86 Chapter 4 ■ Communication and Network Security (Domain 4)
- Arnold is receiving reports from end users that their internet connections are extremely
slow. He looks at the firewall and determines that there are thousands of unexpected
inbound connections per second arriving from all over the world. What type of attack is
most likely occurring?
A. A worm
B. A denial of service attack
C. A virus
D. A smurf attack - What speed and frequency range is used by 802.11n?
A. 5 4 Mbps, 5 GHz
B. 2 00+ Mbps, 5GHz
C. 2 00+ Mbps, 2.4 and 5 GHz
D. 1 Gbps, 5 GHz - The Address Resolution Protocol (ARP) and the Reverse Address Resolution Protocol
(RARP) operate at what layer of the OSI model?
A. Layer 1
B. Layer 2
C. Layer 3
D. Layer 4 - Which of the following is a converged protocol that allows storage mounts over TCP, and
which is frequently used as a lower-cost alternative to Fibre Channel?
A. MPLS
B. SDN
C. VoI P
D. iSCSI - Chris is building an Ethernet network and knows that he needs to span a distance of more
than 150 meters with his 1000BaseT network. What network technology should he use to
help with this?
A. Install a repeater or a concentrator before 100 meters.
B. Use Category 7 cable, which has better shielding for higher speeds.
C. Install a gateway to handle the distance.
D. Use STP cable to handle the longer distance at high speeds.