Deck 3: Physical and Network Layer Vulnerabilities and Communication System Concepts

Full screen (f)
exit full mode
Question
Which of the following is an example of physical layer vulnerability?

A)mac address spoofing
B)physical theft of data
C)route spoofing
D)weak or non-existent authentication
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is an example of data-link layer vulnerability?

A)mac address spoofing
B)physical theft of data
C)route spoofing
D)weak or non-existent authentication
Question
Which of the following is an example of network layer vulnerability?

A)mac address spoofing
B)physical theft of data
C)route spoofing
D)weak or non-existent authentication
Question
Which of the following is an example of physical layer vulnerability?

A)mac address spoofing
B)route spoofing
C)weak or non-existent authentication
D)keystroke & other input logging
Question
Which of the following is an example of data-link layer vulnerability?

A)physical theft of data
B)vlan circumvention
C)route spoofing
D)weak or non-existent authentication
Question
Bits can be sent over guided and unguided media as analog signal by                        

A)digital modulation
B)amplitude modulation
C)frequency modulation
D)phase modulation
Question
The portion of physical layer that interfaces with the media access control sublayer is called                        

A)physical signalling sublayer
B)physical data sublayer
C)physical address sublayer
D)physical transport sublayer
Question
In the digital communication system, signals in different frequency bands are

A)orthogonal
B)non orthogonal
C)orthogonal & non orthogonal
D)none of the mentioned
Question
Properties of impulse function are

A)symmetry
B)time scaling
C)shifting
D)all of the mentioned
Question
Properties of Fourier transform are

A)duality property
B)time shifting property
C)modulation property
D)all of the mentioned
Question
A base-band signal can be up-converted using

A)sine wave
B)cosine wave
C)filtering
D)none of the mentioned
Question
A band-pass signal can be down-converted using

A)sine wave
B)cosine wave
C)time delayed wave
D)none of the mentioned
Question
In down-conversion multiplication with cosine wave is followed by

A)low pass filter
B)high pass filter
C)bandpass filter
D)bandstop filter
Question
Fourier transform of a signal gives the

A)frequency content
B)bandwidth
C)frequency content & bandwidth
D)none of the mentioned
Question
Random things in a communication system are

A)timing offset
B)device frequency
C)attenuation
D)all of the mentioned
Question
Which can be used for periodic and non periodic?

A)fourier series
B)fourier transforms
C)fourier series & transforms
D)none of the mentioned
Question
A band-pass signal has a Fourier transform equal to

A)one
B)zero
C)infinity
D)cannot be determined
Question
A band-pass signal has

A)dc component
B)no dc component
C)no side lobes
D)cannot be determined
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/18
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Physical and Network Layer Vulnerabilities and Communication System Concepts
1
Which of the following is an example of physical layer vulnerability?

A)mac address spoofing
B)physical theft of data
C)route spoofing
D)weak or non-existent authentication
physical theft of data
2
Which of the following is an example of data-link layer vulnerability?

A)mac address spoofing
B)physical theft of data
C)route spoofing
D)weak or non-existent authentication
mac address spoofing
3
Which of the following is an example of network layer vulnerability?

A)mac address spoofing
B)physical theft of data
C)route spoofing
D)weak or non-existent authentication
route spoofing
4
Which of the following is an example of physical layer vulnerability?

A)mac address spoofing
B)route spoofing
C)weak or non-existent authentication
D)keystroke & other input logging
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is an example of data-link layer vulnerability?

A)physical theft of data
B)vlan circumvention
C)route spoofing
D)weak or non-existent authentication
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
6
Bits can be sent over guided and unguided media as analog signal by                        

A)digital modulation
B)amplitude modulation
C)frequency modulation
D)phase modulation
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
7
The portion of physical layer that interfaces with the media access control sublayer is called                        

A)physical signalling sublayer
B)physical data sublayer
C)physical address sublayer
D)physical transport sublayer
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
8
In the digital communication system, signals in different frequency bands are

A)orthogonal
B)non orthogonal
C)orthogonal & non orthogonal
D)none of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
9
Properties of impulse function are

A)symmetry
B)time scaling
C)shifting
D)all of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
10
Properties of Fourier transform are

A)duality property
B)time shifting property
C)modulation property
D)all of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
11
A base-band signal can be up-converted using

A)sine wave
B)cosine wave
C)filtering
D)none of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
12
A band-pass signal can be down-converted using

A)sine wave
B)cosine wave
C)time delayed wave
D)none of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
13
In down-conversion multiplication with cosine wave is followed by

A)low pass filter
B)high pass filter
C)bandpass filter
D)bandstop filter
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
14
Fourier transform of a signal gives the

A)frequency content
B)bandwidth
C)frequency content & bandwidth
D)none of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
15
Random things in a communication system are

A)timing offset
B)device frequency
C)attenuation
D)all of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
16
Which can be used for periodic and non periodic?

A)fourier series
B)fourier transforms
C)fourier series & transforms
D)none of the mentioned
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
17
A band-pass signal has a Fourier transform equal to

A)one
B)zero
C)infinity
D)cannot be determined
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
18
A band-pass signal has

A)dc component
B)no dc component
C)no side lobes
D)cannot be determined
Unlock Deck
Unlock for access to all 18 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 18 flashcards in this deck.