Teleinformatica3

¡Supera tus tareas y exámenes ahora con Quizwiz!

ISPs usually offer QoS guarantees to

business customers

ISPs usually offer QoS guarantees to ________.

business customers

Creating routing tables is an example of ________.

control

Creating switching tables is an example of ________.

control

In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. You and three others are transmitting or receiving at a particular moment. What speed should you expect to get?

1.25Mbps

In a coffee shop hot spot, the rated speed is 10Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. You and three others are transmitting or receiving at a particular moment. What speed should you expect to get

1.25Mbps

Adding applications that cannot tolerate jitter may require ________. Select one: A. switch upgrades B. improved switch management C. improved security D. All of these

A

Control is done on individual switches and routers in ________. Select one: A. traditional operation B. SDN C. both traditional operation and SDN D. neither traditional operation nor SDN

A

Forwarding functions are located in routers in ________. Select one: A. traditional operation B. SDN C. both traditional operation and SDN D. neither traditional operation nor SDN

A

Routing packets is an example of ________. Select one: A. forwarding B. routing complexity C. hardwiring D. control

A

SDN holds the promise of bringing ________. Select one: A. lower cost B. lower agility C. both lower cost and lower agility D. neither lower cost nor lower agility

A

SNMP network management ________.SNMP network management ________. Select one: A. decreases total cost B. increases total cost C. does not affect total cost D. causes arthritis

A

________ is the percentage of time that a network is available for use. Select one: A. Availability B. Downtime C. QoS D. None of these

A

SNMP Set commands for

Ask agents for information about the managed device AND

________ is the percentage of time that a network is available for use.

Availability

ComCompared to priority, overprovisioning capacity can reduce ________. Select one: A. equipment cost B. management labor C. both equipment cost and management labor D. neither equipment cost nor management laborpared to priority, overprovisioning capacity can reduce ________.

B

If you have 10 sites connected by 7 transmission links, how many columns will you have in your traffic table? Select one: A. 14 B. 7 C. 20 D. 10

B

In SDN, applications ________.In SDN, applications ________. Select one: A. increase network management labor B. are required to make SDN work effectively C. both increase network management labor and are required to make SDN work effectively D. neither increase network management labor nor are required to make SDN work effectively

B

In a coffee shop, there are ten people sharing an access point with a rated speed of 2Gbps. The throughput is half the rated speed. If each person downloading is getting an average of 200Mbps, how many people are using the Internet at that moment? Select one: A. 10 B. 5 C. 2 D. None of these

B

SNMP Set commands can ________. Select one: A. ask agents for information about the managed device B. change router operation C. both ask agents for information about the managed device and change router operation D. neither ask agents for information about the managed device nor change router operation

B

The SNMP ________ command changes how managed devices operate. Select one: A. Get B. Set C. both Get and Set D. neither Get nor Set

B

Which of the following is NOT governed by the SNMP standard? Select one: A. network management program B. network visibility program C. agents D. MIB

B

Which of the following usually has higher availability? Select one: A. data networks B. public switched telephone network (PSTN) C. Both of these usually have equal availability. D. neither data networks nor public switched telephone network (PSTN)

B

SNMP Set commands can

Both route traffic and ask agents for information about the managed device

Compared to priority, overprovisioning capacity can reduce ________. Select one: A. equipment cost B. management labor C. both equipment cost and management labor D. neither equipment cost nor management labor

C

For analysis, network administrators usually interact primarily with ________. Select one: A. the network management program B. the MIB C. the network visualization program D. agents

C

In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. If you and three others are transmitting or receiving at the same time, what speed should you expect to get? Select one: A. 0.5 Mbps B. 1 Mbps C. 1.25 Mbps D. None of these

C

Momentary traffic peaks can lead to ________. Select one: A. latency B. packet loss C. both latency and packet loss D. neither latency nor packet loss

C

SDN can ________. A) permit routing rules to be changed rapidly B) reduce router costs C) both A and B D) neither A nor B

C

Ping tells you ________. A) that a host is reachable B) latency in the connection to the host C) both A and B D) neither A nor B

C) both A and B: that a host is reachable latency in the connection to the host

Traffic shaping may ________ traffic that is undesirable. A) prohibit B) limit C) both A and B D) neither A nor B

C) both A and B: prohibit limit

If you have 10 sites connected by 7 transmission links, how many rows of traffic data will you have in your traffic table? Select one: A. 14 B. 7 C. 20 D. 10

D

Which of the following reduces momentary traffic peaks by controlling how much traffic is allowed into the network? A) overprovisioning B) priority C) QoS guarantees D) none of the above

D) none of the above

An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)

Defense in depth

In SNMP, the manager communicates directly with the managed device.

False

Priority is a way to handle a chronic lack of capacity.

False

Variability in delay is called ________.

Jitter

When a packet travels through a network, the time it takes to get from the sender to the reciever is called

Latency

QoS is quantified through

Metrics

An SLA for availability should specify a

Minimum Availability

________ can be addressed by using priority.

Momentary traffic peaks

A packet will definitely get through is it was

QoS reserved capacity and priority

Balancing threats against protection costs is called ________.

Risk analysis

In SDN, which device manages the control function for individual devices

SDN controller

In SDN, which device manages the control function for individual devices?

SDN controller

Guarantees for quality of service are called ________

SLAs

SNMP ___ commands can change how managed devices operate

Set

The SNMP ________ command changes how managed devices operate.

Set

Compared to network demand, network budgets are growing

Slower

Compared to network demand, network budgets are growing ________

Slower

Routers and switches must support ________.

Southbound APIs

Errors may substantially reduce throughput in

TCP

Errors may substantially reduce throughput in ________.

TCP

Throughput is

The speed a network actually provides to users

Which of the following tells you the cumulative round-trip latency to each router along the route to the host?

Traceroute

Overprovisioning means

adding much more switching and transmission line capacity than will be needed most of the time

Overprovisioning means ________

adding much more switching and transmission line capacity than will be needed most of the time

If throughput falls substantially below a QoS guarantees speed, the ISP

always pays a penalty

Transmission speed is measured in

bits per second

An attacker must break through two firewalls to get to a host. This illustrates the principle called

defense in depth

Which of the following is the easiest to understand?

firewall policies

Which of the following is true

guidelines must be considered

Attackers only need to find a single weakness to break in. Consequently, companies must ________.

have comprehensive security

Vulnerabilities are occasionally found in even the best security products. Consequently, companies must

have defense in depth

Compared to other methods for reducing problems during momentary traffic peaks, overprovisioning

increases capital cost

Users of an access point share the transmission capacity of the access point. The throughput a user gets is

individual throughput

Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.

individual throughput

Error rates can soar when the network traffic level

is at a high level

Error rates can soar when the network traffic level ________.

is at a high level

Variability in delay is called

jitter

When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________.

latency

Priority is assigning high priority to ___ applications while giving low priority to ___ applications

latency-intolerant, latency-tolerant

The business benefit of multiplexing is ________.

lower cost

An SLA specifies ________.

maximum jitter

And SLA for jitter should specify a

maximum jitter

An SLA specifies ________.

maximum latency

If throughput falls substantially below a QoS guaranteed speed, the ISP ________.

may pay a penalty

QoS is quantified through ________.

metrics

Communication between SDN applications and SDN controllers is governed by ________.

northbound APIs

Communication between SDN controllers and routers is governed by ________.

southbound APIs

Which of the following must be followed

standards

In SDN, a switch receives its forwarding table rules directly from ________.

the SDN controller

When a firewall policy server is used to manage SPI firewalls, what device creates specific

the policy server

Attacking your own firm occurs in

vulnerability testing

Oversight activities include

vulnerability testing

Oversight activities include ________.

vulnerability testing

There is a single countermeasure in

weakest link

A policy specifies

what should be done

An SLA should specify

worse case

An SLA specifies the ________.

worst case

To determine if a host is reachable, you send a(n) ________.

ping

To determine if a host is reachable, you should send a(n)

ping

Policies are separated by implementation to take advantage of ________

implementer knowledge

The SNMP manager stores the information it receives from Get commands

in the MIB

The SNMP manager stores the information it receives from Get commands ________.

in the MIB

To handle momentary traffic peaks, which would you give higher priority to?

VoIP

SNMP Get commands can ________.

ask agents for information about the managed device

Actions that people are allowed to take on a resource come under the heading of

authorizations

___ is the percentage of time that a network is available for use

availability

Transmission speed is normally measured in

bits per second

Transmission speed is normally measured in ________.

bits per second

Using the SNMP Set command ________. A) saves management labor B) requires excellent security C) both A and B D) neither A nor B

both A and B

The damage of momentary traffic peaks can be addressed by ________. A) using priority B) adding more capacity C) both A and B D) neither A nor B

both A and B: A) using priority B) adding more capacity

Jitter is a problem for ________.

both voice over IP (VoIP) and streaming media

Error rates can soar when the network traffic level is at a(n) ________.

high level

Implementation guidance is less specific than

implementation

In QoS, the S stands for

service

Policies should drive

implementation and oversight

Policies are separated by implementation to take advantage of

implementer knowledge

An SLA for latency should specify a

maximum latency

Latency is usually measured in

milliseconds

Latency is usually measured in ________.

milliseconds (ms)

If someone has been properly authenticated, they should receive ___ permissions

minimum

An SLA specifies ________.

minimum availability

An SLA for speed should specify a

minimum speed

An SLA specifies ________.

minimum speed

Priority addresses the problem of

momentary traffic peaks

Trunk lines in the Internet core are ________.

multiplexed

Jitter is a problem for ________. A) downloading a file attached to an e-mail B) e-mail C) both A and B D) neither A nor B

neither A nor B

Overprovisioning is

neither wasteful of capacity nor highly labor-intensive

SNMP agents communicate with the ________.

network management program

Companies should ___ single point takeovers

pay special attention

Which of the following is NOT on of the four major security planning principles

perimeter defense

Another term for authorization is

permission

Which phase of the plan-project-respond cycle takes the largest amount of work

protect

Which of the following usually has higher availability?

public switched telephone network (PSTN)

Balancing threats against protection protection costs is called

risk analysis

Ping tells you ________.

round-trip latency

Using standard configurations ________.

saves money

Momentary traffic peaks usually last a few ________ or less.

seconds

In QoS, the S stands for ________.

service

Throughput is ________.

the speed a network actually provides to users

SNMP agents can initiate ___

traps

SNMP agents can initiate ________

traps

SNMP agents can initiate ________.

traps

Which of the following is latency intolerant

video

Which of the following would recieve the highest priority

video packets


Conjuntos de estudio relacionados

AP Economics Firm Profit and Costs

View Set

HA prepU ch 17 heart and neck vessels

View Set

نظم المعلومات المحوسبة

View Set

Business Finance (Ch. 2) - Financial Statements, Taxes & Cash Flow

View Set

Medicare Part A (Hospital Insurance) Original Medicare

View Set

Bio Phillips Chapter 9 Test Review

View Set

Methods in cultural anthropology

View Set