encrypt the data
D) uses two keys, one for encryption and the other for decryption
5.
Confidentiality is
A) that messages cannot be modified without detection
B) that messages can be communicated at any time when desired by the sender and receiver
C) the sending and receiving of messages securely, so that only the sender and receiver can understand the contents of their messages
D) that messages can only be sent anonymously between senders and receivers
6.
Conversational audio and video
A) relies on the network to be able to deliver the data with high latency and variable network delay
B) must overcome variable network delay and latency
C) should deliver network data with more than a 1000 ms delay
D) can overcome any network delivery issues with sufficient buffering
7.
If Bob and Alice use symmetric key encryption, they need
A) one key that they both use for both encryption and decryption
B) two keys - one for encryption and one for decryption
C) four keys - two for Bob and two for Alice
D) three keys - one each for Bob, Alice and Trudy
8.
The IPSec protocol secures data by adding encryption
A) at the network layer
B) between the application and transport layers
C) at the data link layer
D) at the physical layer
9.
If Bob and Alice use public-key encryption, they need
A) one key that they both use for both encryption and decryption
B) two keys - one for encryption and one for decryption
C) three keys - one each for Bob, Alice and Trudy
D) four keys - two for Bob and two for Alice
10.
In terms of network management, MIB is
A) the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don't cause them to forget the OSI data model
B) a distributed store/database of network management data
C) the data definition langauge for network management data
D) the protocol for communicating network management data between managed devices and managing entities
11.
Streaming stored audio and video
A) requires that network delays do not exceed 400 ms
B) overcomes many network related issues by relying on the inherent re-transmission capability in UDP
C) can be stored on different servers at different bitrates to meet the needs of users
D) requires that the entire file is downloaded by the client prior to playback
12.
Video over IP using the H.323 protocol
A) is transmitted using RTP (real-time protocol) which relies on TCP
B) Uses the SIP protocol over TCP
C) is transmitted using RTP (real-time protocol) which relies on UDP
D) is transmitted using the DASH protocol which relies on the HTTP and TCP protocols
13.
Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks because
A) wireless network nodes cannot "hear" all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or not
B) wireless network nodes can "hear" all other network nodes, unlike in a wired network, so they don't have to detect collisions
C) signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn't needed
D) wireless nodes can move, so radio wave collision must be avoided as nodes move around the network
14.
SNMP, Simple network management protocol, does not include
A) security through encryption of messages using WPA2 and AES
B) management information base (MIB)
C) transmission of messages using the UDP transport layer protocol
D) managed devices
15.
The SSL protocol secures data by adding encryption
A) at the data link layer
B) at the physical layer
C) between the application and transport layers
D) at the network layer
16.
The following are goals for network security except
A) integrity
B) availability
C) anonymity
D) confidentiality
17.
The SNMP Request/Response messages
A) data is requested from the managed device, requiring a response from the managing entity
B) data is sent from the managed device to the managing entity when there is some event or exception that occurs
C) data is sent from the managing entity to the managed device when there is some event or exception that occurs
D) data is requested from the managing entity, requiring a response from the managed device
18.
If "Trudy" wishes to do harmful things to the communication between "Bob" and "Alice", she can attempt to do all except
A) eavesdrop - intercept messages
B) impersonate either Bob or Alice
C) hijack the connection, and become a "man-in-the-middle"
D) crack the AES encryption key easily because of how poorly AES was designed
19.
Select the best authenitcation method that Alice can use to prove who she is to Bob
A) she can send Bob a hash of her username to prove she is Alice
B) she can send an encrypted version of her password to Bob to prove that she is Alice
C) Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to Bob
D) she can just send her password to Bob and Bob can validate the password against the database
20.
Message integrity is
A) that messages can only be sent anonymously between senders and receivers
B) the sending and receiving of messages securely, so that only the two of them can understand the contents of their messages
C) that messages cannot be modified without detection
D) that messages can be communicated at any time when desired by the sender and receiver
21.
In the SSL protocol
A) a complex substitution cipher using a random order of the ASCII table is used
B) the WPA2 protocol with 3DES encryption is used
C) both the RSA protocol during the connection phase and the AES Protocol for bulk encryption are used
D) only the Caesar cipher is used
22.
Jitter in digital video transmission
A) is caused by variable network delay
B) is caused by the user shaking the camera violently
C) is caused by green blocks of video being transmitted to the receiver
D) is caused by constant network delay
23.
ASN.1 addresses the problem of
A) translation between different types of SNMP messages
B) asynchronous system notation between similar systems
C) autonomous system networking
D) the study of national networks through the association for the study of nationalities
24.
The following are issues with wireless networks except
A) temperature gradients as heat waves interfere with radio waves
B) signal strength issues as radio signals travel through walls, trees, concrete, water and air at different rates
C) interference from other intentional and unintentional radio wave sources like other networks, background radiation, electrical equipment and medical devices
D) multipath propagation as radio signals reflect off objects and arrive at receivers at slightly different times
25.
In the case of the SNMP Trap message,
A) data is sent from the managing entity to the managed device when there is some event or exception that occurs
B) data is requested from the managing entity, requiring a response from the managed device
C) data is sent from the managed device to the managing entity when there is some event or exception that occurs
D) data is requested from the managed device, requiring a response from the managing entity
Explanation / Answer
1.
Wireless ad-hoc mode belongs to the physical layer. It is a decentralize wireless network
and it does not depend on the pre-existing infrastructure. It is not like the router or any
other connecting device, rather it organizes themselves without the need of any base
station.
Therefore, the correct option is A) allows network nodes to organize themselves
without the need for a base station.
2.
802.11 b is wireless network connecting device that work approximately 30 meter and the
transmission sped up to the 11 Mbps.
Therefore, the correct option is A) 802.11 b
3.
Wireless network security is used for data security. At the time when we transfer the data
from one host to other host the same time anyone can capture the data. So, to secure the
data we use wireless network security.
Therefore, the correct option is D) is impossible because the data is transmitted
through the air and anyone can capture those signals.
4.
The Advance encryption Standard is a symmetric key cryptography system. It encrypts
the data of 128 bit and uses the keys of 128, 192, 256 bits.
Therefore, the correct option is B) processes data in 128 bit blocks and can use a 128,
192 or 256 bit keys.
5.
Confidentiality is the part of the cryptography system. It is means that when the data is
transfer from sender to receiver it will only be able decrypt by the receiver.
Therefore, the correct option is C) the sending and receiving of messages securely, so
that only the sender and receiver can understand the contents of their messages.
6.
Conversational audio and video depend on the network only if the network is having high
bandwidth then the conversation will be very good.
Therefore, the correct option is A) relies on the network to be able to deliver the data
with high latency and variable network delay.
7.
Symmetric key cryptography system is system in which both bob and Alice use the
same key for both encryption and deception.
Therefore, the correct option is A) one key that they both use for both encryption and
Decryption.
8.
IPSec is the part of the network security and it is used for adding the encryption key with
the data.
Therefore, the correct option is A) at the network layer
9.
Asymmetric key cryptography is also known as public key cryptography system in
which bob and Alice uses different key for encryption and decryption.
Therefore, the correct option is B) two keys - one for encryption and one for
Decryption.
10.
The full name of the MIB is the management information base. It is a database
which is used to managing the entity of the database.
Therefore, the correct option is D) the protocol for communicating network
management data between managed devices and managing entities.
Note: The answer for the 10 questions have been provided. Please post remaining
questions in the anther.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.