Network Pro Mid Term Prep

¡Supera tus tareas y exámenes ahora con Quizwiz!

A patch is a software solution to correct a security hole

True

ANSI is a voting participant in the ISO.

True

Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.

True

In 1874, Alexander Graham Bell developed the concept for the telephone.

True

In technology design, a network designer looks at available technologies to see which options will satisfy users' needs.

True

In the OSI model, the application layer is the end user's access to the network.

True

Macro viruses can spread when an infected file is opened.

True

Network management is the process to operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users.

True

Network management software is used by most large organization to monitor and control their networks.

True

Networks requirements can be divided into mandatory, desirable, and wish-list requirements.

True

The Telecommunications Act of 1996 now permits the RBOCs to provide long distance outside the region in which they provide local telephone services.

True

The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.

True

The future of network management lies in the management of LANs, BNs, and Internet resources instead of concentrating on mainframe resources

True

Newer telephone circuits, built during the last decade, offer higher quality because they were built using analog transmission.

False

Nonreturn to zero is a type of unipolar signaling

False

Problem statistics are not helpful in determining whether vendors are meeting contractual maintenance commitments.

False

The amount of time it takes to switch between sending and receiving in half-duplex transmission is called the propagation delay.

False

Today, all network traffic is due to traffic from internal application systems.

False

Network cables are the easiest target for eavesdropping.

False

Application management software monitors devices such as routers, hubs and switches

False

Desktop Management software requires managers to install software on client computers manually.

False

Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.

False

Fault-intolerant servers contain many redundant components to prevent failure

False

If managers do not pay enough attention to planning and organizing the network, they are going to end up being proactive vs. reactive in solving network problems.

False

In a multipoint circuit configuration, each computer can use the circuit at the same time.

False

In transport mode, IPSec encrypts the entire IP packet.

False

Wavelength division multiplexing can only used with copper cables.

False

A car manufacturer may give access to certain portions of its network to some of its suppliers via Internet. This is an example of an Extranet.

True

Capacity planning is used to design circuit capacity.

True

Common carriers include the RBOCs, IXCs, and Cable TV companies.

True

Computers produce digital data whose values are binary: 0 or 1.

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

True

Cost assessment is the step in the network design in which many complex factors related to costs are documented.

True

Cost assessment is used to look at the relative cost of technologies used in a network design.

True

One key to integrating diverse networks in an organization is for the individual network managers to realize that they no longer wield the same amount of power.

True

One of the most commonly used network management protocols is Common Management Interface Protocol.

True

One perspective of data communications and networking as stated in the textbook, examines the management of networking technologies, including security, network design, and managing the network on a day-to-day basis and long term basis.

True

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

True

Simulation is a tool that can be used in designing networks.

True

Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits.

True

The "local loop" refers to the wires that run from the customer premises to the telephone switch of the telephone company.

True

The network layer is responsible for routing messages from the source computer to the destination computer.

True

The physical layer is a layer where two communicating nodes are directly connected.

True

The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.

True

The specification stage of the de juro standardization process consists of developing nomenclature and identifying the problems to be addressed.

True

To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network

True

Today, the critical issue of network management is managing only the mainframe's network.

True

Traffic analysis involves determining why some circuits are heavily used.

True

Trouble tickets are reports produced by a software package that records fault information.

True

When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.

True


Conjuntos de estudio relacionados

Social psych final exam questions

View Set

PCP - Chapter 11: Corporate Reporting and Analysis

View Set

Animal Science Final Exam Part 1

View Set

Child Development (Eric Erikson)

View Set

Module 1 assessment practice qs

View Set