Author: Joyce Buda


1. Prior to cellular radio, mobile radio and telephone services required:A. a high-power transmitter/receiverB. multiple transmitters/receiversC. only one or two dedicated channelsD. that many channels be used, which exceed the frequency capacity2. When using cellular networks, __________.A. a single base station can serve multiple cellsB. adjacent cells must use the same frequenciesC. adjacent cells are assigned different frequenciesD. non-adjacent cells are assigned different frequencies3. The ideal design for cells in a cellular network is a hexagonal shape because _____.A. this makes enforcement of shapes easierB. this is the easiest to implementC. this makes all frequencies available to all cellsD. this makes the distance to all adjacent cells the same4. When a mobile unit moves, it may connect with a different base station. This action is called____________.A. a handoffB. a transferC. a reconfigurationD. a dropped signal5. Which of the following is NOT one of the ways that frequency spectrum can be dividedamong active users?A. frequency division multiple accessB. time division multiple accessC. code division multiple accessD. cell division multiple access6. Because of the limited frequencies available, a key design element of any cellular system is to___________.A. use small cellsB. employ multiple accessC. limit the number of users at one timeD. use as many frequencies as possible7. The Wireless Application Protocol (WAP) is:A. proprietary protocol developed in the USA for wireless securityB. dependent on the specific network technologies employedC. an Internet standard that replaces HTML, HTTP, and XMLD. designed to overcome many of the limitations hindering acceptance of mobile dataservices8. Which of the following is NOT one of the components of the WAP specification?A. A framework for wireless telephony applicationsB. A full-featured communications protocol stackC. A programming model based on the WWWD. A markup language adhering to XML9. The WAP Programming Model uses a ________ that acts as a proxy server for the wirelessdomain.A. translatorB. WAP serverC. gatewayD. decoder10. For a given system, multiple access is based on _______.A. TDMAB. FDMAC. CDMAD. all of the above11. Important objectives of computer security include:A. confidentialityB. integrityC. availabilityD. all of the above12. One type of attack on the security of a computer system or network that impacts theavailability of a system (e.g. destruction of a resource in the system) is referred to as___________.A. incapacitationB. interceptionC. modificationD. all of the above13. The type of attack on communications lines and networks known as traffic analysis belongsto the general category of ____________.A. active attacksB. passive attacksC. administrative attacksD. none of the above14. IPSec transport mode provides protection primarily for:A. the Internet layerB. upper-layer protocolsC. network and link-layer protocolsD. all of the above15. The higher-layer protocols defined as part of SSL include:A. handshake protocolB. change cipher spec protocolC. alert protocolD. all of the above16. The WiFi standard known as Privacy with message integrity can be described as follows:A. a way of ensuring the privacy of the individual using WiFiB. a technique that ensures that the data transmitted using WiFi have not beenalteredC. a way of providing mutual authentication between a user and an ASD. none of the above17. A key logical component of an IDS is:A. sensorsB. analyzersC. user interfaceD. all of the above18. A stateful inspection firewall ________.A. applies a set of rules to each incoming and outgoing IP packet and then forwards ordiscards the packetB. controls TCP traffic by creating a directory of outbound TCP connectionsC. acts as a relay of application-level trafficD. sets up two TCP connections, one between itself and a TCP user on an inner host and onebetween itself and a TCP user on an outside host19. Which of the following is not a central element of a typical antivirus scheme?A. detectionB. identificationC. removalD. deterrence20. Which of the following is a higher-layer protocol defined as part of SSL?A. the Handshake ProtocolB. the Change Cipher Spec ProtocolC. the Alert ProtocolD. all of the above

See More
Try a College Course Free

Sophia’s self-paced online courses are a great way to save time and money as you earn credits eligible for transfer to over 2,000 colleges and universities.*

Begin Free Trial
No credit card required

26 Sophia partners guarantee credit transfer.

226 Institutions have accepted or given pre-approval for credit transfer.

* The American Council on Education's College Credit Recommendation Service (ACE Credit®) has evaluated and recommended college credit for 21 of Sophia’s online courses. More than 2,000 colleges and universities consider ACE CREDIT recommendations in determining the applicability to their course and degree programs.