When portions of wireless transmissions reflect off objects, creating signal arrival at different times
What is multipath propogation?
100
Examples of possible wireless hosts (name at least two)
What are laptops, smartphones, desktop computer, tablets, etc.?
100
Voice over IP generally uses one of these two protocols
What are SIP or H.323 (RTP)
100
This is a method to ensure that a public key really comes from a trusted source.
What is public key certification through a certification authority (CA)?
100
A MAC address has 48 bits and is represented as six pairs of ______ digits, separated by ______
What are hexadecimal digits, separated by colons?
200
This protocol allows hosts to obtain an IP address automatically from the network
What is Dynamic Host Configuration Protocol (DHCP)?
200
A wireless base station can be either of these two things.
What are wireless access points or cell towers?
200
The process of creating a digital signal from sound.
What is sampling?
200
In this type of security breach, an attacker impersonates a trusted service in an attempt to obtain a user's private information.
What is Phishing?
200
This protocol allows network nodes to discsover which nodes have been configured with a specific layer 3 (IP) address.
What is address resolution protocol (ARP)?
300
___ is the method of storing and delaying playout of audio and video to compensate for network delay and jitter
What is buffering?
300
This wireless standard has a typical range of 10 - 30 m and bandwidth up to 450 Mbps
What is 802.11n
300
If a signal is sampled at 8,000 samples per second and each sample is represented by 8 bits (1 byte), how many bits per second bandwidth is required to transmit the signal?
What is 64 kbits / second?
300
This security mechanism at the network layer encrypts payload allowing for secure tunneling of network traffic between sites
What is IPSec?
300
Ethernet uses this multiple access protocol to allow for many devices using the same channel
What is CSMA / CD ? (Carrier Sense Multiple Access - Collision Detection)
400
A Web browser sends an _______ request by creating a socket through _____ transport protocol to request the Web page www.google.com
What is HTTP and TCP?
400
This wireless standard has a range of up to 20 km (12 miles) and average bandwidth of about 10 Mbps or more.
What is cellular 4G / LTE
400
Advanced Audio Coding (AAC) and MPEG 1 layer 3 (MP3) are examples of this type of protocol.
What are audio compression protocols?
400
This protocol allows for a per-connection encryption between two endpoints (e.g. Web browser and server).
What is secure socket layer (SSL)?
400
On Tuesday, April 18, this section of IST 220 will be held at_____
What is the Tower Road Data Center at the corner of University Drive and Tower Road? (And I will look at the posted schedule and be there by the time of my scheduled tour)
500
A tool that can be used to query the Domain Name System (DNS) locally or worldwide.
What is NSLOOKUP?
500
These three common issues prevent wireless signal transmission and reception.
What are signal strength, interference from other devices, and multipath propogation
500
The ____ transport layer protocol and ____ application layer protocol are used for real-time multi-media transmission
What are UDP (Transport) and Real-Time Protocol (RTP) (Application)
500
This well known security algorithm uses a combination of public and private keys.
What is the RSA algorithm?
500
The Ethernet (Link layer) DESTINATION for a frame that is headed out of the local network will have the MAC address of_______