b.
Finger table and routing tablec.
Fault tree and decision treed.
Decision table and truth tableA finger table is used for node lookup in peer-to-peer (P2P) networks. Routers use routing tables to route messages and packets. A fault tree is used in analyzing errors and problems in computer software. A decision tree is a graphical representation of the conditions, actions, and rules in making a decision with the use of probabilities in calculating outcomes. A decision table presents a tabular representation of the conditions, actions, and rules in making a decision. A truth table is used in specifying computer logic blocks by defining the values of the outputs for each possible set of input values.
5. Enforcing effective data communications security requires other types of security such as physical security. Which of the following can easily compromise such an objective?
a.
Smart cards with PINsb.
Nonreusable passwordsc.
Network cablingd.
Last login messagesSmart cards with PINs are incorrect because they do not compromise data communications. They enhance security by using cryptographic keys. Nonreusable passwords are used only once. A series of passwords are generated by a cryptographic secure algorithm and given to the user for use at the time of login. Each password expires after its initial use and is not repeated or stored anywhere. Last login messages are incorrect because they alert unauthorized uses of a user’s password and ID combination.
6. Which of the following refers to closed-loop control to handle network congestion problems?
1.
Mid-course corrections are not made.2.
Current state of the network is ignored.3.
Feedback loop is provided.4.
Mid-course corrections are made.a.
1 onlyb.
1 and 2c.
4 onlyd.
3 and 47. Which of the following security threats is not applicable to wireless local-area networks (WLANs)?
a.
Message interceptionb.
System unavailabilityc.
System unreliabilityd.
Theft of equipment8. Wireless local-area networks (LANs) have greater risks than wired LANs in which of the following areas?
a.
Masquerading and modification/substitutionb.
Modification/substitution of messages and theft of equipmentc.
Eavesdropping and masqueradingd.
Eavesdropping and theft of equipment