What decides to use tcp or udp

Assignment Help Management Information Sys
Reference no: EM131310530

Telecommunications and Network Design Strategies

Question 1 : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

a)packet

b)segment

c)frame

d)datagram

Question 2 : The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

a)switch

b)router

c)hub

d)repeater

Question 3 : The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

a)application

b)end users

c)computer network interface card (NIC)

d)computer CPU

Question 4 : TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

a) SYN, SYN-ACK, ACK

b)SYN, SYN, ACK

c) SYN, ACK, RST

d) SYN, ACK, SYN

Question 5 : Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

a) risk assessment

b)asset inventory

c) risk management

d) risk mitigation

Question 6 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 7 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 8 : Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

a) worm

b)virus

c)Trojan horse

d) e-mail virus

Reference no: EM131310530

Questions Cloud

Security awareness metrics : Each phase of the security awareness program creation process is important. Design, development and implementation are all critical. However, the work does not end with implementation.
Determine the composition of the exiting liquid stream : Determine the composition of the exiting liquid stream; the ratio of the actual Ls/Gs is larger than the minimum Ls/Gs.
How long will it take the object to reach its maximum height : MATH233 Unit 2: Polynomial Functions- How long will it take the object to reach its maximum height? How long will it take the object to hit the ground? What is the velocity of the object when it hits the ground?
Find the maximum possible spacing between pumping station : The crude oil has SG = 0.93, and its viscosity at the pumping temperature is μ = 0.017 Ns/m2. For these conditions, determine the maximum possible spacing between pumping stations.
What decides to use tcp or udp : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?The backbone of the Internet is structured by the Internet Protocol ..
At what air speed should the model test be performed : The drag on a 2-m-diameter satellite dish due to an 80 km/h wind is to be determined through wind tunnel testing on a geometrically similar 0.4-m-diameter model dish.
Determine the moles of water that are required per mole : Determine the moles of water that are required per mole of H2S-free carrier gas if 1.5 times the minimum ratio will be used.
How fast must the wing move through the air : How fast must the wing move through the air at an altitude of 35,000 ft if it is to generate the same lift? (Assume the lift coefficient is constant.)
Simulate the deposits made to a fictitious bank account : In this programming assignment you will simulate the deposits and withdrawals made to a fictitious bank account. In this case synchronized threads will make the deposits and withdrawals.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze the fundamental manner

Rank the four (4) broad categories of barriers to health information technology that are discussed in the textbook from the greatest to the least. Next, identify at least one (1) additional barrier that is not discussed in the textbook, and sugges..

  Unleashing a boost of energy to individual

Voltage Energy Drink aims to rejuvenate the body and mind, unleashing a boost of energy to the individual also offering a great taste.

  Informatics securitywho should be responsible for security

informatics securitywho should be responsible for security the government or individuals? why do you think that? defend

  How different would the situations be without databases

Suggest areas that currently do not use databases but can benefit from their use. What forms the basis of this suggestion? How do you think the implementation of databases will affect the current scenario in these areas?

  Implementing a physical and environmental security program

Identify three steps required for implementing a physical and environmental security program

  Define how the regulations will modify the implementation

Clearly define impact of HIPAA and HITECH regulations on health care systems for the future with mention to state and federal differences. Define how the regulations will modify the implementation and ongoing use of software systems that maintain p..

  Research googles attempt to buy into wireless

Case Analysis 4 - Google: Research Google's attempt to buy into wireless via the 700 MHz Spectrum Auction. Why did Google make this move? What do they hope to accomplish

  Write an html document to create a form

Write an HTML document to create a form with the following capabilities: A text widget to collect the user's name and Four checkboxes, one each for the following items

  Show importance of good managers and good systems

Discussion after the speech focuses on the importance of good managers and good systems. You participate by explaining why both are integral to an organization and the effects, if any, of an imbalance within any of these areas.

  Review several online newspapers

Review several online newspapers, news sites, and professional magazines and locate examples of three (3) different types of threats "and" three (3) different types of attacks. Write a summary for each article followed by an explanation of how they i..

  Determine the direct impact of marketing for the health care

Determine the direct impact of marketing for the health care provider you selected. Outline a strategy for the health care provider you selected to determine the utilization of its products or services.

  Find average carrier power required to maintain an average

Find the average carrier power required to maintain an average probability of error Pe £ 10-4 for the Binary PSK using coherent detection schemes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd