California State University - San Jose State University
Latest uploads at California State University - San Jose State University. Looking for notes at California State University - San Jose State University? We have lots of notes, study guides and study notes available for your school.
-
278
- 0
-
11
All courses for California State University - San Jose State University
Latest notes & summaries California State University - San Jose State University
1) A networked application requires a network to operate. 
Answer: TRUE 
Difficulty: Basic 
Question: 1a 
Objective: Explain core concepts in network applications and architectures. 
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge 
2) The way in which application layer functions are spread among computers to deliver service 
to users is called ________. 
A) distributed processing 
B) peer-to-peer computing 
C) client/server computing 
D) an application archi...
Chapter 5 Ethernet (802.3) Switched LANs 
1) A local area network operates ________. 
A) on a customer premises 
B) between customer premises 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 1 
Objective: Describe Ethernet terminology and standards. 
AACSB: Applying Information Technology 
2) Ethernet standards are specified at the ________ layer. 
A) physical 
B) Internet 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 2a 
Objective: De...
1) Wireless network standards operate at ________. 
A) the data link layer 
B) the Internet layer 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 1a 
Objective: Describe basic Wi-Fi technology and access points. 
AACSB: Applying Information Technology, Application of Knowledge 
2) ________ is a wireless network standard. 
A) OSI 
B) TCP/IP 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 1b 
Objective: Describe basic Wi-Fi technology and...
1) A local area network operates ________. 
A) on a customer premises 
B) between customer premises 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 1 
Objective: Describe Ethernet terminology and standards. 
AACSB: Applying Information Technology 
2) Ethernet standards are specified at the ________ layer. 
A) physical 
B) Internet 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 2a 
Objective: Describe Ethernet terminology and standards....
1) Wireless network standards operate at ________. 
A) the data link layer 
B) the Internet layer 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 1a 
Objective: Describe basic Wi-Fi technology and access points. 
AACSB: Applying Information Technology, Application of Knowledge 
2) ________ is a wireless network standard. 
A) OSI 
B) TCP/IP 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 1b 
Objective: Describe basic Wi-Fi technology and...
1) Nearly all public Wi-Fi hotspots encrypt your transmissions. 
Answer: FALSE 
Difficulty: Basic 
Question: 1a 
Objective: Explain 802.11i Wi-Fi security. 
AACSB: Applying Information Technology 
2) If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is 
________. 
A) still protected by a firewall 
B) still protected by encryption 
C) both A and B 
D) neither A nor B 
Answer: D 
Difficulty: Basic 
Question: 1d 
Objective: Explain 802.11i Wi-Fi security. ...
Business Data Networks and Security, 11e (Panko) 
Chapter 10 Carrier Wide Area Networks (WANs) 
1) A network that runs on the customer premises is a ________. 
A) LAN 
B) WAN 
C) both A and B 
D) neither A nor B 
Answer: A 
Difficulty: Basic 
Question: 1a 
Objective: Contrast LANs and WANs. 
AACSB: Applying Information Technology 
2) Which of the following receive rights of way for transmission beyond sites? 
A) corporations 
B) carriers 
C) both A and B 
D) neither A nor B 
Answer: B 
Difficult...
Business Data Networks and Security, 11e (Panko) 
Chapter 4 Network Security 
1) The Target attackers probably first broke into Target using the credentials of a(n) ________. 
A) low-level Target employee 
B) Target IT employee 
C) Target security employee 
D) employee in a firm outside Target 
Answer: D 
Difficulty: Basic 
Question: 1a 
Objective: Describe the threat environment. 
AACSB: Applying Information Technology 
2) How did the Target attackers obtain the stolen information? 
A) Directly...
1) Nearly all public Wi-Fi hotspots encrypt your transmissions. 
Answer: FALSE 
Difficulty: Basic 
Question: 1a 
Objective: Explain 802.11i Wi-Fi security. 
AACSB: Applying Information Technology 
2) If a drive-by hacker succeeds in connecting to an internal access point, the network traffic is 
________. 
A) still protected by a firewall 
B) still protected by encryption 
C) both A and B 
D) neither A nor B 
Answer: D 
Difficulty: Basic 
Question: 1d 
Objective: Explain 802.11i Wi-Fi security. ...
Business Data Networks and Security, 11e (Panko) Chapter 5 Ethernet (802.3) Switched LANs-with verified answers-2022-2023