Tough Questions 191-200

  1. Which of the following is least resistant to EMI?
     
    (a) Thinnet
    (b) UTP
    (c) STP
    (d) Fibre
     
    Answer:
    (b)
     
  2. Which networking technology is based on the 802.3 standard?
     
    (a) Ethernet
    (b) Token Ring
    (c) FDDI
    (d) HDLC
     
    Answer:
    (a)
     
  3. What is both a benefit and a potentially harmful implication of multi-layer protocols?
     
    (a) Throughput
    (b) Encapsulation
    (c) Hash integrity checking
    (d) Logical addressing
     
    Answer:
    (b)
     
  4. By examining the source & destination addresses, the application usage, the source of origin and the relationship between current packets with previous packets of the same session, __________ firewalls are able to grant a broader range of access for authorised users and activities, and actively watch for and block unauthorised users & activities.
     
    (a) Static packet-filtering
    (b) Application-level gateway
    (c) Stateful inspection
    (d) Circuit-level gateway
     
    Answer:
    (c)
     
  5. Which wireless frequency access method offers the greatest throughput with the least interference?
     
    (a) FHSS
    (b) DSSS
    (c) OFDM
    (d) OSPF
     
    Answer:
    (c)
     
    Explanation:
    Orthogonal frequency-division multiplexing (OFDM) offers the greatest throughput with the least interference. Frequency hopping spread spectrum (FHSS) and direct sequence spread spectrum (DSSS) are other wireless frequency access methods; OSPF is a routing method.
     
  6. What function does ARP perform?
     
    (a) It is a routing protocol
    (b) It resolves IP addresses into MAC addresses
    (c) It resolves physical addresses into logical addresses
    (d) It manages multiplex streaming
     
    Answer:
    (b)
     
    Explanation:
    ARP resolves IP addresses into MAC addresses (i.e. logical addresses into physical addresses.)
     
  7. _______ firewalls are known as third-generation firewalls

    (a) Application-level gateway
    (b) Stateful inspection
    (c) Circuit-level gateway
    (d) Static packet-filtering
     
    Answer:
    (b)
     
  8. STRIDE is often used in relation to assessing threats against applications or operating systems. Which of the following is not an element of STRIDE?
     
    (a) Spoofing
    (b) Elevation of privilege
    (c) Repudiation
    (d) Disclosure
     
    Answer:
    (d)
     
    Explanation:
    The D in STRIDE stands for “Denial of Service”. “Information Disclosure” is the I.
     
  9. At which layer of the OSI model does a router operate?
     
    (a) Network layer
    (b) Layer 1
    (c) Transport layer
    (d) Layer 5
     
    Answer:
    (a)
     
    Explanation:
    Routers operate at the Network layer (Layer 3) of the OSI model.
     
  10. At what layer of the Capability Maturity Model for Software (SW-CMM) are quantitative measures utilised to gain a detailed understanding of the software development process?
     
    (a) Repeatable
    (b) Defined
    (c) Managed
    (d) Optimising
     
    Answer:
    (c)

Leave a comment

Design a site like this with WordPress.com
Get started