ITEC 626 University of Maryland University College Part I.

ITEC 626University of Maryland University CollegePart I. Multiple-choice questions – 40 questions, 1 point eachFor each question, choose the single best alternative and select the letter corresponding to your answer choice. 1. Prior to cellular radio, mobile radio and telephone services required:A.ÿa high-power transmitter/receiverB.ÿmultiple transmitters/receiversC.ÿonly one or two dedicated channelsD.ÿthat many channels be used, which exceed the frequency capacity2.ÿWhen using cellular networks,ÿ__________.A.ÿa single base station can serve multiple cellsB.ÿadjacent cells must use the same frequenciesC.ÿadjacent cells are assigned different frequenciesD.ÿnon-adjacent cells are assigned different frequencies3.ÿThe ideal design for cells in a cellular network is a hexagonal shape because _____.A.ÿthis makes enforcement of shapes easierB.ÿthis is the easiest to implementC.ÿthis makes all frequencies available to all cellsD.ÿthis makes the distance to all adjacent cells the same4.ÿWhen a mobile unit moves, it may connect with a different base station. This ÿaction is called ____________.A.ÿa handoffÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿa transferC.ÿa reconfigurationÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿa dropped signal5.ÿWhich of the following is NOT one of the ways that frequency spectrum can beÿdivided among active users?A.ÿfrequency division multiple accessÿÿÿÿÿÿÿÿÿÿB.ÿtime division multiple accessC.ÿcode division multiple accessÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿcell division multiple access6.ÿBecause of the limited frequencies available, a key design element of any cellular system is to ___________.A.ÿuse small cellsÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿemploy multiple accessC.ÿlimit the number of users at one timeÿÿÿÿÿÿÿD.ÿuse as many frequencies as possible7.ÿThe Wireless Application Protocol (WAP) is:A.ÿproprietary protocol developed in the USA for wireless securityB.ÿdependent on the specific network technologies employedC.ÿan Internet standard that replaces HTML, HTTP, and XMLD.ÿdesigned to overcome many of the limitations hindering acceptance ofÿmobile data services8.ÿWhich of the following is NOT one of the components of the WAP specification?A.ÿÿA framework for wireless telephony applicationsB.ÿÿA full-featured communications protocol stackC.ÿÿA programming model based on the WWWD.ÿÿA markup language adhering to XML9.ÿThe WAP Programming Model uses a ________ that acts as a proxy server for the wireless domain.A.ÿtranslatorÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿWAP serverC.ÿgatewayÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿdecoder10.ÿÿFor a given system, multiple access is based on _______.A.ÿTDMA ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿFDMAC.ÿCDMAÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿall of the above11.ÿImportant objectives of computer security include:ÿÿÿÿÿÿÿÿÿÿÿA.ÿconfidentialityÿÿÿB.ÿintegrityC.ÿavailabilityÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿall of the above12.ÿOne type of attack on the security of a computer system or network that impactsÿthe availability of a system (e.g. destruction of a resource in the system) isÿreferred to as ___________.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿincapacitationÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿinterceptionC.ÿmodificationÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿall of the above13.ÿThe type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿactive attacks ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿpassive attacksC.ÿadministrative attacksÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿnone of the above14. IPSec transport mode provides protection primarily for:A.ÿthe Internet layerÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿupper-layer protocolsC.ÿnetwork and link-layer protocolsÿD.ÿall of the above15.ÿA secret entry point into a program that allows intruders aware of the breached area to ÿÿÿÿÿÿÿgain access and bypass the usual security access procedures is called a:ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿlogic bombÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿTrojan horseC.ÿvirus ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿnone of the above16. The WiFi standard known as Privacy with message integrity can be described as follows: A.ÿÿa way of ensuring the privacy of the individual using WiFiB.ÿÿa technique that ensures that the data transmitted using WiFi have not been alteredC.ÿÿa way of providing mutual authentication between a user and an ASD.ÿÿnone of theÿabove17.ÿA key logical component of an IDS is: A.ÿsensorsÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿanalyzersC.ÿuser interfaceÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿall of theÿabove18.ÿÿA stateful inspection firewall ________.A.ÿapplies a set of rules to each incoming and outgoing IP packet and then forwards or discards the packetB.ÿcontrols TCP traffic by creating a directory of outbound TCP connectionsC.ÿacts as a relay of application-level trafficD.ÿsets up two TCP connections, one between itself and a TCP user on an inner host and one between itself and a TCP user on an outside host19.ÿWhich of the following is not a central element of a typical antivirus scheme?A.ÿdetectionÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB. ÿidentificationC.ÿremovalÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿdeterrence20.ÿÿWhich of the following is a higher-layer protocol defined as part of SSL? A.ÿthe Handshake ProtocolÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿthe Change Cipher Spec Protocol C.ÿthe Alert ProtocolÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿall of the above21.ÿThe most complex part of SSL is the ___________ Protocol.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿHandshakeÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿChange Cipher SpecÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿAlertÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿRecord22.ÿÿWhich security area is addressed in IEEE 802.11i ?A.ÿauthenticationÿÿÿÿÿÿÿÿÿÿÿÿB.ÿkey managementC.ÿdata transfer privacyÿÿD. all of the above23.ÿÿÿThe 802.11i architecture consists of ________ main ingredients.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿoneÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿtwoÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC. threeÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿfour24. The ________ is one of a number of major Internet interconnection points that serve to tie all the ISPs together.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿCPEÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿPOPÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿIXPÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿNSP25. A ________ is a site that has a collection of telecommunications equipment and usually refers to ISP or telephone company sites.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿPOPÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿNSPÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿCPEÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿIXP26.ÿ_________ are programs that extract information from name servers in response to client requests.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿName serversÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿDNSÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿResolversÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿIP datagram27.ÿThe domain ________ is for network support centers, Internet service providers, and other network-related organizations.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿorgÿÿÿÿÿÿÿÿÿÿÿÿB.ÿinfoÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿcomÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿnet28.ÿTransport PDUs are typically called ________.A.ÿchannelsÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿsegmentsC.ÿbridgesÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿframes29.ÿThe ________ layer covers the physical interface between a data transmission device and a transmission medium or network.A.ÿphysicalÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿtransportC.ÿapplicationÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿnetwork30.ÿIP appends a header of control information to each segment to formÿÿÿÿÿÿÿÿÿÿÿa(n) __________.A.ÿIP datagramÿÿÿÿB.ÿend systemC.ÿchecksumÿÿÿÿÿÿÿÿD.ÿport31.ÿThe ________ supports a basic electronic mail facility by providing a mechanism for transferring messages among separate hosts.A.ÿSNMPÿÿÿÿÿÿÿÿÿÿÿÿB.ÿSSHC.ÿHTTPÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿSMTP32.ÿThe _________ is used to send files from one system to another under user command.A.ÿUDPÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿSMTPC.ÿFTPÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿSSH33.ÿÿThe physical layer for IEEE 802.11 has been issued in _______ stages.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿ3ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿ5ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿ7ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿ934.ÿAny entity that has station functionality and provides access to the distributionÿÿÿÿÿÿÿsystem via the wireless medium for associated stations.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA. ÿaccess pointÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿbasic service setÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿextended service setÿÿÿÿÿÿÿÿÿÿD.ÿcoordination function35.ÿInformation that is delivered as a unit between MAC users.ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿA.ÿMPDUÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿESSÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿC.ÿMSDUÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿDS36. Data communications via circuit switching involves three phases:A.ÿconnect, transfer, hang-upÿÿÿÿÿÿB.ÿring, talk, hang-upC.ÿdial, transfer, disconnectÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿestablishment, data transfer, disconnect37.ÿA public telecommunications network can be described using four generic components:A.ÿsenders, receivers, lines, and nodes B.ÿsubscribers, local loops, exchanges, and trunks C.ÿsubscribers, trunks, nodes, and loops D.ÿlocal loops, subscriber lines, exchanges, and trunks38.ÿWhich of the following is NOT one of classes of function for control signaling?A.ÿestablishmentÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿB.ÿsupervisory C.ÿcall informationÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿnetwork management39.ÿWhich of the following is NOT one of the stated advantages of packet switching over circuit switching?A.ÿthere is less network delayÿÿÿÿB.ÿdata rate conversion can be providedC.ÿpriorities can be usedÿÿÿÿÿÿÿÿÿÿÿÿÿÿD.ÿconnections are never rejected40.ÿWhich of the following is NOT a reason for network jitter when using packet switching networks?A.ÿpackets may vary in lengthÿÿÿÿÿÿÿÿÿÿB.ÿpackets may take different paths through the network C.ÿpackets may encounter network congestion D.ÿdata rates will vary from one trunk line to the nextPart II. Essay questions -*ÿÿÿÿÿ(Please keep the full text of the question as part of your answer sheet.ÿYou can use this file as a template. ÿInsert in your answers after each question. You may, if you wish, start each question on a new page.)Q1:ÿÿDescribe the three models of cloud computing based on the NIST cloud computing reference architecture. List the advantages and disadvantages of each model.ÿ(15 points)Q2:ÿÿWhat are the major network management functions? (10 points)Q3:ÿÿDescribe DiffServ Code Point (DSCP) (10 points)Q4:ÿÿDescribe the major Web application security issues and mitigation mechanisms. (10 points)Q5: ÿDescribe the cellular mobile network and mobile device management functions. (15 points)