Podcast
Questions and Answers
Which of the following is a PAN?
Which of the following is a PAN?
- Zigbee (correct)
- 1G
- 2G
- WIFI
A class 3 bluetooth can reach a distance of 100 meters.
A class 3 bluetooth can reach a distance of 100 meters.
False (B)
Bluetooth Low Energy is also known as WiBree.
Bluetooth Low Energy is also known as WiBree.
True (A)
The standard for Zigbee is
The standard for Zigbee is
Advanced Mobile Telephone Systems (AMTS) was used in the 1st generation of Mobile Network Technologies.
Advanced Mobile Telephone Systems (AMTS) was used in the 1st generation of Mobile Network Technologies.
The main drawback of the 1G Mobile Network Technologies is interoperability with different countries.
The main drawback of the 1G Mobile Network Technologies is interoperability with different countries.
A Mobile Network technology that uses TDMA to multiplex up to 8 calls per channel in the 900 and 1800 MHz bands.
A Mobile Network technology that uses TDMA to multiplex up to 8 calls per channel in the 900 and 1800 MHz bands.
It enables cellular network operators to provide internet access, instant messaging and multimedia messaging using second generation of Mobile Networks
It enables cellular network operators to provide internet access, instant messaging and multimedia messaging using second generation of Mobile Networks
HSDPA Is a 3G packet based data service in W CDMA downlink with data transmission up to 8 10 Mbit/s over a 5 MHz bandwidth in WCDMA downlink.
HSDPA Is a 3G packet based data service in W CDMA downlink with data transmission up to 8 10 Mbit/s over a 5 MHz bandwidth in WCDMA downlink.
4G uses network wide based IP based packet switching
4G uses network wide based IP based packet switching
____ Is a type of malware that takes control over a device without user knowedge.
____ Is a type of malware that takes control over a device without user knowedge.
____ is a technique to improve a malicious website's ranking through increasing traffic, to the malicious website.
____ is a technique to improve a malicious website's ranking through increasing traffic, to the malicious website.
Which of the following is a good practice to protect devices and networks?
Which of the following is a good practice to protect devices and networks?
____ is a type of firewall that hides private addresses of hosts in a local area network.
____ is a type of firewall that hides private addresses of hosts in a local area network.
_____ is a type of hacker that tests systems with permission in order to identify system vulnerabilities.
_____ is a type of hacker that tests systems with permission in order to identify system vulnerabilities.
_____ is a type of hacker that compromises systems without permission.
_____ is a type of hacker that compromises systems without permission.
When using port scanners, a port will be shown as If there is no reply from the host.
When using port scanners, a port will be shown as If there is no reply from the host.
___ is a stage in the cyber defense kill chain where attacker gains remote access to the equipment.
___ is a stage in the cyber defense kill chain where attacker gains remote access to the equipment.
It has the ability to block traffic based on a positive rule or signature match
It has the ability to block traffic based on a positive rule or signature match
An open standard protocol that allows an end user's credentials to access third party applications without exposing the user's password
An open standard protocol that allows an end user's credentials to access third party applications without exposing the user's password
Which of the following is true about CDM?
Which of the following is true about CDM?
_______ is a method that transmits digital information which are cut into smaller pieces of information that may take different routes.
_______ is a method that transmits digital information which are cut into smaller pieces of information that may take different routes.
________ is a packet switching approach wherein each packet takes different routes and is routed depending on the identifiers in the packet.
________ is a packet switching approach wherein each packet takes different routes and is routed depending on the identifiers in the packet.
In circult switching, _______ is a method wherein paths are separated spatially and requires interconnection in a grid to complete the end-to end physical link.
In circult switching, _______ is a method wherein paths are separated spatially and requires interconnection in a grid to complete the end-to end physical link.
In circuit switching, ______ is a method wherein a path between an output and input is managed by a control unit depending on the allotted time slot.
In circuit switching, ______ is a method wherein a path between an output and input is managed by a control unit depending on the allotted time slot.
Which of the following is an example of a copper guided transmission medium?
Which of the following is an example of a copper guided transmission medium?
Which of the following is used to transmit electrical signals?
Which of the following is used to transmit electrical signals?
Which of the following is used to transmit radio waves?
Which of the following is used to transmit radio waves?
Which of the cables was used for 10Base2 Ethernet?
Which of the cables was used for 10Base2 Ethernet?
Which of the cables was used for 10Base5 Ethernet?
Which of the cables was used for 10Base5 Ethernet?
________ is a frame relay field used to inform the destination when there is congestion.
________ is a frame relay field used to inform the destination when there is congestion.
Which of the following is true about ATM technology?
Which of the following is true about ATM technology?
Which of the following is true about ISDN?
Which of the following is true about ISDN?
refers to one of the addresses in an ATM cell that indicates the channel number in the current path.
refers to one of the addresses in an ATM cell that indicates the channel number in the current path.
Which of the following ISDN channels is used for voice and data only?
Which of the following ISDN channels is used for voice and data only?
What is the data rate of 1 DSO channel?
What is the data rate of 1 DSO channel?
_______ is a frame relay field that serves as the address of the frame relay connection.
_______ is a frame relay field that serves as the address of the frame relay connection.
Which type of equalization is used in leased lines that automatically adjusts the frequency response?
Which type of equalization is used in leased lines that automatically adjusts the frequency response?
What is the data rate of EO line?
What is the data rate of EO line?
A satellite has an orbital period that is the same as the rotation rate of the Earth.
A satellite has an orbital period that is the same as the rotation rate of the Earth.
______ is the is a European Standards Organization which is a recognized regional standards body dealing with telecommunications, broadcasting and other electronic communications networks and services. (acronym)
______ is the is a European Standards Organization which is a recognized regional standards body dealing with telecommunications, broadcasting and other electronic communications networks and services. (acronym)
IETF is a technical advisory group of the Internet Society which oversees the architecture and procedures used in Internet.
IETF is a technical advisory group of the Internet Society which oversees the architecture and procedures used in Internet.
______ are documents maintained by lETF containing information about internet Protocols. (acronym)
______ are documents maintained by lETF containing information about internet Protocols. (acronym)
An organization that promotes long term research of importance to the evolution of the future internet.
An organization that promotes long term research of importance to the evolution of the future internet.
It is non treaty organization whose membership is comprised mainly of standards organizations of various countries and responsible for Open Systems
Interconnect OST model.
It is non treaty organization whose membership is comprised mainly of standards organizations of various countries and responsible for Open Systems Interconnect OST model.
It is the United Nations specialized agency for information and communication technologies ICTs
It is the United Nations specialized agency for information and communication technologies ICTs
An ITU series of standards that covers the global information infrastructure, Internet protocol aspects, next generation networks, Internet of Things and smart cities.
An ITU series of standards that covers the global information infrastructure, Internet protocol aspects, next generation networks, Internet of Things and smart cities.
In Ethernet, it is an alternating pattern of ones and zeros that tells receiving stations that a frame is coming, and that provides a means to synchronize the frame reception portions of receiving physical layers with the incoming bit stream.
In Ethernet, it is an alternating pattern of ones and zeros that tells receiving stations that a frame is coming, and that provides a means to synchronize the frame reception portions of receiving physical layers with the incoming bit stream.
How many bytes are allocated for the Ethernet address?
How many bytes are allocated for the Ethernet address?
VEEE 802.15.1 is the equivalent standard for Bluetooth.
VEEE 802.15.1 is the equivalent standard for Bluetooth.
Flashcards
Capital of France (example flashcard)
Capital of France (example flashcard)
Paris