Telecom Test 3 (Ch 9, 10, 11, 12)

¡Supera tus tareas y exámenes ahora con Quizwiz!

The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society

e. Internet Society

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees

a. Delphi team member

___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept. a. Service level agreements b. Trouble tickets c. Smart hub lists d. Bursty router printouts e. Wish list documentation

a. Service level agreements

Some of the new applications being developed for a high-speed Internet include a. Tele-immersion b. Tele-conferencing c. QoS d. Broadband e. Tele-phoning

a. Tele-immersion

Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user

a. low cost

A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard

a. tries to gain access by trying every possible key

A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster

b. disruptive

Most IP services use _______ as the data link layer protocol. a. Ethernet b. TCP c. MPLS d. IRoute e. T1

c. MPLS

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster

d. destruction

A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. a. Quality control chart b. Quality of service c. Service leveling chart d. Desktop management e. Alarm cloud

a. Quality control chart

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. WLANs b. intranet c. extranet d. WAN e. none of the above

a. WLANs

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion

a. disaster

To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES

a. entrapment

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

a. messages can take a long time to travel from the sender to the receiver

Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only

b. provides a communications circuit with two 64 Kbps B channels, plus one D channel

Which of the following is typically not a part of configuration documentation? a. hardware documentation b. sales brochures for new hardware products being considered by the organization c. user profiles d. network software documentation e. software documentation

b. sales brochures for new hardware products being considered by the organization

Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches

c. Trojans

Most WiMAX providers in the US are using an effective data range of a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles

a. 0.5 to 1.5 miles

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

a. 1.544 Mbps

OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps

a. 159.25 Gbps

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users. a. Charge-back b. Web spinning c. Internet access fees d. Support staff billing e. ESD

a. Charge-back

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs

a. Common carriers

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD

a. DSLAM

__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids

a. Digital signatures

__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software. a. Fault management b. Fault tolerance c. Firefighting d. Performance management e. Troubleshooting

a. Fault management

Tier 1 ISPs connect together and exchange data at ___________. a. IXPs b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center

a. IXPs

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP

a. L2TP

_____________ are used by many large and small organizations to monitor and control their networks today. a. Network management software packages b. Firefighter packages c. Fault creating packages d. Fault toleraters e. NICs

a. Network management software packages

____________ refers to keeping track of the operation of network circuits to make sure they are working properly. a. Network monitoring b. Fault tolerance c. Fault management d. Firefighting e. Downtime

a. Network monitoring

Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.

a. On a circuit, the shorter the distance, the higher the speed.

With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. a. PAD b. gateway c. switch d. router e. WAN

a. PAD

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.

a. The data transmission rates tend to be lower than dial-up or dedicated circuits.

_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks

a. Threat scenarios

_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering

a. Triple DES

Which of the following is not a basic function of a network manager? a. Web surfing to shop on eBay b. cost management c. performance and fault management d. configuration management e. end user support

a. Web surfing to shop on eBay

A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits

a. algorithm

A fundamental technique to determine if an intrusion is in progress in a stable network is: a. anomaly detection b. armoring cable c. RSA algorithm d. patching e. scanning a user's fingerprint

a. anomaly detection

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall

a. application level firewall

Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps

a. are supported with gigabit fiber optic networks in large cities

A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design

a. asset

________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup

a. corrective

In general, tier 3 ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs

a. customers

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming

a. denial-of-service attack

In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic

a. failure in one circuit means that the network can most likely continue to function

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable

a. fiber optics

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. a. firewall b. token system c. ANI d. call-back modem e. firefighter

a. firewall

IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization's networks

a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design

a. full mesh design

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit

a. giga, gigabit

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs

a. imposes an overhead cost by increasing network traffic

Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

a. intrusion

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only

a. is typically offered only to commercial customers

Which of the following is not considered a key management task for running a network? a. knowledge of frame relay b. planning c. organizing activities d. directing activities e. controlling activities

a. knowledge of frame relay

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point

a. line splitter

A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system

a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

Which of the following is not an important step in reducing network costs? a. moving to fat client architectures b. automating as much of the network management process as possible c. developing standards for computers on the network d. reducing the time spent manually installing new software e. centralizing help desks

a. moving to fat client architectures

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth

a. often have weaker security.

A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall

a. packet level firewall

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network

a. permanent virtual circuit

To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems. a. planning and organizing the network and networking staff b. LAN manual c. fault log d. trouble ticket e. troubleshooting log

a. planning and organizing the network and networking staff

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability

a. prestige value of using a particular common carrier

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup

a. preventive

The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls

a. redundancy

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan

a. risk assessment

For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming

a. secure

The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic

a. upgrading the circuits between the computers

Which of the following is not one of the three major sources of a user's equipment problem that can be solved by network support? a. use of the CD-ROM as a cup holder b. failed hardware device c. lack of user knowledge d. incompatibility between user software and network hardware and software e. none of the above is an appropriate answer

a. use of the CD-ROM as a cup holder

_____________ is the percentage of time the network is usable by users. a. Retransmission rate b. Availability c. MTTDiagnose d. Downtime e. MTBF

b. Availability

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

b. Internet Engineering Task Force

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines

b. Internet service providers

__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay

b. Latency

_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP

b. MPLS

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT firewall c. IP spoofing bridge d. packet level firewall e. smart hub

b. NAT firewall

__________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

b. Peering

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking

b. Peering

_____________ helps ensure that critical problems get priority over less important ones. a. Protocol analyzing b. Problem prioritizing c. Uptime d. Availability e. Reliability

b. Problem prioritizing

____________ are reports produced by numerous network software packages for recording fault information. a. Wish list documentation b. Trouble tickets c. Smart hub lists d. Bursty router printouts e. Roger systems checks

b. Trouble tickets

Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards

b. connecting optical-electrical converters

Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements

b. controls

Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above is an appropriate answer

b. data link-based

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

b. dependent upon the capacity of the central computer for its performance

A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server

b. remote-access server.

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

b. require more processing by each computer in the network than in star or ring networks

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

b. virtual private network

Fiber to the Home uses a. frequency division multiplexing b. wavelength division multiplexing c. time division multiplexing d. statistical time division multiplexing e. all of the above

b. wavelength division multiplexing

A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus

b. worm

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. 9000 b. 8.4 c. 1.5 d. 650 e. 6.1

c. 1.5

WiMAX was designed to use the _______ frequencies. a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz

c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ

In-class training for end users should focus on a. security exclusively b. all network topics c. 20% of the network functions that the user will use 80% of the time d. proper data entry e. the half of the applications that this particular uses most of the time

c. 20% of the network functions that the user will use 80% of the time

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36

c. 24

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. a. 100 b. 250 c. 400 d. 750

c. 400

The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

c. 44.376 Mbps

The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN a. FCC b. CRTC c. CSU d. POTS

c. CSU

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM

c. CSU/DSU

At the DSL customer premises is a device called a(n) a. cable modem b. DSL router c. DSL modem d. Internet router e. DSL bridge

c. DSL modem

A DSL modem is also known as a: a. DSL bridge b. DSL brouter c. DSL router d. DSL gateway e. DSL hub

c. DSL router

Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM

c. DSLAM

____________ is also called automatic software distribution. a. Electronic Data Interchange b. Software architecture c. Desktop management d. Automatic configuration management e. Email Software Uploading

c. Desktop management

WiMax was designed to easily connect into existing ___________. a. wide area networks b. backbone networks c. Ethernet LANs d. ATM backbones e. FTTH

c. Ethernet LANs

The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

c. Internet Engineering Steering Committee

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion.

c. Network address translation

In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 3 e. WAP proxy

c. Next Generation Internet

Desktop management: a. increases the cost of configuration management over the long term b. requires managers to install software manually on client computers c. automatically produces documentation of software installed on each client computer d. can not maintain documentation of software installed on each client computer e. decreases costs in the short term

c. automatically produces documentation of software installed on each client computer

Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh

c. bus

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design

c. cloud-based mesh design

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

c. connects all computers to one central computer that routes messages to the appropriate computer

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

c. controlled chaos

For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point

c. customer premises

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

c. datagram

A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring

c. encryption

When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution. a. firefought b. spun c. escalated d. burst e. delimited

c. escalated

The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. hacking b. ethical politics c. hacktivism d. social engineering e. brute force attacks

c. hacktivism

DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm

c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

A __________ is an organizational department that is responsible for monitoring and fixing overall network problems. a. mission critical area b. fault tolerance department c. network operations center d. mullion delimiter agency e. Web surfing guru headquarters

c. network operations center

We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event

c. risk score

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design

c. threat

A costing method that examines only the direct costs of operating the computers, omitting softer indirect costs such as "wasted" time is referred to as a. total cost of ownership b. network cost of ownership c. transactions costs d. ownership privileges e. total direct costs

c. transactions costs

Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter

c. tunnel

With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds

c. tunnels

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk

c. uninterruptible power supply

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities

c. uses inverse multiplexing above the OC-1 level

Most organizations strive to resolve between _______ of requests at the first level of support in less than an hour. a. 10% and 15% b. 20% and 30% c. 50% and 55% d. 75% and 85% e. 95% and 99%

d. 75% and 85%

___________ refers to managing and documenting the network's hardware and software configuration. a. Visioning b. Troubleshooting c. Firefighting d. Configuration management e. Implementation

d. Configuration management

______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks

d. Dedicated-circuit networks

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan. a. Panicking b. Multiplexing c. Multitasking d. Firefighting e. Fireflying

d. Firefighting

Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. a. gigapop b. autonomous system c. ISP d. IXP e. Service provider

d. IXP

_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. a. MTBF b. Availability c. MTTRespond d. MTTDiagnose e. MTTRate

d. MTTDiagnose

______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. a. MTTDiagnose b. MTTRespond c. MTBF d. MTTFix e. MTTRate

d. MTTFix

___________ ensures that the network is operating as efficiently as possible. a. Firefighting b. Fault tolerance c. Fault management d. Performance management e. Troubleshooting

d. Performance management

Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety

d. Social

Which of the following is one of the tier 1 ISPs in North America? a. IETF b. IEEE c. IAB d. Sprint e. ISOC

d. Sprint

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch

d. Subscriber

Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location

d. T-1 VPN

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN

d. T-carrier services

________ is a measure of how much it costs per year to keep one computer operating. a. Web gardening b. Software installation cost c. Hardware upgrade cost d. Total cost of ownership e. Support staff cost

d. Total cost of ownership

A sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program

d. a program that records all LAN messages received for later (unauthorized) analysis

Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization

d. both inside and outside of the organization

A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet

d. cable modem

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system

d. cable modem termination system

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board

d. certificate authority

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. a. modem b. router c. bridge d. combiner e. CMTS

d. combiner

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection

d. computer forensics

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

d. disguising information by the use of mathematical rules, known as algorithms

A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node

d. distribution hub

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information. a. voice-activated b. bursty c. faulty d. dumb e. intelligent

d. dumb

Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax

d. hybrid fiber coax

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications

d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster

d. intrusion

The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3

d. local loop

In a DSL environment, local loops from many customers enter and are connected to the a. central office b. computer center c. main central office d. main distribution center e. rack

d. main distribution center

A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall

d. mission critical application

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times

d. moving data further from the applications and people who use them

A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device

d. packet assembly/disassembly device

Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network

d. packet switched network

A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange

d. point-of-presence

_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup

d. preventive

Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT

d. public utilities commission

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design

d. ring design

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode

d. sits between IP at the network layer and TCP/UDP at the transport layer

Which of the following is not a main function within end user support? a. resolving network faults b. training c. resolving user problems d. spin control e. none of these answers are appropriate

d. spin control

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design

d. star design

Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS? a. stats on multiplexers b. stats on modems c. stats on circuits in the network d. stats on user response times e. stats on malfunctioning devices

d. stats on user response times

Which of the following are usually the first choice for eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. local cables owned by the organization d. wireless LANs e. fiber optics

d. wireless LANs

The maximum download data rate for cable modem systems is currently a. 1 Mbps b. 1.44 Mbps c. 5 Mbps d. 100 Mbps e. 150 Mbps

e. 150 Mbps

___________ provides information about configuration management on a network. a. Circuit management software b. Device management software c. System management software d. Application management software e. Desktop management software

e. Desktop management software

The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

e. Internet Research Task Force

Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. Internet2

e. Internet2

_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails. a. MTTDiagnose b. MTTRespond c. MTTRepair d. MTTFix e. MTBF

e. MTBF

_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions. a. Faulty b. Bursty c. Trouble tickets d. Voice-activated e. Managed devices

e. Managed devices

___________ allows the network manager to determine who is responsible for correcting any outstanding problems. a. Load balancing b. MTBF c. Availability d. Reliability e. Problem tracking

e. Problem tracking

Which of the following is not true about one-time passwords? a. Users' pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system.

e. They create a packet level firewall on the system.

Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband

e. broadband

Documentation for network and application software: a. usually does not include information about the network operating system b. usually does not include information about any special purpose network software c. includes information about which data files each user can access d. is not generally needed since networks are comprised of hardware only e. is important for monitoring adherence to software license rules

e. is important for monitoring adherence to software license rules

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter

e. optical-electrical converter

Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time e. performing social engineering

e. performing social engineering

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices

e. unlocked wiring closet for network devices


Conjuntos de estudio relacionados

Accounting Standards Organizations

View Set

Trigonometry 7-1 Basic Trig Identities

View Set

Range Plant ID (characteristics)

View Set

Types Of Health Insurance Policies Q&A

View Set

quarter final 3 (naming and chemical quantities)

View Set

Chapter One Biology (The Starting Point: The Scientific Method)

View Set

Chapter 13- PNS, Chapter 12A-B: A&P, Chapter 12B- A&P

View Set

Renaissance, Reformation, Sci Revolution, Enlightenment, Absolute Monarchs test

View Set