22.22. Which is used in IEEE 802.1X that the AP does not provide authentication to the client but
pass the duties to the RADIUS server?
(A) Temporal Key Integrity Protocol (TKIP)
(B) Extensible Authentication Protocol (EAP)
(C) Broadcast Key Rotation (BTR)
(D) Message Integrity Codes (MIC)
(E) None of the above
30.30. A PC-relative mode branch instruction is stored in memory at address 23610. The branch is
made to location 32710. The address field in the instruction is 12 bits long. What is the
binary value of address field in the branch instruction?
(A) (000001111010)2 (B) (000001111011)2 (C) (000000111010)2 (D) (000000111011)2 (E) (000001011011)2
40.40. Which are the applications of Satellite Microwave?
(A) Television distribution
(B) Long-distance telephone transmission
(C) TV remote controllers
(D) Private business network
(E) Broadcast radio
41.41. Which statement(s) of the view in SQL is(are) true?
(A) SQL views can be used to hide columns and rows only
(B) The SQL statement to create a view is MAKE VIEW
(C) To update an SQL view, the DMBS must be able to associate the column(s) to be
update with a particular row in a particular underlying table
(D) One of the purpose of using views is to hide complicated SQL statement
(E) SQL views can be used to hide complicated SQL syntax
44.44. Which are the features of Digital Signaling?
(A) Generally cheaper than analog signaling
(B) Less susceptible to noise interference
(C) More susceptible to noise interference
(D) Suffer less from attenuation
(E) Suffer more from attenuation
45.45. Which are the properties of CDMA?
(A) Hard to spy
(B) No need all stations to synchronize
(C) All cells can use all frequencies
(D) No need for a large continuous frequency band
(E) No hard limit on capacity of a cell
46.46. Which are the advantages belong to Proactive Routing Protocol when data deliver in
Mobile Ad Hoc Networks (MAHNET)?
(A) Well suited for highly mobile ad-hoc network
(B) Require less bandwidth
(C) Low latency when establishing connections
(D) Relatively easy to implement Quality of Service (QoS) than reactive routing
(E) Low storage and message overhead
47.47. Which statements are correct about the MAC Management Layer?
(A) Beacon is used in Time Synchronization Function (TSF)
(B) Beacon is used in Power Management
(C) In infrastructure mode, any host can generate Beacon frames
(D) In infrastructure mode, Traffic Indication Map (TIM) sent with Beacon
(E) In ad hoc mode, buffering scheme is achieved by Aps
51.51. Suppose a computer's address size is 32 bits, the cache size is 512K bytes, the block size is
64 bytes, and the cache is 8-way set associative. Which of the following statements is(are)
(A) There are 512 sets in the cache
(B) There are 1024 sets in the cache
(C) There are 2048 sets in the cache
(D) There are 128K of TAG bits for the cache
(E) There are 256K of TAG bits for the cache