Business Data Communications & Networking final review
The data rate for a T-1 circuit in North America is: 1.544 Mbps 6.312 Mbps 44.376 Mbps 274.176 Mbps 1.544 Gbps
1.544 Mbps
Which of the following is true regarding switched backbones? They place all network devices for one part of the building physically in the same room, often in a rack of equipment They have an advantage of requiring less cable They make it more difficult to move computers from one LAN to another Network capacity is always tied to the physical location of the computers They are harder to maintain and upgrade than a BN that is not rack-based
They place all network devices for one part of the building physically in the same room, often in a rack of equipment
difference between router and switch
-A router is a gateway between networks and belongs to two or more local networks -a switch belongs only to its local network
In North America, a T1 circuit has ______ 64Kbps channels. 2 30 24 12 36
24
The backbone architecture layer that is closest to the users is the Access layer Distribution layer Core layer Privacy layer Switched layer
Access layer
CSMA/CA is an acronym for: Carrier Sense Multiple Acknowledgment with Collision Avoidance Carrier Sensory Multiple Access without Collision Acknowledgment Carrier Sense Multiple Access with Collision Acknowledgment Carrier Sense Mode Access with Carrier Avoidance Carrier Sense Multiple Access with Collision Avoidance
Carrier Sense Multiple Access with Collision Avoidance
___________ refers to managing and documenting the network's hardware and software configuration. Configuration management Visioning Firefighting Troubleshooting Implementation
Configuration management
The _________ is the part of the backbone that connects the different backbones together. Access layer Distribution layer Core layer Privacy layer Switched layer
Core layer
Ethernet LAN was developed by: CERN laboratory in Geneva DEC, Xerox, and Intel University of Minnesota IBM ARPANET
DEC, Xerox, and Intel
___________ provides information about configuration management of client computers on a network. Desktop management software System management software Circuit management software Device management software Application management software
Device management software
The _______ is the part of the backbone that connects the LANs together. Access layer Distribution layer Core layer Privacy layer Switched layer
Distribution layer
Which of the following new Internet efforts was started by 34 universities? CA*net 3 NGI vBNS Internet2 ARDNOC
Internet2
___________ is how the network works conceptually. Physical topology Network topology Ethernet Media access control Logical topology
Logical topology
_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. MTTRespond MTBF MTTRate Availability MTTDiagnose
MTTDiagnose
_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions. Voice-activated Trouble tickets Bursty Managed devices Faulty
Managed devices
Which of the following statements is true in regards to DSL? On a circuit, the longer the distance, less attenuation occurs. When more attenuation occurs, higher frequency signals can be used effectively. On a circuit, the longer the distance, the higher the speed. On a circuit, the shorter the distance, the higher the speed. On a circuit, the shorter the distance, more attenuation occurs.
On a circuit, the shorter the distance, the higher the speed.
_____________ helps ensure that critical problems get priority over less important ones. Uptime Protocol analyzing Availability Reliability Problem prioritizing
Problem prioritizing
_________ move packets along the backbone based on their network layer address. Bridged backbones Hubbed backbones Multistation access unit backbones Routed backbones NIC backbones
Routed backbones
____ is the process of creating several logically separate servers on the same physical computer. Server proliferation Server redundancy Server virtualization Server platforming Server optimization
Server virtualization
___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept. Wish list documentation Smart hub lists Service level agreements Trouble tickets Bursty router printouts
Service level agreements
________ is used to model the behavior of the planned communication network once the proposed network map is complete. Simulation Post-implementation review Implementation Documentation Training users
Simulation
A __________ type of BN has a star topology with a switch at its center resulting in all devices on the BN segment being part of the same IP network. Bridged backbone Virtual LAN Hubbed backbone Switched backbone Routed backbone 815. Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building *c. use a star topology with one interconnect device, usually a switch d. switch the traffic based on layer 3 addresses e. require much more management that do routed backbone networks
Switched backbone
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. none of the above WLANs WAN extranet intranet
WLANs
A sniffer program is a: a program that records all LAN messages received for later analysis used in a call-back modem secure hub program small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location type of macro-virus
a program that records all LAN messages received for later analysis
A(n) ___________ is a radio transceiver that plays the same role as a hub in a wired network and connects the WLAN to the wired network. antennae access point Ethernet NIC hub wireless NIC
access point
Symmetric encryption systems have two parts: the key and the ____________. IP spoofer spamming method algorithm clearance code smart card bits
algorithm
Desktop management: requires managers to install software and application updates manually on client computers automatically produces documentation of software installed on each client computer decreases costs in the short term cannot maintain documentation of software installed on each client computer increases the cost of configuration management over the long term
automatically produces documentation of software installed on each client computer
A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) bottleneck congested network e-commerce edge breakneck building backbone
bottleneck
A digital service offered by cable companies is the _________. G.Lite ADSL Next Generation Internet Abilene network cable modem WAP proxy
cable modem
A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. certificate authority DES company disaster recovery firm fingerprint advisory board directory company
certificate authority
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: sniffing Trojan horse computer forensics tunneling misuse detection
computer forensics
Routers: connect different IP networks or subnetworks typically do not require any configuration by the network administrator use data link layer addresses to move packets that leave the subnet typically require only one TCP/IP address do less processing on packets than a layer 2 switch doe
connect different IP networks or subnetworks
Media access control refers to: security over floppy disks in a user environment controlling access to a media by more than one computer in a LAN the ability for a user to use multimedia equipment in a LAN the control over coax cable installed by a cable service provider the price of fiber optic cable
controlling access to a media by more than one computer in a LAN
________ controls fix a trespass into the network. corrective detective backup preventive mitigating
corrective
The biggest drawbacks to VLANs are their_________________. cost and management complexity size and contention contention and cost learning curve and contention speed and size
cost and management complexity
In the __________ step of the building-block process to network design, the network designer considers the relative cost of the technology options. needs analysis distribution layering technology design narrow and deep analysis cost assessment
cost assessment
What is a VPN?
creates a safe and encrypted connection over a less secure network, such as the internet. A Virtual Private Network is a way to extend a private network using a public network such as the internet. The name only suggests that it is a Virtual "private network" i.e. user can be part of a local network sitting at a remote location. It makes use of tunneling protocols to establish a secure connection.
An example of _____ of data would be if a computer virus eliminated files on that computer. disaster disruption controlled chaos intrusion destruction
destruction
________ controls discover unwanted events. detective mitigating corrective preventive backup
detective
__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. microware directional radio vertical omnidirectional
directional
A tornado that eliminates a network control center would be an example of a natural __________ disruption intrusion disaster controlled chaos destruction
disaster
A network switch failure is an example of a(n) ________ threat. intrusion disaster internal disruptive causal
disruptive
To snare intruders, many organizations now use _________ techniques. Trojan horse entrapment DES hacker cracker
entrapment
When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution. delimited spun firefought burst escalated
escalated
IP spoofing means to: illegally tape or listen in on telephone conversations act as an intermediate host computer between the Internet and the rest of the organization's networks fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network detect and prevent denial-of-service attacks clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation
fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
A switch uses a _____________ that is very similar to a routing table used in a router. reversing table cable plan forwarding table network server switching mullion
forwarding table
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. full mesh design ring design star design bus design partial mesh design
full mesh design
When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: out of range problem hidden node problem media access problem controlled access problem collision problem
hidden node problem
Documentation for network and application software: includes information about which data files each user can access is not generally needed since networks are comprised of hardware only usually does not include information about the network operating system is important for monitoring adherence to software license rules usually does not include information about any special purpose network software
is important for monitoring adherence to software license rules
To estimate costs for large network purchases, organizations often: ask other companies for an itemized list of their previous year's IT equipment purchases issue an RFP to vendors purchase all network purchases "off the shelf" obtain "book value" information for the existing network from the accounting department multiply old network costs by a factor of 3
issue an RFP to vendors
Which of the following is a primary advantage of a VPN in comparison to a private WAN connection? low cost inflexibility unpredictable traffic congestion security complexity to the user
low cost
In a ring design WAN, messages can take a long time to travel from the sender to the receiver a message arrives at all computers on the network simultaneously messages always arrive faster than in other types of layouts messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver messages always take one second to travel between sender and receiver
messages can take a long time to travel from the sender to the receiver
In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. needs analysis distribution layering technology design narrow and deep analysis cost assessment
needs analysis
__________ antennas transmit the signal in all directions. radio omnidirectional microware vertical directional
omnidirectional
A _____________ is a user's connection into a packet switched service. packet analog/digital device packet asynchronous/discrete device packet asymmetric/data transmission device packet assembly/disassembly device packet analyzer/decoder device
packet assembly/disassembly device
Devices in a rack are connected together using ___________. patch cables string servers modules chassis switches
patch cables
A _________ is a connection-oriented approach to sending packets on a packet switched service. permanent virtual circuit datagram histogram bursty packet fractional T-1 network
permanent virtual circuit
A logical bus topology: has a central control device, such as a mainframe is limited to short distances since devices like a hub or repeater cannot be used with this type of topology permits every message to be received by every computer on the bus, even when those messages are intended for other computers is always used by token ring protocol LANs has all computers connected to each other in point-to-point connections
permits every message to be received by every computer on the bus, even when those messages are intended for other computers
To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems. planning and organizing the network and networking staff fault log trouble ticket LAN manual troubleshooting log
planning and organizing the network and networking staff
A _________ is the place at which the ISP provides services to its customers. metropolitan area exchange network access point remote access point point-of-presence cable modem termination system endpoint
point-of-presence
Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. multipoint ring point-to-point shared star
point-to-point
The traditional network design approach does not work well for _________ networks. modestly growing not growing 71. Which of the following type of media is most commonly used in backbone networks because of its high capacity? *a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair static rapidly growing slowly evolving
rapidly growing
The key principle in preventing disruption, destruction and disaster is ___________. control spreadsheet redundancy prevention controls anti-virus software IDS
redundancy
Two primary disadvantages to the ______ BN type are that the routers in the network impose time delays, and routers are typically more expensive and require more management than switches. bridged backbone virtual LAN hubbed backbone collapsed backbone routed backbone
routed backbone
In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the user's needs. cost assessment technology design narrow and deep analysis needs analysis distribution layering
technology design
A brute force attack against an encryption system: is also known as 3DES tries to gain access by trying every possible key is part of the Advanced Encyrption Standard is called RC4 always uses the Rijndael algorithm
tries to gain access by trying every possible key
With a virtual private network, users can create permanent virtual circuits through the Internet called: bursts cells tunnels rings clouds
tunnels
The performance of WANs can be improved by: upgrading the circuits between the computers increasing the demand placed on the network downgrading the circuits between the computers downgrading the devices that provide access to the circuits increasing network traffic
upgrading the circuits between the computers
Switch-based Ethernet: has a logical topology of a ring has a logical topology of a bus uses a hub to connect computers has a physical topology of a ring usually enables all attached circuits to send or receive packets simultaneously
usually enables all attached circuits to send or receive packets simultaneously
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. local carrier network virtual private network integrated service digital network software defined network SONET network
virtual private network
Fiber to the Home uses time division multiplexing all of the above wavelength division multiplexing frequency division multiplexing statistical time division multiplexing
wavelength division multiplexing
A (n) ______ is a special type of virus that spreads itself without human intervention. stealth virus snake worm boot sector virus Trojan horse
worm