Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

1. Standard voice telephone lines, such as those found in residences, limit bandwidth to:

A. 300 Hz B. 3,400 Hz
C. 8,000 Hz D. 20,000 Hz

2. When using data communications with 8-bit codes, the number of alphabetic symbols

A. must be greater than 256 B. must be 256 or greater than 256

C. must be fewer than 256 D. must be 256 or fewer than 256

3. A(n) __________ looks for user behavior that differs from that expected from a legitimate user.

A. ACK B. IDS

C. SSL D. TLS

4. Historically, the most commonly used text code is the _________, in which each character I this code is represented by a unique 7-bit pattern.

A. UTF-8 B. IRA

C. Morse code D. none of the above

 

5. __________ is a monitored behavior

  • a Attempts to open, view, delete, and/or modify files
  •   b Attempts to format disk drives and other unrecoverable disk operations
  • c Modification to the logic of executable files or macros
  • d All of the above

 

6. Which of the following describes class B networks?

a Many networks, each with a few hosts

b Medium number of networks, each with a medium number of hosts

c Few networks, each with many hosts

d A network dedicated to multicast applications

 

7. The IP address is assigned to a network interface on a host when ________.

A. the OS boots up B. the PC connects to the Internet

C. an application is run D. the user requests one

 

8. A practical application for multicasting is:

A. teleconferencing B. multimedia

C. database D. all of the above

9. One type of attack on the security of a computer system or network that impacts the availability of a system (e.g. destruction of a resource in the system) is referred to as ___________.

A. interruption B. interception

C. modification D. all of the above

10. The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A. active attacks B. passive attacks

C. administrative attacks D. none of the above

11. Which of the following is not an example of intrusion:

a guessing and cracking passwords

b running a packet sniffer on a workstation to capture user names and passwords

c using an unattended, logged-in workstation without permission

d all of the above are examples of intrusion

 

12. A virus can be attached to a program by _________.

a prepending

b postpending

c embedding other than at the beginning or end

d all of the above

13. Which of the following statements regarding macro viruses is true?

a macro virus is platform independent

b macro viruses infect documents, not executable portions of code

c macro viruses are easily spread

d all of the above

14. Which of the following is a type of scanning strategy?

A. hit list B. topological

C. local subnet D. all of the above

15. The WiFi standard known as Privacy with message integrity can be described as follows:

a way of ensuring the privacy of the individual using WiFi

  b technique that ensures that the data transmitted using WiFi have not been altered

  c way of providing mutual authentication between a user and an AS

d none of the above

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91376308
  • Price:- $30

Guranteed 24 Hours Delivery, In Price:- $30

Have any Question?


Related Questions in Computer Engineering

Solve the question given belowwhat is the relative market

Solve the question given below What is the relative market share for the top three cell phone service providers in the united states? The response must be typed, single spaced, must be in times new roman font (size 12) a ...

Carbonated drinks like cola tonic water and club soda are

Carbonated drinks like cola, tonic water and club soda are pleasantly bubbly due to the following decomposition of carbonic acid: H2CO3(aq) → H2O(l) + CO2(g) If a sample of H2CO3 decomposes over water at 50°C, 0.23 L of ...

Suppose circle is a class derived from the class point now

Suppose, Circle is a class derived from the class Point. Now consider the following statements: Point p[] = new Point[12]; P[0] = new Circle(); Now suppose Circle has a method Area() computing are of a circle, and Point ...

Any help will be appreciatedscenarionbspyou are a

Any help will be appreciated Scenario: You are a networking and communications consultant working for HoustonComm Services, Inc, further referred to as HCS. HCS is a company providing technology consulting services to st ...

Question pick a topic relevant to the information we have

Question: Pick a topic relevant to the information we have covered to date, including this week. It can cover information in Chapters 1,2,3, and 9, or any of the articles presented in the readings area. The format of you ...

Questions 1 for the set of 1 4 5 16 17 21 of keys draw

Questions: 1. For the set of {1, 4, 5, 16, 17, 21} of keys, draw binary search trees of heights 2, 3, 4, 5, and 6. 2. Use the Binary Search Tree class to Write the TREE-PREDECESSOR procedure. 3. Show that there are at mo ...

1 market equilibrium and deadweight lossa suppose that the

1. Market Equilibrium and Deadweight Loss a) Suppose that the supply and demand for apples are as follows: QD = 100 - 3P QS = 50 + 2P The government now levies a $5 per unit tax on producers. Draw the supply and demand c ...

Two contract offers are made to you the first contract

Two contract offers are made to you. The first contract offers $10,000 at the end of each year for the next five years and then $20,000 per year for the following 10 years. The second offer pays 10 payments, starting wit ...

In a random sample of 100 male students 80 reported that

In a random sample of 100 male students, 80 reported that they were in favour of writing announced tests, while in a sample of 50 female students 23 favoured writing announced tests. Let the male students be population 1 ...

The following is historical data on the us dollar -

The following is historical data on the U.S. dollar - Canadian dollar exchange rate: Date U.S./Canadian  Canadian/U.S. 1/20/2016 0.68 1.46 9/6/2018 0.76 1.32 Calculate the percentage change in the exchange rate over this ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As