Podcast
Questions and Answers
I recognize that using the internet (other than for converting numbers), friends, etc. is considered academic misconduct on this exam. I also recognize that discussing this exam with anyone constitutes academic misconduct.
I recognize that using the internet (other than for converting numbers), friends, etc. is considered academic misconduct on this exam. I also recognize that discussing this exam with anyone constitutes academic misconduct.
True
Most wireless networks implement collision detection algorithms.
Most wireless networks implement collision detection algorithms.
True
The IP v4 checksum is calculated across just the IP header and not the entire IP packet.
The IP v4 checksum is calculated across just the IP header and not the entire IP packet.
True
Brute Force and statistical analysis are two methods a hacker could use to break an encryption scheme.
Brute Force and statistical analysis are two methods a hacker could use to break an encryption scheme.
Signup and view all the answers
IPv6 is used more frequently than IPv4 in the internet today.
IPv6 is used more frequently than IPv4 in the internet today.
Signup and view all the answers
HTTP is a PULL model protocol
HTTP is a PULL model protocol
Signup and view all the answers
It is easier to do collision detection in a wireless network than it is in a wired network.
It is easier to do collision detection in a wireless network than it is in a wired network.
Signup and view all the answers
Congestion control only involves Hosts and never involves routers.
Congestion control only involves Hosts and never involves routers.
Signup and view all the answers
Which transport protocol worries about congestion control?
Which transport protocol worries about congestion control?
Signup and view all the answers
The TTL fields in the IP header and in the ARP cache both keep track of clock times.
The TTL fields in the IP header and in the ARP cache both keep track of clock times.
Signup and view all the answers
Code Division, Frequency Division, and Time Division are all protocols used to do channel partitioning.
Code Division, Frequency Division, and Time Division are all protocols used to do channel partitioning.
Signup and view all the answers
In general, wired networks are more prone to interference from external devices like microwaves and phones, than are wireless networks.
In general, wired networks are more prone to interference from external devices like microwaves and phones, than are wireless networks.
Signup and view all the answers
Flow control only involves hosts and never involves routers.
Flow control only involves hosts and never involves routers.
Signup and view all the answers
If your network provider offers you a 10Mbps connection to the internet, that means you will realize a speed 10Mbps to every website you access.
If your network provider offers you a 10Mbps connection to the internet, that means you will realize a speed 10Mbps to every website you access.
Signup and view all the answers
Which statement best describes the checksum in IPv6?
Which statement best describes the checksum in IPv6?
Signup and view all the answers
You MAC address changes when you move from one location to another (e.g, from home to school).
You MAC address changes when you move from one location to another (e.g, from home to school).
Signup and view all the answers
Switches are data link layer devices.
Switches are data link layer devices.
Signup and view all the answers
Your company is given a block of addresses of the form 18.1.8.64/26. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. First, answer how many bits will be in the new internal mask, then give the prefixes of the new networks in the form a.b.c.d for the four subnets?
Your company is given a block of addresses of the form 18.1.8.64/26. Suppose it wants to create four subnets from this block, with each block having the same number of IP addresses. First, answer how many bits will be in the new internal mask, then give the prefixes of the new networks in the form a.b.c.d for the four subnets?
Signup and view all the answers
Choose the best match for each term
Choose the best match for each term
Signup and view all the answers
Match the following.
Match the following.
Signup and view all the answers
Consider the Cyclic Redundancy Check (CRC). Suppose that the 4-bit generator (G) is 1001, that the data payload (D) is 10011100 and that r = 3. what is the value of r?
Consider the Cyclic Redundancy Check (CRC). Suppose that the 4-bit generator (G) is 1001, that the data payload (D) is 10011100 and that r = 3. what is the value of r?
Signup and view all the answers
Given the terminology used in class, and assuming symmetric keys (shared secret) below:
m -> "hello world"
assume KA and KB are Alice's and Bob's shared secret keys.
KB(KA(m))
Given the terminology used in class, and assuming symmetric keys (shared secret) below:
m -> "hello world"
assume KA and KB are Alice's and Bob's shared secret keys.
KB(KA(m))
Signup and view all the answers
All of the following are security methods, but which one of these was introduced in class to help avert Trudy from doing a playback attack?
All of the following are security methods, but which one of these was introduced in class to help avert Trudy from doing a playback attack?
Signup and view all the answers
When creating a digital signature, like in the diagram below, which key are you going to use to sign the message digest?
When creating a digital signature, like in the diagram below, which key are you going to use to sign the message digest?
Signup and view all the answers
Match these with the most complete description
Match these with the most complete description
Signup and view all the answers
Assume a node using CSMA/CD is transmitting a frame and has a collision. Further assume that the node choses a wait time of '3'. Recalling that the bit-wait time on ethernet is 512 bit times, how many MICRO seconds will the node wait on a 1Mbps ethernet (assume 1Mbps is 1,000,000 bits per second). Recall that 1 micro second is 1x10-6 seconds.
Assume a node using CSMA/CD is transmitting a frame and has a collision. Further assume that the node choses a wait time of '3'. Recalling that the bit-wait time on ethernet is 512 bit times, how many MICRO seconds will the node wait on a 1Mbps ethernet (assume 1Mbps is 1,000,000 bits per second). Recall that 1 micro second is 1x10-6 seconds.
Signup and view all the answers
Which of the following does SSL provide (there may be more than one)?
Which of the following does SSL provide (there may be more than one)?
Signup and view all the answers
In this diagram, match the following keys.
In this diagram, match the following keys.
Signup and view all the answers
In this diagram, assume the VLAN is configured such that ports 1,2, 4, 5,6,7, 8 are in the Electrical Engineering Department and ports 3, 9, 10, 11, 12, 13, 14, 15 are in the CS department. If a CS machines wants to send a message to a machine in the EE Department, what type of device is needed to make this happen?
In this diagram, assume the VLAN is configured such that ports 1,2, 4, 5,6,7, 8 are in the Electrical Engineering Department and ports 3, 9, 10, 11, 12, 13, 14, 15 are in the CS department. If a CS machines wants to send a message to a machine in the EE Department, what type of device is needed to make this happen?
Signup and view all the answers
During Mo's talk on security he discussed scanning several times. Which is these statements most reflects what he was conveying about scanning?
During Mo's talk on security he discussed scanning several times. Which is these statements most reflects what he was conveying about scanning?
Signup and view all the answers
Study Notes
Quiz Scores and Assignments
- Final Exam score: 81/106
- Multiple quiz scores ranging from 10/10 to 40/40
- Various graded assignments with different due dates
- Lecture Chapter 7 - Part 2 and Lecture Chapter 8 - Part 1 are not submitted
Exam Questions and Answers
- Question 1: Using the internet for non-numerical tasks and discussing the exam are considered academic misconduct. (True)
- Question 2: Most wireless networks use collision-detection algorithms. (False)
- Question 3: The IP v4 checksum is calculated only across the IP header, not the whole packet. (False)
- Question 4: Brute Force and statistical analysis are used by hackers to break encryption. (True)
- Question 5: IPv6 is used less often than IPv4 on the internet. (False)
- Question 6: HTTP is a pull-model protocol. (True)
- Question 7: Collision detection is easier in wireless networks than wired networks. (False)
- Question 8: Congestion control only involves hosts and not routers. (False)
- Question 9: TCP is the transport protocol concerned with congestion control. (True)
- Question 10: The TTL fields in the IP header and ARP cache track clock times. (False)
- Question 11: Code Division, Frequency Division, and Time Division are channel partitioning methods. (True)
- Question 12: Wired networks are more prone to interference from external devices (microwaves, phones) than wireless networks. (False)
- Question 13: Flow control only involves hosts, not routers. (False)
- Question 14: Internet connection speed is the same across all accessed websites. (False)
- Question 15: The IPv6 checksum is calculated only for the header. (False)
- Question 16: MAC addresses change when moving locations. (False)
- Question 17: Switches are data link layer devices.(True)
- Question 18: Subnet creation of the block 18.1.8.64/26 requires 28 bits in the internal subnet mask
- Question 19: BGP (Border Gateway Protocol) acts as the glue for the internet, the checksum is a method of error detection in TCP, UDP and IPv4, the data plane is responsible for moving the 'brains' of a router, the control plane is responsible for moving the 'brains' of a router, beacon frame type of frame, ARP is used for resolving physical layer addresses and Flow Control is a transport layer protocol. Digital signature is one of the cryptographic techniques.
- Question 20: There is no data address for the application layer and the data is a message, the transport layer's data units are packets and segments, the network layer's data unit is a datagram, the data link layer's data unit is a frame, The physical layer's unit of data is a bit stream.
- Question 21: The overhead percentage for a TCP segment and IP datagram is 10% .
- Question 22: The IP addresses 20.168.104.2 and 20.168.120.3 are not on the same subnet. (False)
- Question 23: IPv4 addresses: 32 bits, IPv6 addresses: 128 bits, MAC addresses: 48 bits
- Question 24: Decoding a bit from the given CDMA codes is not possible (n/a)
- Question 25: Self-learning switches can be connected. All nodes except A will send the ARP request
- Question 26: The RTS-CTS exchange in some wireless networks prevents collisions.(True)
- Question 27: In active-scanning mode, the base station sends beacon frames, making it active scanning mode.(False)
- Question 28: IP address remains the same in the same subnet .(True)
- Question 29: Wireless and mobile networking are not synonymous. (False)
- Question 30: 802.11 adapters can put the adapter to sleep until next beacon.(True)
- Question 31: The final values of row for A are 0, 6, 8, 8, 12
- Question 32: Values of row A are 0, 6, 8, 8, 12 in this time.
- Question 33: Values in row A are 0, 6, 8, 9, 15
- Question 34: The node visited next in step one of Dijkstra's algorithm is w.
- Question 35: The numerical value in the D(x) column in step one of Dijkstra's algorithm is 7.
- Question 36: A protocol defines the types of messages and their structure. The 4 key elements for communication on the internet are IP address, local DNS, di (presumably domain name and IP), the 5 OSI layers (Application, Transport, Network, Data Link, Physical).
- Question 37: The CRC value is 101.
- Question 38: Unable to determine the decryption output without knowing the keys.
- Question 39: A nonce (random number) helps to prevent playback attacks, thus, prevent Trudy.
- Question 40: The private key is used to sign the digest in a digital signature scheme.
- Question 41: Confidentiality - only the sender and intended recipient; Authentication - sender and recipient verify; Message Integrity - sender and recipient verify; Access and Availability - verify that service is accessible.
- Question 42: The node will wait 1,536 microseconds
- Question 43: SSL provides authentication, confidentiality, and integrity
- Question 44: Customer's public key is given by the customer and they use the customer's private key to sign it.
- Question 45: A router is needed.
- Question 46: Scanning is a constant process at multiple levels.
Network Devices and Concepts
- VLAN: Electrical Engineering and Computer Science departments use separate VLANs within the network.
- CSMA/CD: A node waits a predetermined amount of time and then re-attempts transmitting in order to avoid colliding in a network
- SSL: A protocol that secures communications by verifying the identity of the sender, recipients and keeps integrity of the information.
- ARP: A protocol for resolving physical layer addresses
- Router: A device needed to route network traffic between different networks.
- Switch (Networking): A device that connects devices on the same subnet.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.