What decides to use tcp or udp

Assignment Help Management Information Sys
Reference no: EM131310530

Telecommunications and Network Design Strategies

Question 1 : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

a)packet

b)segment

c)frame

d)datagram

Question 2 : The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

a)switch

b)router

c)hub

d)repeater

Question 3 : The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

a)application

b)end users

c)computer network interface card (NIC)

d)computer CPU

Question 4 : TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

a) SYN, SYN-ACK, ACK

b)SYN, SYN, ACK

c) SYN, ACK, RST

d) SYN, ACK, SYN

Question 5 : Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

a) risk assessment

b)asset inventory

c) risk management

d) risk mitigation

Question 6 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 7 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 8 : Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

a) worm

b)virus

c)Trojan horse

d) e-mail virus

Reference no: EM131310530

Questions Cloud

Security awareness metrics : Each phase of the security awareness program creation process is important. Design, development and implementation are all critical. However, the work does not end with implementation.
Determine the composition of the exiting liquid stream : Determine the composition of the exiting liquid stream; the ratio of the actual Ls/Gs is larger than the minimum Ls/Gs.
How long will it take the object to reach its maximum height : MATH233 Unit 2: Polynomial Functions- How long will it take the object to reach its maximum height? How long will it take the object to hit the ground? What is the velocity of the object when it hits the ground?
Find the maximum possible spacing between pumping station : The crude oil has SG = 0.93, and its viscosity at the pumping temperature is μ = 0.017 Ns/m2. For these conditions, determine the maximum possible spacing between pumping stations.
What decides to use tcp or udp : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?The backbone of the Internet is structured by the Internet Protocol ..
At what air speed should the model test be performed : The drag on a 2-m-diameter satellite dish due to an 80 km/h wind is to be determined through wind tunnel testing on a geometrically similar 0.4-m-diameter model dish.
Determine the moles of water that are required per mole : Determine the moles of water that are required per mole of H2S-free carrier gas if 1.5 times the minimum ratio will be used.
How fast must the wing move through the air : How fast must the wing move through the air at an altitude of 35,000 ft if it is to generate the same lift? (Assume the lift coefficient is constant.)
Simulate the deposits made to a fictitious bank account : In this programming assignment you will simulate the deposits and withdrawals made to a fictitious bank account. In this case synchronized threads will make the deposits and withdrawals.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What types of social studies objectives and goals

What types of social studies objectives/ goals could be met by this technology and how? Please relate to a NCSS main theme (or more than one if appropriate).

  Have you had prior experience in erp implementations

Have you had any prior experience in any ERP implementations? Share your experience. What was your role? What were the tasks involved? What was the final outcome? What would you do differently? What was the role of top management?

  Analyze the current trends in patient data capture

Write an executive summary that examines the compliance procedures and practice guidelines that these organizations would need to establish to achieve optimum operational effectiveness while complying with federal, state, and local laws governing ..

  Should be risk-based and driven by business needs

Computer security is essentially a battle of wits between a perpetrator who tries to find holes and the administrator who tries to close them. Many security administrators view strong security as an impediment to efficient and user-friendly oper..

  Disseminate this information to all employees

disseminate this information to all employees create individual scenarios. Decide who needs to receive this information and how the information would best be represented in memo format. Keep in mind that you will be calling people to action, and..

  Reasons that organizations adopt a charge back process

What are some of the reasons that organizations adopt a charge back process for IS services

  How are mobile computing web 2.0 changing

Write a 200- to 300-word short-answer response to the following: How are mobile computing, Web 2.0, and social media changing how IT systems are used

  Design three security posters on various aspects of

part 1 review questions what functions constitute a complete information security program? what is the typical size of

  Define dynamic pricing

Name a company that uses data as a source of competitive advantage. Justify your response. Define dynamic pricing (in your own words) and provide an example not found in the text. Define the following terms: table, record, field. Provide another name..

  Discuss the legal protections related to copyright

Discuss the legal protections related to copyright, trade secrecy, and patents. Include an example for each where legal protection has been enforced.

  List and explain the memory constructs of the oracle

List and explain the memory constructs of the Oracle 12c databases. List and explain the background processes that support the 12c database. Explain why container and pluggable databases on a Linux server will use less memory compared to many Oracle ..

  Paper about information technology in online shopping

Write term paper about Information Technology in Online Shopping

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd