Teleinformatica3
ISPs usually offer QoS guarantees to
business customers
ISPs usually offer QoS guarantees to ________.
business customers
Creating routing tables is an example of ________.
control
Creating switching tables is an example of ________.
control
In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. You and three others are transmitting or receiving at a particular moment. What speed should you expect to get?
1.25Mbps
In a coffee shop hot spot, the rated speed is 10Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. You and three others are transmitting or receiving at a particular moment. What speed should you expect to get
1.25Mbps
Adding applications that cannot tolerate jitter may require ________. Select one: A. switch upgrades B. improved switch management C. improved security D. All of these
A
Control is done on individual switches and routers in ________. Select one: A. traditional operation B. SDN C. both traditional operation and SDN D. neither traditional operation nor SDN
A
Forwarding functions are located in routers in ________. Select one: A. traditional operation B. SDN C. both traditional operation and SDN D. neither traditional operation nor SDN
A
Routing packets is an example of ________. Select one: A. forwarding B. routing complexity C. hardwiring D. control
A
SDN holds the promise of bringing ________. Select one: A. lower cost B. lower agility C. both lower cost and lower agility D. neither lower cost nor lower agility
A
SNMP network management ________.SNMP network management ________. Select one: A. decreases total cost B. increases total cost C. does not affect total cost D. causes arthritis
A
________ is the percentage of time that a network is available for use. Select one: A. Availability B. Downtime C. QoS D. None of these
A
SNMP Set commands for
Ask agents for information about the managed device AND
________ is the percentage of time that a network is available for use.
Availability
ComCompared to priority, overprovisioning capacity can reduce ________. Select one: A. equipment cost B. management labor C. both equipment cost and management labor D. neither equipment cost nor management laborpared to priority, overprovisioning capacity can reduce ________.
B
If you have 10 sites connected by 7 transmission links, how many columns will you have in your traffic table? Select one: A. 14 B. 7 C. 20 D. 10
B
In SDN, applications ________.In SDN, applications ________. Select one: A. increase network management labor B. are required to make SDN work effectively C. both increase network management labor and are required to make SDN work effectively D. neither increase network management labor nor are required to make SDN work effectively
B
In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? Select one: A. 10 B. 5 C. 2 D. None of these
B
SNMP Set commands can ________. Select one: A. ask agents for information about the managed device B. change router operation C. both ask agents for information about the managed device and change router operation D. neither ask agents for information about the managed device nor change router operation
B
The SNMP ________ command changes how managed devices operate. Select one: A. Get B. Set C. both Get and Set D. neither Get nor Set
B
Which of the following is NOT governed by the SNMP standard? Select one: A. network management program B. network visibility program C. agents D. MIB
B
Which of the following usually has higher availability? Select one: A. data networks B. public switched telephone network (PSTN) C. Both of these usually have equal availability. D. neither data networks nor public switched telephone network (PSTN)
B
SNMP Set commands can
Both route traffic and ask agents for information about the managed device
Compared to priority, overprovisioning capacity can reduce ________. Select one: A. equipment cost B. management labor C. both equipment cost and management labor D. neither equipment cost nor management labor
C
For analysis, network administrators usually interact primarily with ________. Select one: A. the network management program B. the MIB C. the network visualization program D. agents
C
In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? Select one: A. 0.5 Mbps B. 1 Mbps C. 1.25 Mbps D. None of these
C
Momentary traffic peaks can lead to ________. Select one: A. latency B. packet loss C. both latency and packet loss D. neither latency nor packet loss
C
SDN can ________. A) permit routing rules to be changed rapidly B) reduce router costs C) both A and B D) neither A nor B
C
Ping tells you ________. A) that a host is reachable B) latency in the connection to the host C) both A and B D) neither A nor B
C) both A and B: that a host is reachable latency in the connection to the host
Traffic shaping may ________ traffic that is undesirable. A) prohibit B) limit C) both A and B D) neither A nor B
C) both A and B: prohibit limit
If you have 10 sites connected by 7 transmission links, how many rows of traffic data will you have in your traffic table? Select one: A. 14 B. 7 C. 20 D. 10
D
Which of the following reduces momentary traffic peaks by controlling how much traffic is allowed into the network? A) overprovisioning B) priority C) QoS guarantees D) none of the above
D) none of the above
An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)
Defense in depth
In SNMP, the manager communicates directly with the managed device.
False
Priority is a way to handle a chronic lack of capacity.
False
Variability in delay is called ________.
Jitter
When a packet travels through a network, the time it takes to get from the sender to the reciever is called
Latency
QoS is quantified through
Metrics
An SLA for availability should specify a
Minimum Availability
________ can be addressed by using priority.
Momentary traffic peaks
A packet will definitely get through is it was
QoS reserved capacity and priority
Balancing threats against protection costs is called ________.
Risk analysis
In SDN, which device manages the control function for individual devices
SDN controller
In SDN, which device manages the control function for individual devices?
SDN controller
Guarantees for quality of service are called ________
SLAs
SNMP ___ commands can change how managed devices operate
Set
The SNMP ________ command changes how managed devices operate.
Set
Compared to network demand, network budgets are growing
Slower
Compared to network demand, network budgets are growing ________
Slower
Routers and switches must support ________.
Southbound APIs
Errors may substantially reduce throughput in
TCP
Errors may substantially reduce throughput in ________.
TCP
Throughput is
The speed a network actually provides to users
Which of the following tells you the cumulative round-trip latency to each router along the route to the host?
Traceroute
Overprovisioning means
adding much more switching and transmission line capacity than will be needed most of the time
Overprovisioning means ________
adding much more switching and transmission line capacity than will be needed most of the time
If throughput falls substantially below a QoS guarantees speed, the ISP
always pays a penalty
Transmission speed is measured in
bits per second
An attacker must break through two firewalls to get to a host. This illustrates the principle called
defense in depth
Which of the following is the easiest to understand?
firewall policies
Which of the following is true
guidelines must be considered
Attackers only need to find a single weakness to break in. Consequently, companies must ________.
have comprehensive security
Vulnerabilities are occasionally found in even the best security products. Consequently, companies must
have defense in depth
Compared to other methods for reducing problems during momentary traffic peaks, overprovisioning
increases capital cost
Users of an access point share the transmission capacity of the access point. The throughput a user gets is
individual throughput
Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
individual throughput
Error rates can soar when the network traffic level
is at a high level
Error rates can soar when the network traffic level ________.
is at a high level
Variability in delay is called
jitter
When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________.
latency
Priority is assigning high priority to ___ applications while giving low priority to ___ applications
latency-intolerant, latency-tolerant
The business benefit of multiplexing is ________.
lower cost
An SLA specifies ________.
maximum jitter
And SLA for jitter should specify a
maximum jitter
An SLA specifies ________.
maximum latency
If throughput falls substantially below a QoS guaranteed speed, the ISP ________.
may pay a penalty
QoS is quantified through ________.
metrics
Communication between SDN applications and SDN controllers is governed by ________.
northbound APIs
Communication between SDN controllers and routers is governed by ________.
southbound APIs
Which of the following must be followed
standards
In SDN, a switch receives its forwarding table rules directly from ________.
the SDN controller
When a firewall policy server is used to manage SPI firewalls, what device creates specific
the policy server
Attacking your own firm occurs in
vulnerability testing
Oversight activities include
vulnerability testing
Oversight activities include ________.
vulnerability testing
There is a single countermeasure in
weakest link
A policy specifies
what should be done
An SLA should specify
worse case
An SLA specifies the ________.
worst case
To determine if a host is reachable, you send a(n) ________.
ping
To determine if a host is reachable, you should send a(n)
ping
Policies are separated by implementation to take advantage of ________
implementer knowledge
The SNMP manager stores the information it receives from Get commands
in the MIB
The SNMP manager stores the information it receives from Get commands ________.
in the MIB
To handle momentary traffic peaks, which would you give higher priority to?
VoIP
SNMP Get commands can ________.
ask agents for information about the managed device
Actions that people are allowed to take on a resource come under the heading of
authorizations
___ is the percentage of time that a network is available for use
availability
Transmission speed is normally measured in
bits per second
Transmission speed is normally measured in ________.
bits per second
Using the SNMP Set command ________. A) saves management labor B) requires excellent security C) both A and B D) neither A nor B
both A and B
The damage of momentary traffic peaks can be addressed by ________. A) using priority B) adding more capacity C) both A and B D) neither A nor B
both A and B: A) using priority B) adding more capacity
Jitter is a problem for ________.
both voice over IP (VoIP) and streaming media
Error rates can soar when the network traffic level is at a(n) ________.
high level
Implementation guidance is less specific than
implementation
In QoS, the S stands for
service
Policies should drive
implementation and oversight
Policies are separated by implementation to take advantage of
implementer knowledge
An SLA for latency should specify a
maximum latency
Latency is usually measured in
milliseconds
Latency is usually measured in ________.
milliseconds (ms)
If someone has been properly authenticated, they should receive ___ permissions
minimum
An SLA specifies ________.
minimum availability
An SLA for speed should specify a
minimum speed
An SLA specifies ________.
minimum speed
Priority addresses the problem of
momentary traffic peaks
Trunk lines in the Internet core are ________.
multiplexed
Jitter is a problem for ________. A) downloading a file attached to an e-mail B) e-mail C) both A and B D) neither A nor B
neither A nor B
Overprovisioning is
neither wasteful of capacity nor highly labor-intensive
SNMP agents communicate with the ________.
network management program
Companies should ___ single point takeovers
pay special attention
Which of the following is NOT on of the four major security planning principles
perimeter defense
Another term for authorization is
permission
Which phase of the plan-project-respond cycle takes the largest amount of work
protect
Which of the following usually has higher availability?
public switched telephone network (PSTN)
Balancing threats against protection protection costs is called
risk analysis
Ping tells you ________.
round-trip latency
Using standard configurations ________.
saves money
Momentary traffic peaks usually last a few ________ or less.
seconds
In QoS, the S stands for ________.
service
Throughput is ________.
the speed a network actually provides to users
SNMP agents can initiate ___
traps
SNMP agents can initiate ________
traps
SNMP agents can initiate ________.
traps
Which of the following is latency intolerant
video
Which of the following would recieve the highest priority
video packets