Skip to content

QuestionAnswered step-by-stepImage transcription text5. Conf

Do you have a similar question? Our professional writers have done a similar paper in past. Give Us your instructions and wait for a professional assignment!        

QuestionAnswered step-by-stepImage transcription text5. Configure Default Routing on the Edge Routers: RouterOand Router2. Configure Static Routing on Router1? Typedown below in the space the required configu… Show moreA) 802.11 bB) BluetoothC) Wireless-ND) 4G/LTE3.Wireless network securityA) relies on ARP – the Airway Recryption ProtocolB) should not rely on WEP – the Wired Equivalence ProtocolC) is not needed in a point-to-point wireless link because no one else can receive the radio signalD) is impossible because the data is transmitted through the air and anyone can capture those signals4.The AES ProtocolA) uses a 64 bit block size and two 56 bit keys, encrypting with key 1, decrypting with key 2, and encrypting with key 1 againB) processes data in 128 bit blocks and can use a 128, 192 or 256 bit keysC) uses a a random order of the ASCII table to encrypt the dataD) uses two keys, one for encryption and the other for decryption5.Confidentiality isA) that messages cannot be modified without detectionB) that messages can be communicated at any time when desired by the sender and receiverC) the sending and receiving of messages securely, so that only the sender and receiver can understand the contents of their messagesD) that messages can only be sent anonymously between senders and receivers6.Conversational audio and videoA) relies on the network to be able to deliver the data with high latency and variable network delayB) must overcome variable network delay and latencyC) should deliver network data with more than a 1000 ms delayD) can overcome any network delivery issues with sufficient buffering7.If Bob and Alice use symmetric key encryption, they needA) one key that they both use for both encryption and decryptionB) two keys – one for encryption and one for decryptionC) four keys – two for Bob and two for AliceD) three keys – one each for Bob, Alice and Trudy8.The IPSec protocol secures data by adding encryptionA) at the network layerB) between the application and transport layersC) at the data link layerD) at the physical layer9.If Bob and Alice use public-key encryption, they needA) one key that they both use for both encryption and decryptionB) two keys – one for encryption and one for decryptionC) three keys – one each for Bob, Alice and TrudyD) four keys – two for Bob and two for Alice10.In terms of network management, MIB isA) the men in black, otherwise known as network administrators who must always wear sunglasses so that the blinking lights of switches and routers don’t cause them to forget the OSI data modelB) a distributed store/database of network management dataC) the data definition langauge for network management dataD) the protocol for communicating network management data between managed devices and managing entities11.Streaming stored audio and videoA) requires that network delays do not exceed 400 msB) overcomes many network related issues by relying on the inherent re-transmission capability in UDPC) can be stored on different servers at different bitrates to meet the needs of usersD) requires that the entire file is downloaded by the client prior to playback12.Video over IP using the H.323 protocolA) is transmitted using RTP (real-time protocol) which relies on TCPB) Uses the SIP protocol over TCPC) is transmitted using RTP (real-time protocol) which relies on UDPD) is transmitted using the DASH protocol which relies on the HTTP and TCP protocols13.Wireless networks use CSMA-CA (carrier sense, multiple access, collision avoidance) instead of CSMA-CD (carrier sense, multiple access, collision detection) that is used on wired networks becauseA) wireless network nodes cannot “hear” all other nodes on the network and therefore cannot rely on hearing other transmissions to determine if the network is busy or notB) wireless network nodes can “hear” all other network nodes, unlike in a wired network, so they don’t have to detect collisionsC) signal propagation in a wireless network is uni-directional and follows guided network paths, so collision detection isn’t neededD) wireless nodes can move, so radio wave collision must be avoided as nodes move around the network14.SNMP, Simple network management protocol, does not includeA) security through encryption of messages using WPA2 and AESB) management information base (MIB)C) transmission of messages using the UDP transport layer protocolD) managed devices15.The SSL protocol secures data by adding encryptionA) at the data link layerB) at the physical layerC) between the application and transport layersD) at the network layer16.Image transcription texts Which is not a type of constraint in SQL? (a)check (b) default (c) join (d) not null (e) redundancy(44] Which is not a valid value of the n… Show moreThe following are goals for network security exceptA) integrityB) availabilityC) anonymityD) confidentiality17.The SNMP Request/Response messagesA) data is requested from the managed device, requiring a response from the managing entityB) data is sent from the managed device to the managing entity when there is some event or exception that occursC) data is sent from the managing entity to the managed device when there is some event or exception that occursD) data is requested from the managing entity, requiring a response from the managed device18.If “Trudy” wishes to do harmful things to the communication between “Bob” and “Alice”, she can attempt to do all exceptA) eavesdrop – intercept messagesB) impersonate either Bob or AliceC) hijack the connection, and become a “man-in-the-middle”D) crack the AES encryption key easily because of how poorly AES was designed19.Select the best authenitcation method that Alice can use to prove who she is to BobA) she can send Bob a hash of her username to prove she is AliceB) she can send an encrypted version of her password to Bob to prove that she is AliceC) Bob sends a nonce to Alice, which she encrypts with her password as the key, and sends the result back to BobD) she can just send her password to Bob and Bob can validate the password against the database20.Message integrity isA) that messages can only be sent anonymously between senders and receiversB) the sending and receiving of messages securely, so that only the two of them can understand the contents of their messagesC) that messages cannot be modified without detectionD) that messages can be communicated at any time when desired by the sender and receiver21.In the SSL protocolA) a complex substitution cipher using a random order of the ASCII table is usedB) the WPA2 protocol with 3DES encryption is usedC) both the RSA protocol during the connection phase and the AES Protocol for bulk encryption are usedD) only the Caesar cipher is used22.Jitter in digital video transmissionImage transcription text(9] Which is not characteristic of the “stream paradigm ? (a)connection-onented (b) sends sequences of individual bits c)arbitrary length transfer (d) one-to-many communicatio… Show moreA) is caused by variable network delayB) is caused by the user shaking the camera violentlyC) is caused by green blocks of video being transmitted to the receiverD) is caused by constant network delay23.ASN.1 addresses the problem ofA) translation between different types of SNMP messagesB) asynchronous system notation between similar systemsC) autonomous system networkingD) the study of national networks through the association for the study of nationalities24.The following are issues with wireless networks exceptA) temperature gradients as heat waves interfere with radio wavesB) signal strength issues as radio signals travel through walls, trees, concrete, water and air at different ratesC) interference from other intentional and unintentional radio wave sources like other networks, background radiation, electrical equipment and medical devicesD) multipath propagation as radio signals reflect off objects and arrive at receivers at slightly different times25.In the case of the SNMP Trap message,A) data is sent from the managing entity to the managed device when there is some event or exception that occursB) data is requested from the managing entity, requiring a response from the managed deviceC) data is sent from the managed device to the managing entity when there is some event or exception that occursD) data is requested from the managed device, requiring a response from the managing entity26.Image transcription text[1] Which is not an official layer in theOSI model? (a) Application (b) Network(c) Physical (d) Security (e) … Show moreSuppose that you are designing a new video streaming service. You have chosen the DASH system (Dynamic Adaptive Streaming over HTTP), so you have created a method to store different versions of the video encoded at different bitrates. This allows your end-user to select the bitrate they want to see when they play the video. Explain the how this system can be utilized to overcome network related issues, especially if your service controls the video player application. Describe the interaction that should occur as the client program encounters common network issues like delay, jitter or packet loss.Engineering & TechnologyComputer ScienceCOMPUTER S 16Share Question

Get a plagiarism-free order today   we guarantee confidentiality and a professional paper and we will meet the deadline.    

Leave a Reply

Order a plagiarism free paper today. Get 20% off your first order!

X