ACK
FIN
SYN
RST
Wireless Protected Access
Wired Protected Access
Wi-Fi Protected Access
Wireless Private Access
Higher data transfer rates
Reduced susceptibility to noise
Greater compatibility with modern devices
Lower power consumption
802.11
802.5
802.4
802.2
Bandwidth
Latency
Packet size
All of the above
Wide Area Net
Wide Access Network
Wide Area Network
Wide Access Net
Ethernet
Wi-Fi
Fiber optics
Bluetooth
To indicate the start of a data frame
To provide redundancy for error correction
To detect errors in transmitted data
To ensure the confidentiality of the data
To establish a connection
To terminate a connection
To transmit data
To check for errors in data
The Internet exclusively uses wired connections.
The Internet is limited to communication within a single organization.
The Internet is a globally interconnected network of networks.
The Internet is controlled by a single centralized authority.
Filtering packets based on port numbers
Translating domain names to IP addresses
Determining the best path for forwarding packets to their destination
Establishing secure connections between hosts
Encrypting data transmissions
Blocking unauthorized access to a network
Managing cryptographic keys
Monitoring network traffic for malware
It specifies the total length of the TCP segment
It indicates the length of the TCP header in 32-bit words
It denotes the maximum segment size that can be transmitted
It identifies the TCP version being used
Computer Security
Information Security
Network Security
None of these
They require a centralized server
They can be less secure than client-server networks
They are more difficult to set up
They have limited scalability
Software
Protocol
Hardware
Dual Host
TCP
OSI
proxy
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Subnetting
MAC address filtering
VLAN
CSMA/CD
255.0.0.0
255.255.255.0
255.255.0.0
255.255.255.255
Cutoff frequency
Low frequencies
upper high frequencies
None of the mentioned
Router
Hub
Repeater
Switch
Latch
Shift register
Memory extension
Cache
/24
/16
/32
/8
Telnet
Active receiver
Ethernet LAN
Microwaves
Encryption of data
To transmit faster
To detect errors
To identify the user
Physical layer
Data Link layer
Transport layer
Application layer
Host to host
Application
Internet
Network Access
To specify the length of the segment
To terminate the connection
To indicate errors in the segment
To identify the next byte expected from the sender
Spoofing
Ransomware
Phishing
Keylogging
Secure/ MIME
Web Service Security
FIPS
Secure Sockets Layer
UDP traffic
TCP traffic
Both of the mentioned
0.0.0.0
127.0.0.1
0.255.255.255
Bus
Tree
Mesh
Star
121.12.12.248
130.12.12.248
128.12.12.248
129.12.12.248
Translating IP addresses to domain names
Converting domain names to IP addresses
Assigning IP addresses to devices
Storing user passwords
To map a MAC address to an IP address
To route data from one network to another
To configure IP addresses dynamically
To map an IP address to a MAC address
Unshielded twisted pair
Optical fiber
Coaxial cable
Microwave
The number of bits transferred per second
The frequency of the carrier wave
The number of errors corrected per second
The speed of the modem
Private key encryption
Public key encryption
Symmetric key encryption
Hybrid encryption
To divide the network into subnetworks
To allocate IP addresses
To provide a default gateway
To encrypt data
Flow control
Error detection and correction
Segmentation and reassembly
Packet routing
Sender
Receiver
Sender and Receiver
None of the these
Ring
Binary
Passive receiver
block cipher
stream cipher
bit cipher
none of the mentioned
The amount of data that can be transmitted in a fixed amount of time
The time taken to send a message from one point to another
The speed at which the data packets are received
The delay between data transmission and reception
Physical
Network
Data Link
Transport
The total number of packets sent over the network
The amount of data loss during transmission
The signal strength between two nodes
The amount of time data spends in transit
To identify the data rate of the network
To encrypt the wireless data
To control access to the router
To uniquely identify a wireless network