What decides to use tcp or udp

Assignment Help Management Information Sys
Reference no: EM131310530

Telecommunications and Network Design Strategies

Question 1 : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?

a)packet

b)segment

c)frame

d)datagram

Question 2 : The backbone of the Internet is structured by the Internet Protocol (IP). Which of the following network devices provides this Internet Protocol?

a)switch

b)router

c)hub

d)repeater

Question 3 : The transport layer provides two different types of protocols: TCP and UDP. What decides to use TCP or UDP?

a)application

b)end users

c)computer network interface card (NIC)

d)computer CPU

Question 4 : TCP is a connection-oriented protocol that establishes a three-way handshake before transmitting any data. What makes a three-way handshake?

a) SYN, SYN-ACK, ACK

b)SYN, SYN, ACK

c) SYN, ACK, RST

d) SYN, ACK, SYN

Question 5 : Continuous monitoring is an important strategic initiative for the organization. In order to successfully complete the continuous monitoring effort, what would be the very first step you would have to take?

a) risk assessment

b)asset inventory

c) risk management

d) risk mitigation

Question 6 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to have both the primary and secondary sites operational at all times, and no downtime is allowed?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 7 : In designing a continuity of operations (COOP) site, which disaster recovery site configuration would you design if you needed to design the most cost-effective site configuration due to the organization's budget constraints?

a) warm site

b)hot site

c) mirror site

d) cold site

Question 8 : Mobile codes can be malicious if they carry a malware payload or harm other computers. Which of the following malware appears normal, but can harm computers if exploited?

a) worm

b)virus

c)Trojan horse

d) e-mail virus

Reference no: EM131310530

Questions Cloud

Security awareness metrics : Each phase of the security awareness program creation process is important. Design, development and implementation are all critical. However, the work does not end with implementation.
Determine the composition of the exiting liquid stream : Determine the composition of the exiting liquid stream; the ratio of the actual Ls/Gs is larger than the minimum Ls/Gs.
How long will it take the object to reach its maximum height : MATH233 Unit 2: Polynomial Functions- How long will it take the object to reach its maximum height? How long will it take the object to hit the ground? What is the velocity of the object when it hits the ground?
Find the maximum possible spacing between pumping station : The crude oil has SG = 0.93, and its viscosity at the pumping temperature is μ = 0.017 Ns/m2. For these conditions, determine the maximum possible spacing between pumping stations.
What decides to use tcp or udp : Network switches provide essential connectivity in local and wide area networks. Some of them run in multilayer between layers 2 and 3. What protocol unit is being used in layer 2?The backbone of the Internet is structured by the Internet Protocol ..
At what air speed should the model test be performed : The drag on a 2-m-diameter satellite dish due to an 80 km/h wind is to be determined through wind tunnel testing on a geometrically similar 0.4-m-diameter model dish.
Determine the moles of water that are required per mole : Determine the moles of water that are required per mole of H2S-free carrier gas if 1.5 times the minimum ratio will be used.
How fast must the wing move through the air : How fast must the wing move through the air at an altitude of 35,000 ft if it is to generate the same lift? (Assume the lift coefficient is constant.)
Simulate the deposits made to a fictitious bank account : In this programming assignment you will simulate the deposits and withdrawals made to a fictitious bank account. In this case synchronized threads will make the deposits and withdrawals.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Question about computer crime challenges and security

question about computer crime challenges and security issuescomputer crime has become a serious matter. can you help me

  Initiating and implementation of drone delivery system

Topic: "Initiating and implementation of drone delivery system in a retail environment." Paper should consist of a one-page summary of progress and include the summary of the company, company's needs analysis, and systems analysis

  Description of integrated marketing communications

Description of INTEGRATED MARKETING COMMUNICATIONS - How can such a campaign invoke an emotional response with the target market, lower the market's sales resistance, and persuade the market to purchase the product?

  What controls will require to be in place for payroll cycle

Payroll cycle- harware and software, controls - What controls will require to be in place for the payroll cycle in order to integrate this cycle into an automated system?

  Describe the different kinds of indexes oracle uses

Describe the different kinds of indexes Oracle uses. Give an example of when you might use each type. Why might it be important to determine the size of an index? What happens to secondary indices when a page split happens in a file organization

  Explain industrial age lessons and computer modeling

Industrial Age Lessons and Computer Modeling - For agriculture, aren't some farmers using GPS enabled equipment? Please give your opinion.

  List all the symptoms of the problems faced by carent

Develop two process flow diagrams for CaRent's rental and return processes. Identify and mark the processes (circle them) and interfaces (put a red + mark on them) creating problems for the company and thus are in need for change.

  Question about hr information systems

Question about HR Information Systems - "The best HR information system from an employee point of view is one that is not based in technology."

  Explain why these are considered high risk

Work together with role playing (one Project Manager, one customer, others may be system architects/developers) to identify the system requirements and all risks. And, rate each risk.

  Creating the infrastructure to take the photographs in-house

The pros and cons of outsourcing the photography to a professional photographer. The pros and cons of creating the infrastructure to take the photographs in-house

  Erp systems vs accounting packageswhat do high-end erp

erp systems vs. accounting packageswhat do high-end erp systems do that less expensive accounting packages

  Discuss how digital media has transformed

Discuss how Digital Media has transformed how organizations advertise and market their products and services. Include a historical and global perspective (include discussion of the US and at least two additional countries).

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd