Review Quiz Attempt Review3
Review Quiz Attempt Review3
Review Quiz Attempt Review3
Incorrect
Flag question
Question text
Select one:
a.
L-Band
b.
S-Band
c.
Big LEO
d.
GEO
Feedback
Question 2
Correct
Week 8 Page 1
Mark 1.00 out of 1.00
Flag question
Question text
A firewall is a set of components that stands between your network and the
Internet and acts as a gatekeeper, allowing in trusted friends and keeping
out known or suspected enemies?
Select one:
True
False
Feedback
Question 3
Incorrect
Flag question
Question text
Covers all the smart-grid technology in the home, behind the meter?
Select one:
a.
LAN
b.
WAN
c.
PAN
d.
HAN
Feedback
Question 4
Week 8 Page 2
Question 4
Incorrect
Flag question
Question text
Select one:
a.
3G
b.
4G
c.
1G
d.
Cellular Technology
Feedback
Question 5
Incorrect
Flag question
Question text
Sorts the arriving packets into different waiting lines based on one or more
criteria, such as priority or source identity?
Select one:
a.
Scheduler
b.
Week 8 Page 3
Classify, Queue, Scheduler (CQS)
c.
Classifier
d.
Feedback
Question 6
Incorrect
Flag question
Question text
Select one:
True
False
Feedback
Question 7
Incorrect
Flag question
Question text
Select one:
a.
RIP
Week 8 Page 4
RIP
b.
OSPF
c.
BGP
d.
AS
Feedback
Question 8
Incorrect
Flag question
Question text
There are two main router functions: .Forwarding or switching packets and
maintaining routing tables?
Select one:
True
False
Feedback
Question 9
Incorrect
Flag question
Question text
Select one:
Week 8 Page 5
a.
Discarded
b.
Retransmitted
c.
Stored
d.
Forwarded
Feedback
Question 10
Correct
Flag question
Question text
Weighted Fair Queuing occurs when all queues are set to an unequal
maximum size, so the flows with the highest traffic load will suffer packet
discards more often, allowing lower-traffic ones a fair share of capacity.
Select one:
True
False
Feedback
Question 11
Correct
Flag question
Question text
Week 8 Page 6
Question text
Select one:
a.
IAX
b.
CDMA
c.
H.323
d.
SIP
Feedback
Question 12
Incorrect
Flag question
Question text
Select one:
a.
Firewall
b.
Intrusion Detection
c.
VPN Switch
d.
Week 8 Page 7
d.
Router
Feedback
Question 13
Correct
Flag question
Question text
Select one:
a.
Go back
b.
c.
Selective Repeat
d.
Sliding window
Feedback
Question 14
Correct
Flag question
Question text
Select one:
Week 8 Page 8
Select one:
True
False
Feedback
Question 15
Incorrect
Flag question
Question text
Select one:
a.
Social media
b.
Data
c.
Voice
d.
Video
Feedback
Question 16
Incorrect
Flag question
Question text
Week 8 Page 9
Question text
Select one:
a.
b.
c.
d.
Feedback
The correct answer is: Timeouts when expected packet is not received
Question 17
Incorrect
Flag question
Question text
Select one:
a.
128 . 6 . 29 . 131
b.
c.
my.uopeople.org/
d.
Week 8 Page 10
192.168.1.1/24
Feedback
Question 18
Correct
Flag question
Question text
Select one:
True
False
Feedback
Question 19
Incorrect
Flag question
Question text
Routers handle incoming packets in four steps; which is not one of those
steps
Select one:
a.
Transmission of packets
b.
c.
Week 8 Page 11
c.
d.
Feedback
The correct answer is: Moving packets from output to input port
Question 20
Correct
Flag question
Question text
Switch contention occurs when several packets are crossing each other’s
path and the switch cannot support arbitrary set of transfers?
Select one:
True
False
Feedback
Question 21
Incorrect
Flag question
Question text
Select one:
a.
IP addresses
b.
Week 8 Page 12
Applications
c.
Protocols
d.
Port Numbers
Feedback
Question 22
Incorrect
Flag question
Question text
Select one:
True
False
Feedback
Question 23
Incorrect
Flag question
Question text
Which phase of the NIST system development life cycle the organization
configures and enables system security features, tests the functionality of
these features, installs or implements the system, and finally, obtains a
formal authorization to operate the system?
Select one:
Week 8 Page 13
a.
Disposal
b.
c.
d.
Implementation
Feedback
Question 24
Incorrect
Flag question
Question text
Select one:
True
False
Feedback
Question 25
Correct
Flag question
Question text
Week 8 Page 14
Cloud Security Control (DG-05) Data Governance - Secure Disposal means
Policies and procedures shall be established and mechanisms implemented
for the secure disposal and complete removal of data from all storage media,
ensuring data is not recoverable by any computer forensic means.
Select one:
True
False
Feedback
Question 26
Correct
Flag question
Question text
Select one:
True
False
Feedback
Question 27
Correct
Flag question
Question text
Select one:
a.
Centralized
Week 8 Page 15
Centralized
b.
Decentralized
c.
Star
d.
Distributed
Feedback
Question 28
Incorrect
Flag question
Question text
Select one:
a.
b.
c.
d.
Feedback
Question 29
Week 8 Page 16
Incorrect
Flag question
Question text
Select one:
a.
b.
c.
d.
Feedback
Question 30
Incorrect
Flag question
Question text
Select one:
a.
Physical
b.
Link
Week 8 Page 17
c.
End to end
d.
Network
Feedback
Question 31
Incorrect
Flag question
Question text
Select one:
a.
LTE
b.
GSM
c.
IEEE 802.16
d.
WiMAX
Feedback
Question 32
Incorrect
Flag question
Week 8 Page 18
Question text
Select one:
a.
Processing
b.
Transmission
c.
Propagation
d.
Routing
Feedback
Question 33
Incorrect
Flag question
Question text
Select one:
a.
b.
c.
d.
Week 8 Page 19
d.
Feedback
The correct answer is: Sources with unsatisfied demands obtain an unequal
share of the resource
Question 34
Incorrect
Flag question
Question text
Select one:
True
False
Feedback
Question 35
Correct
Flag question
Question text
Select one:
True
False
Feedback
Question 36
Week 8 Page 20
Question 36
Incorrect
Flag question
Question text
The FCC’s rules on Wireless Backhaul include all of the following except?
Select one:
a.
b.
c.
d.
Feedback
Question 37
Correct
Flag question
Question text
Select one:
True
False
Week 8 Page 21
False
Feedback
Question 38
Incorrect
Flag question
Question text
Select one:
a.
Dual Stack
b.
Masking
c.
Tunneling
d.
Feedback
Question 39
Incorrect
Flag question
Question text
Computer systems which monitor and control bulk power generation plants?
Select one:
a.
Week 8 Page 22
a.
Smart Grid
b.
Internet 2
c.
SCADA
d.
IPv6
Feedback
Question 40
Incorrect
Flag question
Question text
The property of a queue that decides which task is blocked from entering the
system or which packet is dropped for a full queue is not called?
Select one:
a.
Scheduling discipline
b.
Service discipline
c.
Queuing discipline
d.
Queue size
Feedback
Week 8 Page 23
Question 41
Incorrect
Flag question
Question text
Who owns the spectrum used for Wireless Broadband Services in the United
States
Select one:
a.
FCC
b.
Citizens
c.
NTIA
d.
The President
Feedback
Question 42
Incorrect
Flag question
Question text
Select one:
a.
Packet size
Week 8 Page 24
Packet size
b.
c.
Segment size
d.
Burst speed
Feedback
Question 43
Incorrect
Flag question
Question text
Select one:
True
False
Feedback
Question 44
Correct
Flag question
Question text
The IPv6 Hop-by-Hop Options header carries optional information for the
routers that will be visited and must not be examined by every node along a
Week 8 Page 25
routers that will be visited and must not be examined by every node along a
packet’s delivery path?
Select one:
True
False
Feedback
Question 45
Correct
Flag question
Question text
Select one:
a.
1.544 Mbps
b.
T1
c.
2.048 Mbps
d.
1 Mbps
Feedback
Question 46
Correct
Flag question
Week 8 Page 26
Question text
Select one:
True
False
Feedback
Question 47
Correct
Flag question
Question text
Select one:
a.
Input Port
b.
Management Port
c.
Output Port
d.
Network Port
Feedback
Question 48
Incorrect
Week 8 Page 27
Flag question
Question text
Select one:
True
False
Feedback
Question 49
Correct
Flag question
Question text
Select one:
a.
Predefined
b.
Dynamically
c.
Traffic analysis
d.
QoS
Feedback
Question 50
Week 8 Page 28
Correct
Flag question
Question text
Packets from higher layers become nested inside the packets of higher
layers as they are passed down the protocol stack
Select one:
True
False
Feedback
Question 51
Incorrect
Flag question
Question text
Broadcast links allow connecting multiple network nodes via the same link.
Hence, when one node transmits, all or most other nodes on the link can
hear the transmission. If two or more nodes are transmitting simultaneously,
their signals will interfere with each other, which technique will NOT avoid
this situation?
Select one:
a.
Timed transmissions
b.
c.
Statistical Multiplexing
d.
Week 8 Page 29
Retransmission of corrupted information
Feedback
Question 52
Incorrect
Flag question
Question text
Select one:
a.
RIP
b.
OSPF
c.
BGP
d.
AS
Feedback
Question 53
Incorrect
Flag question
Question text
Select one:
Week 8 Page 30
a.
Smart Cards
b.
Secure ID
c.
Password Protection
d.
Network backdoors
Feedback
Question 54
Correct
Flag question
Question text
Select one:
True
False
Feedback
Question 55
Correct
Flag question
Question text
Week 8 Page 31
FISMA assigns this official the duty of Developing and maintaining an
agency-wide information security program ?
Select one:
a.
b.
c.
d.
Feedback
Question 56
Incorrect
Flag question
Question text
Select one:
a.
RIP
b.
OSPF
c.
BGP
d.
AS
Week 8 Page 32
Feedback
Question 57
Correct
Flag question
Question text
Select one:
True
False
Feedback
Question 58
Incorrect
Flag question
Question text
Voice over IP (VoIP) is an umbrella term used for all forms of circuit
switched voice?
Select one:
True
False
Feedback
Question 59
Incorrect
Week 8 Page 33
Incorrect
Flag question
Question text
Select one:
True
False
Feedback
Question 60
Correct
Flag question
Question text
Which phase of the NIST four-phase life cycle management approach for
interconnecting systems is the request to interconnect systems accepted or
rejected by the system owners?
Select one:
a.
b.
c.
d.
Feedback
Week 8 Page 34
Feedback
Finish review
Week 8 Page 35