Tuesday, December 29, 2015

ITEC 626 Final Exam (UMUC)


ITEC 626 Final Exam (UMUC)
Part I. Multiple-choice questions – 40 questions, 1 point each
For each question, choose the single best alternative and select the letter corresponding to your answer choice.


1. Prior to cellular radio, mobile radio and telephone services required:
A.  a high-power transmitter/receiver
B.  multiple transmitters/receivers
C.  only one or two dedicated channels
D.  that many channels be used, which exceed the frequency capacity

2.  When using cellular networks,  __________.
A.  a single base station can serve multiple cells
B.  adjacent cells must use the same frequencies
C.  adjacent cells are assigned different frequencies
D.  non-adjacent cells are assigned different frequencies


3.  The ideal design for cells in a cellular network is a hexagonal shape because _____.
A.  this makes enforcement of shapes easier
B.  this is the easiest to implement
C.  this makes all frequencies available to all cells
D.  this makes the distance to all adjacent cells the same


4.  When a mobile unit moves, it may connect with a different base station. This action is called ____________.
A.  a handoffB.  a transfer
C.  a reconfigurationD.  a dropped signal


5.  Which of the following is NOT one of the ways that frequency spectrum can be  divided among active users?
A.  frequency division multiple accessB.  time division multiple access
C.  code division multiple accessD.  cell division multiple access


6.  Because of the limited frequencies available, a key design element of any cellular system is to ___________.
A.  use small cells

B.  employ multiple access
C.  limit the number of users at one time

D.  use as many frequencies as possible


7.  The Wireless Application Protocol (WAP) is:
A.  proprietary protocol developed in the USA for wireless security
B.  dependent on the specific network technologies employed
C.  an Internet standard that replaces HTML, HTTP, and XML
D.  designed to overcome many of the limitations hindering acceptance of  mobile data services

8.  Which of the following is NOT one of the components of the WAP specification?
A.   A framework for wireless telephony applications
B.   A full-featured communications protocol stack
C.   A programming model based on the WWW
D.   A markup language adhering to XML

9.  The WAP Programming Model uses a ________ that acts as a proxy server for the wireless domain.
A.  translatorB.  WAP server

C.  gatewayD.  decoder


10.   For a given system, multiple access is based on _______.

A.  TDMA B.  FDMA

C.  CDMAD.  all of the above


11. Important objectives of computer security include:

A.  confidentialityB.  integrity

C.  availabilityD.  all of the above

12.  One type of attack on the security of a computer system or network that impacts  the availability of a system (e.g. destruction of a resource in the system) is  referred to as ___________.

A.  incapacitationB.  interception

C.  modificationD.  all of the above

13.  The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A.  active attacks B.  passive attacks

C.  administrative attacksD.  none of the above



14. IPSec transport mode provides protection primarily for:

A.  the Internet layerB.  upper-layer protocols
C.  network and link-layer protocolsD.  all of the above

15. The higher-layer protocols defined as part of SSL include:

A.  handshake protocolB.  change cipher spec protocol

C.  alert protocolD.  all of the above

16. The WiFi standard known as Privacy with message integrity can be described as follows:

A.   a way of ensuring the privacy of the individual using WiFi
B.   a technique that ensures that the data transmitted using WiFi have not been altered

C.   a way of providing mutual authentication between a user and an AS

D.   none of the  above


17. A key logical component of an IDS is:

A.  sensorsB.  analyzers

C.  user interfaceD.  all of the  above


18. A stateful inspection firewall ________.

A.  applies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packet
B.  controls TCP traffic by creating a directory of outbound TCP connections

C.  acts as a relay of application-level traffic

D.  sets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host

19. Which of the following is not a central element of a typical antivirus scheme?

A.  detectionB.  identification

C.  removalD.  deterrence

20.   Which of the following is a higher-layer protocol defined as part of SSL?

A.  the Handshake ProtocolB.  the Change Cipher Spec Protocol

C.  the Alert ProtocolD.  all of the above



21.  The most complex part of SSL is the ___________ Protocol.

A.  HandshakeB.  Change Cipher Spec

C.  AlertD.  Record

22.   Which security area is addressed in IEEE 802.11i ?

A.  authenticationB.  key management

C.  data transfer privacyD. all of the above

23.    The 802.11i architecture consists of ________ main ingredients.

A.  oneB.  two

C. threeD.  four


24.The ________ is one of a number of major Internet interconnection points that serve to tie all the ISPs together.

A.  CPEB.  POP

C.  IXPD.  NSP


25.A ________ is a site that has a collection of telecommunications equipment and usually refers to ISP or telephone company sites.

A.  POPB.  NSP

C.  CPED.  IXP

26.  _________ are programs that extract information from name servers in response to client requests.

A.  Name serversB.  DNS

C.  ResolversD.  IP datagram

27.  The domain ________ is for network support centers, Internet service providers, and other network-related organizations.

A.  orgB.  info

C.  comD.  net

28. Transport PDUs are typically called ________.

A.  channelsB.  segments

C.  bridgesD.  frames

29. The ________ layer covers the physical interface between a data transmission device and a transmission medium or network.

A.  physicalB.  transport

C.  applicationD.  network

30. IP appends a header of control information to each segment to form            a(n) __________.

A.  IP datagramB.  end system

C.  checksumD.  port

31. The ________ supports a basic electronic mail facility by providing a mechanism for transferring messages among separate hosts.

A.  SNMPB.  SSH

C.  HTTPD.  SMTP

32. The _________ is used to send files from one system to another under user command.

A.  UDPB.  SMTP

C.  FTPD.  SSH

33.   The physical layer for IEEE 802.11 has been issued in _______ stages.

A.  3B.  5

C.  7D.  9

34.  Any entity that has station functionality and provides access to the distribution
       system via the wireless medium for associated stations.

A.  access pointB.  basic service set

C.  extended service setD.  coordination function



35.  Information that is delivered as a unit between MAC users.

A.  MPDUB.  ESS

C.  MSDUD.  DS

36. Data communications via circuit switching involves three phases:
A.  connect, transfer, hang-up

B.  ring, talk, hang-up
C.  dial, transfer, disconnect

D.  establishment, data transfer, disconnect

37.  A public telecommunications network can be described using four generic components:
A.  senders, receivers, lines, and nodes

B.  subscribers, local loops, exchanges, and trunks

C.  subscribers, trunks, nodes, and loops

D.  local loops, subscriber lines, exchanges, and trunks

38.  Which of the following is NOT one of classes of function for control signaling?
A.  establishmentB.  supervisory

C.  call informationD.  network management

39.  Which of the following is NOT one of the stated advantages of packet switching over circuit switching?
A.  there is less network delayB.  data rate conversion can be provided
C.  priorities can be usedD.  connections are never rejected

40.  Which of the following is NOT a reason for network jitter when using packet switching networks?
A.  packets may vary in length

B.  packets may take different paths through the network

C.  packets may encounter network congestion

D.  data rates will vary from one trunk line to the next

Part II. Essay questions – 5 questions, 60 points total
* (Please keep the full text of the question as part of your answer sheet.  You can use this file as a template. Type/Insert in your answers after each question. )
Q1:Describe the three models of cloud computing based on the NIST cloud computing reference architecture. List the advantages and disadvantages of each model.  (15 points)
Q2:What are the major network management functions? (10 points)
Q3:Describe DiffServ Code Point (DSCP) (10 points)
Q4:Describe the major Web application security issues and mitigation mechanisms. (10 points)

Q5: Describe the cellular mobile network and mobile device management functions. (15 points)

No comments:

Post a Comment