129. In sliding window protocols, a protocol is said to be in the stop-and-wait mode under which of the following conditions?
a.
When the sequence number for a sender’s window is greater than 1, a receiver can discard all data frames.b.
When the sequence number for a sender’s window and a receiver’s window is equal to 1.c.
When the sequence number for a sender’s window is greater than 1, a receiver can buffer out-of-order data frames.d.
When two separate physical circuits are used for forward channel and reverse channel.The other three choices do not operate in a stop-and-wait mode. When the sequence number for a sender’s window is greater than 1, the receiver can either discard all data frames or buffer out-of-order data frames. When two separate physical circuits are used for forward channel and reverse channel, it represents a full-duplex data transmission, which is inefficient because only once circuit is used for the forward channel and the circuit for the reverse channel is not used. The full-duplex transmission uses two circuits and wastes resources whereas the sliding window protocol uses only one circuit.
130. Which of the following is
a.
Splitting traffic over multiple routesb.
Having spare routers available onlinec.
Having users schedule their work at nonpeak timesd.
Increasing the transmission power for satellite systems131. Which of the following does
a.
Antivirus softwareb.
Spyware detection and removal utility softwarec.
Host-based intrusion detection systemsd.
FirewallsAntivirus software is incorrect because it has the capability to cause false positives and false negatives due to use of heuristic techniques to detect new malware. Spyware detection and removal utility software is incorrect because it can cause false positives and false negatives. Host-based intrusion detection systems are incorrect because they can cause false positives and false negatives (false warnings and alerts in the form of alarms) due to malfunctioning sensors and that network activity is not visible to host-based sensors.
132. Which of the following are the primary security goals of a domain name system (DNS)?
1.
Source authentication2.
Confidentiality3.
Integrity4.
Availabilitya.
1 and 2b.
2 and 3c.
1 and 3d.
3 and 4133. Transmission control protocol (TCP) packet is associated with which of the following when sending domain name system (DNS) queries?
1.
Truncation2.
Little or no truncation3.
Higher overhead4.
Lower overheada.
1 onlyb.
4 onlyc.
1 and 4d.
2 and 3