Chapter 4 Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

10) Error rates can soar when the network traffic level ________. A) is at a high level B) is at an average level C) is at a low level D) none of the above

A

12) When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________. A) latency B) milliseconds C) jitter D) throughput

A

14) Variability in delay is called ________. A) jitter B) variance C) a QoS failure D) latency

A

20) An SLA for latency should specify a ________. A) maximum latency B) minimum latency C) both A and B D) neither A nor B

A

21) An SLA for jitter should specify a ________. A) maximum jitter B) minimum jitter C) both A and B D) neither A nor B

A

25) Which of the following is latency intolerant? A) video B) e-mail C) both A and B D) neither A nor B

A

26) Overprovisioning is ________. A) wasteful of capacity B) highly labor-intensive C) both A and B D) neither A nor B

A

29) A packet will definitely get through if it has ________. A) QoS reserved capacity B) priority C) both A and B

A

30) Compared to other methods for reducing problems during momentary traffic peaks, overprovisioning ________. A) increases capital cost B) increases labor costs C) both A and B D) neither A nor B

A

32) Priority addresses the problem of ________. A) momentary traffic peaks B) chronic under-capacity C) both A and B D) neither A nor B

A

34) Which of the following is NOT one of the four major security planning principles? A) perimeter defense B) risk analysis C) comprehensive security D) defense in depth

A

36) Attackers only need to find a single weakness to break in. Consequently, companies must ________. A) have comprehensive security B) have insurance C) do risk analysis D) only give minimum permissions

A

39) There is a single countermeasure in ________. A) weakest links B) defense in depth C) both A and B D) neither A nor B

A

4) Transmission speed is normally measured in ________. A) bits per second B) bytes per second C) octet per second D) none of the above

A

44) A policy specifies ________. A) what should be done B) how to do it C) both A and B D) neither A nor B

A

46) Policies are separated by implementation to take advantage of ________. A) implementer knowledge B) the delegation of work principle C) minimum permissions

A

47) Implementation guidance is less specific than ________. A) policy B) implementation C) standards D) none of the above

A

48) Which of the following must be followed? A) standards B) guidelines C) both A and B D) neither A nor B

A

5) Throughput is ________. A) the speed a network actually provides to users B) a network's rated speed C) both A and B D) neither A nor B

A

50) Oversight activities include ________. A) vulnerability testing B) creating guidelines C) both A and B D) neither A nor B

A

51) Attacking your own firm occurs in ________. A) vulnerability testing B) auditing C) both A and B D) neither A nor B

A

52) Policies should drive ________. A) implementation B) oversight C) both A and B D) neither A nor B

A

57) The SNMP manager stores the information it receives from Get commands ________. A) in the MIB B) on the agent C) on the managed device D) in the cloud

A

60) Control is done on individual switches and routers in ________. A) traditional operation B) SDN C) both A and B D) neither A nor B

A

62) SDN holds the promise of bringing ________. A) lower cost B) lower agility C) both A and B D) neither A nor B

A

63) When a firewall policy server is used to manage SPI firewalls, what device creates specific ACL rules? A) the policy server B) the SNMP manager C) individual firewalls D) none of the above

A

8) ________ is the percentage of time that a network is available for use. A) Availability B) Downtime C) QoS D) none of the above

A

11) Errors may substantially reduce throughput in ________. (Pick the standard most affected.) A) IP B) TCP C) UDP D) HTTP

B

13) Latency is usually measured in ________. A) bits per second (bps) B) milliseconds (ms) C) minutes of downtime D) none of the above

B

17) An SLA should specify the ________. A) best case B) worst case C) both A and B D) neither A nor B

B

18) An SLA for speed should specify a ________. A) maximum speed B) minimum speed C) both A and B D) neither A nor B

B

22) If throughput falls substantially below a QoS guaranteed speed, the ISP ________. A) always pays a penalty B) may pay a penalty C) does not pay a penalty D) may renegotiate the QoS guarantee for speed

B

23) ISPs usually offer QoS guarantees to ________. A) residential customers B) business customers C) both A and B D) neither A nor B

B

27) Overprovisioning means ________. A) assigning high priority to latency-intolerant applications while giving low priority to latency-tolerant applications B) adding much more switching and transmission line capacity than will be needed most of the time

B

28) Priority is assigning high priority to ________ applications while giving low priority to ________ applications. A) latency-tolerant, latency-intolerant B) latency-intolerant, latency-tolerant

B

33) Which phase of the plan-protect-respond cycle takes the largest amount of work? A) plan B) protect C) respond D) The phases require about equal amounts of effort.

B

35) Balancing threats against protection costs is called ________. A) economic justification B) risk analysis C) comprehensive security D) defense in depth

B

38) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must ________. A) have comprehensive security B) have defense in depth C) do risk analysis D) only give minimum permissions

B

40) Companies should ________ single points of takeover. A) eliminate B) pay special attention to C) multiply D) authorize

B

41) Actions that people are allowed to take on a resource come under the heading of ________. A) hacks B) authorizations C) exploits D) risks

B

49) Which of the following is true? A) Guidelines must be followed. B) Guidelines must be considered. C) both A and B D) neither A nor B

B

55) SNMP Set commands can ________. A) ask agents for information about the managed device B) reroute traffic C) both A and B D) neither A nor B

B

56) SNMP ________ commands can change how managed devices operate. A) Get B) Set C) both A and B D) neither A nor B

B

58) SNMP agents can initiate ________. A) Get commands B) traps C) both A and B D) neither A nor B

B

9) Which of the following usually has higher availability? A) data networks B) Public Switched Telephone Network C) Both of the above usually have equal availability. D) neither A nor B

B

1) Compared to network demand, network budgets are growing ________. A) faster B) as fast as it used to be C) slower D) both A and C

C

15) Jitter is a problem for ________. A) voice over IP (VoIP) B) streaming media C) both A and B D) neither A nor B

C

2) In QoS, the S stands for ________. A) software B) security C) service D) satisfaction

C

24) Momentary traffic peaks can lead to ________. A) latency B) packet loss C) both A and B D) neither A nor B

C

3) QoS is quantified through ________. A) criteria B) consensus C) metrics D) none of the above

C

6) Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________. A) rated speed B) aggregate throughput C) individual throughput D) all of the above

C

64) Which of the following is the easiest to understand? A) firewall hardware B) firewall ACLs C) firewall policies D) firewall IDSs

C

7) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. You and three others are transmitting or receiving at a particular moment. What speed should you expect to get? A) 0.5 Mbps B) 1 Mbps C) 1.25 Mbps D) 2.5 Mbps

C

37) An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.) A) comprehensive security B) risk assurance C) having a DMZ D) defense in depth

D

42) Another term for authorization is ________. A) authentication B) token C) establishing the creator of a file D) permission

D

43) If someone has been properly authenticated, they should receive ________ permissions. A) all B) no C) maximum D) minimum

D

53) To determine if a host is reachable, you would send a(n) ________. A) SNMP SET command B) MIB C) trap D) ping

D

59) Creating switching tables is an example of ________. A) forwarding B) routing complexity C) hardwiring D) control

D

61) In SDN, which device manages the control function for individual devices? A) SNMP manager console B) forwarding device itself C) SDN policy server D) SDN controller

D

54) In SNMP, the manager communicates directly with the managed device.

FALSE

45) Which of the following specifies what should be done? A) policies B) implementation C) both A and B D) neither A nor B

A

19) An SLA for availability should specify a ________. A) maximum availability B) minimum availability C) both A and B D) neither A nor B

B

16) Jitter is a problem for ________. A) downloading a file attached to an e-mail B) e-mail C) both A and B D) neither A nor B

D

31) Which of the following would receive the highest priority? A) video packets B) e-mail packets C) World Wide Web packets D) network management packets

D


Ensembles d'études connexes

TPR Chapter 6: Carbonyl Chemistry Part I (mechanism).

View Set

Accounting Information Systems 3510 Chapter 16:

View Set

Edexcel GCSE Psychology - Topic C - Williams (1981) Does TV Affect Children's Behaviour

View Set

Unit 7, Section 3 American History

View Set

Med-Surg: Neurologic and Sensory Systems

View Set