Adcn

180 Questions | Attempts: 168
Share

SettingsSettingsSettings
Technology Quizzes & Trivia

.


Questions and Answers
  • 1. 

    3G Cellular systems use WCDMA and circuit switching techniques

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 2. 

    WEP-128 encryption has a key length of 104-bits

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 3. 

    Information in unencrypted form is called cipher-text

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 4. 

    ISOC ensures the open development and evolution of the IEEE protocols for the benefit of all people

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 5. 

    For security reasons, it is a good practice to change the MAC address of an access point when you purchase it.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 6. 

    One of the advantages of the ATM is having low overhead in its cell

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 7. 

    SDH can have a self-healing architecture

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 8. 

    Wireless Ad-hoc networks (peer-peer) are very insecure.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 9. 

    W-CDMA cannot provide QoS for various classes of traffic

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 10. 

    WPA2 key length is 128 bits

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 11. 

    . ________ technology can be used to provide internet access and television for households

    Correct Answer
    cable modem
  • 12. 

    Filtering is a security mechanism that allows you to restrict network access based on predefined criteria. name two types of filtering used in wireless LANs: ________ and ________

    Correct Answer
    MAC protocol, SSID
    MAC protocol, SSID
  • 13. 

    IEEE ________ protocol can be used for line of sight and non-line of sight wireless MAN communications

    Correct Answer
    802.16c
  • 14. 

    D0 MUX multiplex 2k4 and 9k6 sub-rates into a ________ link.

    Correct Answer
    64kbps
  • 15. 

    . ________ is the practice of identifying the key assets and the threats and comparing the nature of the threats to the controls designed to protect the assets.

    Correct Answer
    Risk management
  • 16. 

    . ________ is a separate battery operated unit that can provide power for a while in the event of a power loss.

    Correct Answer
    UPS, uninterruptible power supply
  • 17. 

    With ________ attack a hacker attempts to disrupt the network by flooding the network with messages using other computers as agents.

    Correct Answer
    DDOS
  • 18. 

    . ________ is done by hackers when changing the source address of incoming packets from their real IP address to an organisation's internal IP address

    Correct Answer
    IP spoofing
  • 19. 

    . ________ is installed on a LAN and used to monitor/manage the security of wireless network and identify rouge access points, monitor who is using the network and determine any hacking.

    Correct Answer
    wifi manager
  • 20. 

    In 802.1x, the ________ server sends the session key over the wired LAN to the access point. Once the access point receives the session key, it uses the session key to encrypt the broadcast key, which it sends to the client. The client uses its session key to decrypt the broadcast key.

    Correct Answer
    RADIUS
  • 21. 

    If a network has availability of 99.99%, this network, on average is unavailable for _________ Hours every 40,000 hours.

    • A.

      4 Hrs

    • B.

      40 Hrs

    • C.

      400 Hrs

    • D.

      0.4 Hrs

    Correct Answer
    A. 4 Hrs
  • 22. 

    RFC 2833 refers to :

    • A.

      A technical paper defining details of a technology

    • B.

      A kind of a router

    • C.

      The standard number for VOIP

    • D.

      An encryption method

    Correct Answer
    A. A technical paper defining details of a technology
  • 23. 

    Preventing unauthorised persons from gaining access to server room is called:

    • A.

      Physical security

    • B.

      Logical security

    • C.

      Disaster recovery

    • D.

      Error prevention

    Correct Answer
    A. Physical security
  • 24. 

    A network management report could include:

    • A.

      Network availability data

    • B.

      Graphs of daily/monthly usage

    • C.

      Comparison of activity between today and a similar previous period

    • D.

      All of the above are correct

    Correct Answer
    D. All of the above are correct
  • 25. 

    GSM 

    • A.

      Is first generation mobile technology

    • B.

      Uses TDMA

    • C.

      Is digital technology

    • D.

      Is both (b) and (c)

    Correct Answer
    D. Is both (b) and (c)
  • 26. 

    In wireless LANs, jamming

    • A.

      Occurs when a very powerful radio frequency (RF) signal cuts off the signals from access points and clients in a wireless LAN

    • B.

      Can happen unintentionally

    • C.

      Can be found with spectrum analysers

    • D.

      Is all of the above

    Correct Answer
    D. Is all of the above
  • 27. 

    In a man-in-the-middle attack in wireless LANs,

    • A.

      The hacker acts as a middle man between the wireless AP and the client

    • B.

      The hacker causes the client to disconnect from the legitimate access point and connect to his rogue access point

    • C.

      The hacker installs his own NIC with stolen MAC information

    • D.

      The hacker does none of the above

    Correct Answer
    B. The hacker causes the client to disconnect from the legitimate access point and connect to his rogue access point
  • 28. 

    In Grid Computing

    • A.

      Parallel processing occurs in CPUs that are shared across a network

    • B.

      All computers need very high specification CPUs

    • C.

      A large mainframe computer provides very high processing capability for other computers

    • D.

      Computers do not have any CPU

    Correct Answer
    A. Parallel processing occurs in CPUs that are shared across a network
  • 29. 

    The main problem in introducing FTTH to provide faster internet access is :

    • A.

      Cost of laying coaxial cables

    • B.

      Cost of laying fibre optic cable

    • C.

      Cost of PSTN to the user

    • D.

      Cost of satellite links

    Correct Answer
    B. Cost of laying fibre optic cable
  • 30. 

    Wireless LAN security can be increased by:

    • A.

      WPA

    • B.

      Directional antennas

    • C.

      Changing the default SSID of the access point you purchase

    • D.

      All of the above

    Correct Answer
    D. All of the above
  • 31. 

    The broadcast address for subnetwork 111.216.15.0/22 is 111.216.15.255/22

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 32. 

    Routers have to make routing decision in the software while layer 3 switches make the routing decisions in the application-specific integrated circuit (ASIC)

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 33. 

    W-CDMA uses 1.25Mhz of bandwidth per call (channel)

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 34. 

    RSVP is a protocol designed to reserve bandwidth across a network for an integrated service internet

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 35. 

    IEEE 802.16e wireless can cover Maximum distance of 1KM

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 36. 

    WiMax is a connection oriented technology

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 37. 

    One advantage of IPv6 compared to IPv4 is that it has less overhead

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 38. 

    CC02:1A:130::20C is an example of IPv6 address

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 39. 

    The purpose of the Spanning Tree Protocol (STP) is to prevent loops occurring on a network

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 40. 

    6to4 protocol can be used to connect IPv6 networks to the internet with IPv4

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 41. 

    Using PDH multiplexing, a 34Mbps (E3) can be split into ________ 2Mpbs (E1) links

    Correct Answer
    16
  • 42. 

    STM-4 link capacity is ________

    Correct Answer
    622Mbps
  • 43. 

    Two of the parameters that reduce the wireless LAN bandwidth available to a use are ________ and ________

    Correct Answer
    distance
    number of users
  • 44. 

    . ________ wireless access is a wireless access application in which the location of the end-user termination is fixed

    Correct Answer
    fixed
  • 45. 

    . ________ is done by hackers by simply changing the hacker's source IP address from their real address to an address from the inside of the organization's network that the hacker is targeting.

    Correct Answer
    IP spoofing
  • 46. 

    There are ________ host IP address in a LAN if the subnet mask is 255.255.255.248

    Correct Answer
    6
  • 47. 

    STM-16 can be split into ________ STM-4 links

    Correct Answer
    4
  • 48. 

    .________ specify what equipment, software, and services are desired and ask vendors to provide their best prices

    Correct Answer
    RFP
  • 49. 

    In network security, ________ means preventing outsiders from gaining access into offices, server rooms, equipment.

    Correct Answer
    physical security
  • 50. 

    In network management ________ means preventing, detecting and correcting faults in the network lines, network hardware and software

    Correct Answer
    fault management

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jun 19, 2016
    Quiz Edited by
    ProProfs Editorial Team
  • Jun 15, 2016
    Quiz Created by
    WillskE
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.