Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Telecommunications and Network Design Strategies

Question 1 : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

a)packet

b)segment

c)frame

d)datagram

Question 2 : The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

a)switch

b)router

c)hub

d)repeater

Question 3 : The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

a)application

b)end users

c)computer network interface card (NIC)

d)computer CPU

Question 4 : TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

a) SYN, SYN-ACK, ACK

b)SYN, SYN, ACK

c) SYN, ACK, RST

d) SYN, ACK, SYN

Question 5 : Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

a) risk assessment

b)asset inventory

c) risk management

d) risk mitigation

Question 6 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 7 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 8 : Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

a) worm

b)virus

c)Trojan horse

d) e-mail virus

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92065152
  • Price:- $20

Priced at Now at $20, Verified Solution

Have any Question?


Related Questions in Management Information System

Discussion 1 1why would someone shop on the internet buy an

Discussion 1: 1. Why would someone shop on the Internet? Buy an iPod? Eat at TGI Friday's frequently? 2. a. Why would someone else not make those purchases? 3. b. How would you choose one outlet, brand, or model over the ...

Assignmentaccording to kirk 2016 viewers need some

Assignment According to Kirk (2016), viewers need some assistance consuming visualizations. Annotations can be used to help explain certain features of a visualization. To aid viewers with understanding what the project ...

Assignment purpose the purpose of this assignment is to

Assignment Purpose: The purpose of this assignment is to explore exchange of heath information Assignment Description: Step One: Perform a web search and locate information about healthcare data interchange standards suc ...

Question suppose that in a divide and conquer algorithm we

Question : Suppose that, in a divide and conquer algorithm, we divide an instance of size n of a problem into 16 sub instances of size n/4 and the dividing takes O(1) time (you may ignore this step). Then we combine the ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Outlinesubmit a one page outline with your proposed term

Outline: Submit a one page outline with your proposed term paper title, thesis statement, and an outline of the subtopics you will cover in your paper. Term paper on a computer related crime which can be solved by using ...

Assignmentread the article provided here titled agile in

Assignment Read the article provided here titled "Agile in Practice - An Agile Success Story" and complete this case study assignment. Write a four to five (4-5) page paper in which you: Determine the key reasons why Del ...

Question what are some of the key factors to consider when

Question : What are some of the key factors to consider when gathering requirements for a network? What difficulties might you encounter in this process, and how might you mitigate the problems? Discuss some methods you ...

Protected assets please respond to the followingduring a

"Protected Assets" Please respond to the following: During a disaster certain assets must be protected, and for industrial companies, this is not only for the company but also for the surrounding community. Read the arti ...

Question in roughly 200 words -explain the relationship

Question : In roughly 200 words - Explain the relationship between vulnerability and threat in an information systems context, and discuss how to develop an IT security policy framework to reduce risk from threats and vu ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As