Business Data Communications & Networking final review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The data rate for a T-1 circuit in North America is: 1.544 Mbps 6.312 Mbps 44.376 Mbps 274.176 Mbps 1.544 Gbps

1.544 Mbps

Which of the following is true regarding switched backbones? They place all network devices for one part of the building physically in the same room, often in a rack of equipment They have an advantage of requiring less cable They make it more difficult to move computers from one LAN to another Network capacity is always tied to the physical location of the computers They are harder to maintain and upgrade than a BN that is not rack-based

They place all network devices for one part of the building physically in the same room, often in a rack of equipment

difference between router and switch

-A router is a gateway between networks and belongs to two or more local networks -a switch belongs only to its local network

In North America, a T1 circuit has ______ 64Kbps channels. 2 30 24 12 36

24

The backbone architecture layer that is closest to the users is the Access layer Distribution layer Core layer Privacy layer Switched layer

Access layer

CSMA/CA is an acronym for: Carrier Sense Multiple Acknowledgment with Collision Avoidance Carrier Sensory Multiple Access without Collision Acknowledgment Carrier Sense Multiple Access with Collision Acknowledgment Carrier Sense Mode Access with Carrier Avoidance Carrier Sense Multiple Access with Collision Avoidance

Carrier Sense Multiple Access with Collision Avoidance

___________ refers to managing and documenting the network's hardware and software configuration. Configuration management Visioning Firefighting Troubleshooting Implementation

Configuration management

The _________ is the part of the backbone that connects the different backbones together. Access layer Distribution layer Core layer Privacy layer Switched layer

Core layer

Ethernet LAN was developed by: CERN laboratory in Geneva DEC, Xerox, and Intel University of Minnesota IBM ARPANET

DEC, Xerox, and Intel

___________ provides information about configuration management of client computers on a network. Desktop management software System management software Circuit management software Device management software Application management software

Device management software

The _______ is the part of the backbone that connects the LANs together. Access layer Distribution layer Core layer Privacy layer Switched layer

Distribution layer

Which of the following new Internet efforts was started by 34 universities? CA*net 3 NGI vBNS Internet2 ARDNOC

Internet2

___________ is how the network works conceptually. Physical topology Network topology Ethernet Media access control Logical topology

Logical topology

_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. MTTRespond MTBF MTTRate Availability MTTDiagnose

MTTDiagnose

_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions. Voice-activated Trouble tickets Bursty Managed devices Faulty

Managed devices

Which of the following statements is true in regards to DSL? On a circuit, the longer the distance, less attenuation occurs. When more attenuation occurs, higher frequency signals can be used effectively. On a circuit, the longer the distance, the higher the speed. On a circuit, the shorter the distance, the higher the speed. On a circuit, the shorter the distance, more attenuation occurs.

On a circuit, the shorter the distance, the higher the speed.

_____________ helps ensure that critical problems get priority over less important ones. Uptime Protocol analyzing Availability Reliability Problem prioritizing

Problem prioritizing

_________ move packets along the backbone based on their network layer address. Bridged backbones Hubbed backbones Multistation access unit backbones Routed backbones NIC backbones

Routed backbones

____ is the process of creating several logically separate servers on the same physical computer. Server proliferation Server redundancy Server virtualization Server platforming Server optimization

Server virtualization

___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept. Wish list documentation Smart hub lists Service level agreements Trouble tickets Bursty router printouts

Service level agreements

________ is used to model the behavior of the planned communication network once the proposed network map is complete. Simulation Post-implementation review Implementation Documentation Training users

Simulation

A __________ type of BN has a star topology with a switch at its center resulting in all devices on the BN segment being part of the same IP network. Bridged backbone Virtual LAN Hubbed backbone Switched backbone Routed backbone 815. Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building *c. use a star topology with one interconnect device, usually a switch d. switch the traffic based on layer 3 addresses e. require much more management that do routed backbone networks

Switched backbone

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. none of the above WLANs WAN extranet intranet

WLANs

A sniffer program is a: a program that records all LAN messages received for later analysis used in a call-back modem secure hub program small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location type of macro-virus

a program that records all LAN messages received for later analysis

A(n) ___________ is a radio transceiver that plays the same role as a hub in a wired network and connects the WLAN to the wired network. antennae access point Ethernet NIC hub wireless NIC

access point

Symmetric encryption systems have two parts: the key and the ____________. IP spoofer spamming method algorithm clearance code smart card bits

algorithm

Desktop management: requires managers to install software and application updates manually on client computers automatically produces documentation of software installed on each client computer decreases costs in the short term cannot maintain documentation of software installed on each client computer increases the cost of configuration management over the long term

automatically produces documentation of software installed on each client computer

A circuit that is filled almost to its capacity and thus is the critical point that determines whether users get good or bad response times is referred to as a(n) bottleneck congested network e-commerce edge breakneck building backbone

bottleneck

A digital service offered by cable companies is the _________. G.Lite ADSL Next Generation Internet Abilene network cable modem WAP proxy

cable modem

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. certificate authority DES company disaster recovery firm fingerprint advisory board directory company

certificate authority

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: sniffing Trojan horse computer forensics tunneling misuse detection

computer forensics

Routers: connect different IP networks or subnetworks typically do not require any configuration by the network administrator use data link layer addresses to move packets that leave the subnet typically require only one TCP/IP address do less processing on packets than a layer 2 switch doe

connect different IP networks or subnetworks

Media access control refers to: security over floppy disks in a user environment controlling access to a media by more than one computer in a LAN the ability for a user to use multimedia equipment in a LAN the control over coax cable installed by a cable service provider the price of fiber optic cable

controlling access to a media by more than one computer in a LAN

________ controls fix a trespass into the network. corrective detective backup preventive mitigating

corrective

The biggest drawbacks to VLANs are their_________________. cost and management complexity size and contention contention and cost learning curve and contention speed and size

cost and management complexity

In the __________ step of the building-block process to network design, the network designer considers the relative cost of the technology options. needs analysis distribution layering technology design narrow and deep analysis cost assessment

cost assessment

What is a VPN?

creates a safe and encrypted connection over a less secure network, such as the internet. A Virtual Private Network is a way to extend a private network using a public network such as the internet. The name only suggests that it is a Virtual "private network" i.e. user can be part of a local network sitting at a remote location. It makes use of tunneling protocols to establish a secure connection.

An example of _____ of data would be if a computer virus eliminated files on that computer. disaster disruption controlled chaos intrusion destruction

destruction

________ controls discover unwanted events. detective mitigating corrective preventive backup

detective

__________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons. microware directional radio vertical omnidirectional

directional

A tornado that eliminates a network control center would be an example of a natural __________ disruption intrusion disaster controlled chaos destruction

disaster

A network switch failure is an example of a(n) ________ threat. intrusion disaster internal disruptive causal

disruptive

To snare intruders, many organizations now use _________ techniques. Trojan horse entrapment DES hacker cracker

entrapment

When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution. delimited spun firefought burst escalated

escalated

IP spoofing means to: illegally tape or listen in on telephone conversations act as an intermediate host computer between the Internet and the rest of the organization's networks fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network detect and prevent denial-of-service attacks clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

A switch uses a _____________ that is very similar to a routing table used in a router. reversing table cable plan forwarding table network server switching mullion

forwarding table

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. full mesh design ring design star design bus design partial mesh design

full mesh design

When a computer transmits at the same time because it cannot sense that another computer on the WLAN is currently transmitting is referred to as the: out of range problem hidden node problem media access problem controlled access problem collision problem

hidden node problem

Documentation for network and application software: includes information about which data files each user can access is not generally needed since networks are comprised of hardware only usually does not include information about the network operating system is important for monitoring adherence to software license rules usually does not include information about any special purpose network software

is important for monitoring adherence to software license rules

To estimate costs for large network purchases, organizations often: ask other companies for an itemized list of their previous year's IT equipment purchases issue an RFP to vendors purchase all network purchases "off the shelf" obtain "book value" information for the existing network from the accounting department multiply old network costs by a factor of 3

issue an RFP to vendors

Which of the following is a primary advantage of a VPN in comparison to a private WAN connection? low cost inflexibility unpredictable traffic congestion security complexity to the user

low cost

In a ring design WAN, messages can take a long time to travel from the sender to the receiver a message arrives at all computers on the network simultaneously messages always arrive faster than in other types of layouts messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver messages always take one second to travel between sender and receiver

messages can take a long time to travel from the sender to the receiver

In the __________ step of the building-block process to network design, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. needs analysis distribution layering technology design narrow and deep analysis cost assessment

needs analysis

__________ antennas transmit the signal in all directions. radio omnidirectional microware vertical directional

omnidirectional

A _____________ is a user's connection into a packet switched service. packet analog/digital device packet asynchronous/discrete device packet asymmetric/data transmission device packet assembly/disassembly device packet analyzer/decoder device

packet assembly/disassembly device

Devices in a rack are connected together using ___________. patch cables string servers modules chassis switches

patch cables

A _________ is a connection-oriented approach to sending packets on a packet switched service. permanent virtual circuit datagram histogram bursty packet fractional T-1 network

permanent virtual circuit

A logical bus topology: has a central control device, such as a mainframe is limited to short distances since devices like a hub or repeater cannot be used with this type of topology permits every message to be received by every computer on the bus, even when those messages are intended for other computers is always used by token ring protocol LANs has all computers connected to each other in point-to-point connections

permits every message to be received by every computer on the bus, even when those messages are intended for other computers

To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems. planning and organizing the network and networking staff fault log trouble ticket LAN manual troubleshooting log

planning and organizing the network and networking staff

A _________ is the place at which the ISP provides services to its customers. metropolitan area exchange network access point remote access point point-of-presence cable modem termination system endpoint

point-of-presence

Each of the full duplex circuits connected to a switch is a separate _______________ circuit connecting the switch to a device on the network. multipoint ring point-to-point shared star

point-to-point

The traditional network design approach does not work well for _________ networks. modestly growing not growing 71. Which of the following type of media is most commonly used in backbone networks because of its high capacity? *a. fiber b. infrared frequencies c. coax cable d. unshielded twisted pair e. shielded twisted pair static rapidly growing slowly evolving

rapidly growing

The key principle in preventing disruption, destruction and disaster is ___________. control spreadsheet redundancy prevention controls anti-virus software IDS

redundancy

Two primary disadvantages to the ______ BN type are that the routers in the network impose time delays, and routers are typically more expensive and require more management than switches. bridged backbone virtual LAN hubbed backbone collapsed backbone routed backbone

routed backbone

In the __________ step of the building-block process to network design, the network designer examines the available technologies and assesses which options will meet the user's needs. cost assessment technology design narrow and deep analysis needs analysis distribution layering

technology design

A brute force attack against an encryption system: is also known as 3DES tries to gain access by trying every possible key is part of the Advanced Encyrption Standard is called RC4 always uses the Rijndael algorithm

tries to gain access by trying every possible key

With a virtual private network, users can create permanent virtual circuits through the Internet called: bursts cells tunnels rings clouds

tunnels

The performance of WANs can be improved by: upgrading the circuits between the computers increasing the demand placed on the network downgrading the circuits between the computers downgrading the devices that provide access to the circuits increasing network traffic

upgrading the circuits between the computers

Switch-based Ethernet: has a logical topology of a ring has a logical topology of a bus uses a hub to connect computers has a physical topology of a ring usually enables all attached circuits to send or receive packets simultaneously

usually enables all attached circuits to send or receive packets simultaneously

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. local carrier network virtual private network integrated service digital network software defined network SONET network

virtual private network

Fiber to the Home uses time division multiplexing all of the above wavelength division multiplexing frequency division multiplexing statistical time division multiplexing

wavelength division multiplexing

A (n) ______ is a special type of virus that spreads itself without human intervention. stealth virus snake worm boot sector virus Trojan horse

worm


Ensembles d'études connexes

Hematology Physiology Amboss Q&A

View Set

BUS Law Chapter 6 Part 1 (TEST 2)

View Set

Exam 2- Global Logistics Management

View Set

(Chemistry) Organic reactions - Mrs. Ferren

View Set

ANTH 1150 Pearson Questions Chapter 7

View Set

Circuits 1 test 2, Circuits I Test 1

View Set

financial mathematics - unit 1: income and expenses

View Set