Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

IFSM 370 Module 4 Quiz A

Computer Science Dec 13, 2020

IFSM 370 Module 4 Quiz

A. Telecommunications and Network Design Strategies

Question 1 (12.5 points)

 

Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

Question 1 options:

a) 

packet

b) 

segment

c) 

frame

d) 

datagram

Question 2 (12.5 points)

 

The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

Question 2 options:

a) 

switch

b) 

router

c) 

hub

d) 

repeater

Question 3 (12.5 points)

 

The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

Question 3 options:

a) 

application

b) 

end users

c) 

computer network interface card (NIC)

d) 

computer CPU

Question 4 (12.5 points)

 

TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

Question 4 options:

a) 

SYN, SYN-ACK, ACK

b) 

 SYN, SYN, ACK

c) 

SYN, ACK, RST

d) 

SYN, ACK, SYN

Question 5 (12.5 points)

 

Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

Question 5 options:

a) 

risk assessment

b) 

asset inventory

c) 

risk management

d) 

risk mitigation

Question 6 (12.5 points)

 

In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

Question 6 options:

a) 

warm site

b) 

hot site

c) 

mirror site

d) 

cold site

Question 7 (12.5 points)

 

In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

Question 7 options:

a) 

warm site

b) 

hot site

c) 

mirror site

d) 

cold site

Question 8 (12.5 points)

 

Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

Question 8 options:

a) 

worm

b) 

virus

c) 

Trojan horse

d) 

e-mail virus

Expert Solution

Question 1    

Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

a) 

packet

b) 

segment

c) 

frame

d) 

datagram

Question 2    

The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

a) 

switch

b) 

router

c) 

hub

d) 

repeater

Question 3    

The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

a) 

application

b) 

end users

c) 

computer network interface card (NIC)

d) 

computer CPU

Question 4    

TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

a) 

SYN, SYN-ACK, ACK

b) 

 SYN, SYN, ACK

c) 

SYN, ACK, RST

d) 

SYN, ACK, SYN

Question 5    

Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

a) 

risk assessment

b) 

asset inventory

c) 

risk management

d) 

risk mitigation

Question 6    

In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

a) 

warm site

b) 

hot site

c) 

mirror site

d) 

cold site

Question 7    

In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

a) 

warm site

b) 

hot site

c) 

mirror site

d) 

cold site

Question 8    

Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

a) 

worm

b) 

virus

c) 

Trojan horse

d) 

e-mail virus

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment