What decides to use tcp or udp

Assignment Help Management Information Sys
Reference no: EM131310530

Telecommunications and Network Design Strategies

Question 1 : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

a)packet

b)segment

c)frame

d)datagram

Question 2 : The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

a)switch

b)router

c)hub

d)repeater

Question 3 : The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

a)application

b)end users

c)computer network interface card (NIC)

d)computer CPU

Question 4 : TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

a) SYN, SYN-ACK, ACK

b)SYN, SYN, ACK

c) SYN, ACK, RST

d) SYN, ACK, SYN

Question 5 : Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

a) risk assessment

b)asset inventory

c) risk management

d) risk mitigation

Question 6 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 7 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 8 : Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

a) worm

b)virus

c)Trojan horse

d) e-mail virus

Reference no: EM131310530

Questions Cloud

Security awareness metrics : Each phase of the security awareness program creation process is important. Design, development and implementation are all critical. However, the work does not end with implementation.
Determine the composition of the exiting liquid stream : Determine the composition of the exiting liquid stream; the ratio of the actual Ls/Gs is larger than the minimum Ls/Gs.
How long will it take the object to reach its maximum height : MATH233 Unit 2: Polynomial Functions- How long will it take the object to reach its maximum height? How long will it take the object to hit the ground? What is the velocity of the object when it hits the ground?
Find the maximum possible spacing between pumping station : The crude oil has SG = 0.93, and its viscosity at the pumping temperature is μ = 0.017 Ns/m2. For these conditions, determine the maximum possible spacing between pumping stations.
What decides to use tcp or udp : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?The backbone of the Internet is structured by the Internet Protocol ..
At what air speed should the model test be performed : The drag on a 2-m-diameter satellite dish due to an 80 km/h wind is to be determined through wind tunnel testing on a geometrically similar 0.4-m-diameter model dish.
Determine the moles of water that are required per mole : Determine the moles of water that are required per mole of H2S-free carrier gas if 1.5 times the minimum ratio will be used.
How fast must the wing move through the air : How fast must the wing move through the air at an altitude of 35,000 ft if it is to generate the same lift? (Assume the lift coefficient is constant.)
Simulate the deposits made to a fictitious bank account : In this programming assignment you will simulate the deposits and withdrawals made to a fictitious bank account. In this case synchronized threads will make the deposits and withdrawals.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd