CIS 4348 Exam 4

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A room that contains a rack of equipment for a rack-based collapsed backbone is also called the main distribution facility (MDF) or central distribution facility (CDF). True False

True

Due to changing communication technologies, most companies have combined voice and data communications functions. True False

True

Network management is the process of operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users. True False

True

Encryption is the process of: A. disguising information by the use of mathematical rules, known as algorithms B. preventing errors in messages by means of logical rules C. correcting errors in message by means of mathematical rules D. detecting errors in messages by means of mathematical rules E. transmission of information over secure lines in analog form to prevent illegal access

A. Encryption is disguising information by the use of mathematical rules, known as algorithms

Two primary disadvantages to the ______ BN type are that the routers in the network impose time delays, and routers are typically more expensive and require more management than switches. A. routed backbone B. virtual LAN C. hubbed backbone D. collapsed backbone E. bridged backbone

A. Routed backbone disadvantages are time delays and more expensive than switches

A _________ is a connection-oriented approach to sending packets on a packet switched service. A. permanent virtual circuit B. datagram C. bursty packet D. histogram E. fractional T-1 network

A. a permanent virtual circuit is a connection-oriented approach to sending packets

Circuit capacity on a backbone network will not be improved by: A. going from 100Base-T Ethernet to 10Base-T Ethernet B. adding additional circuits alongside heavily used ones C. going from 100Base-T Ethernet to gigabit Ethernet D. providing a faster circuit to the server E. replacing a shared circuit backbone with a switched circuit backbone

A. going from 100Base-T Ethernet to 10Base-T Ethernet will NOT improve circuit capacity going from 100Base-T Ethernet to gigabit Ethernet WILL improve circuit capacity adding additional circuits alongside heavily used ones WILL improve circuit capacity going from 100Base-T Ethernet to gigabit Ethernet WILL improve circuit capacity providing a faster circuit to the server WILL improve circuit capacity replacing a shared circuit backbone with a switched circuit backbone WILL improve circuit capacity

Another term for cable networks that use both fiber-optic and coaxial cable is __________. A. hybrid fiber coax B. mobile wireless C. fixed wireless D. distribution hub E. fibrax

A. hybrid fiber coax is the term for cable networks that use both fiber-optic and coaxial cable

___________ ensures that the network is operating as efficiently as possible. A. d. Performance management B. b. Fault tolerance C. e. Troubleshooting D. c. Fault management E. a. Firefighting

A. performance management ensures that the network is operating as efficiently as possible

Spyware, adware and DDOS agents are three types of: A. Trojans B. Physical security threats C. Intrusion prevention detection approaches D. Denial-of-service attacks E. IP spoofing attacks

A. spyware, adware, and DDoS agents are three types of TROJANS

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. A. TCP/IP B. L2TP C. VPN2 D. Encapsule2 E. PPP

B. L2TP is a common standard for use by layer 2 access VPNs

Switches: A. connect two ore more network segments that use different data link protocols B. learn addresses by reading the source and destination addresses C. operate at the physical layer only D. connect two or more network segments that use different network protocols E. have become less popular than hubs

B. Switches learn addresses by reading the source and destination addresses

Which of the following would be least effective in improving backbone performance? A. changing the demand placed on the network B. adding new keyboards to the client computers C. upgrading memory for devices in the network D. upgrading the circuits between devices E. improving devices in the network

B. adding new keyboards would not improve backbone performance changing the demand placed on the network WOULD improve backbone performance upgrading memory for devices in the network WOULD improve backbone performance upgrading the circuits between devices WOULD improve backbone performance improving devices in the network WOULD improve backbone performance

Which of the following is not a benefit of packet switched services? A. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. B. The data transmission rates tend to be lower than dial-up or dedicated circuits. C. You don't have to set up dedicated circuits between each end point from which you wish to transmit and receive data and/or voice. D. You don't have to specify all the interconnecting services you need for your WAN when you buy the service. E. All circuits are less susceptible to a great deal of noise because they are digital.

B. the data transmission rates tend to be lower than dial-up or dedicated circuits is not a benefit of packet switch

A __________ type of BN has a star topology with a switch at its center resulting in all devices on the BN segment being part of the same IP network. A. Hubbed backbone B. Virtual LAN C. Switched backbone D. Routed backbone E. Bridged backbone

C. A switched backbone type of BN has a star topology with a switch at its center

__________ is a term that refers to the time delay in converting input packets to output packets. A. Cell relay B. Transfer mode C. Latency D. Frame relay E. Burstiness

C. Latency is a term that refers to the time delay in converting input to output packets

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. A. Yiping B. Napping C. Peering D. Popping E. Chargebacking

C. Peering refers to the fact that ISPs do not charge each other for transferring messages they exchange

Routers: A. typically require only one TCP/IP address B. do less processing on packets than a layer 2 switch does C. connect different IP networks or subnetworks D. typically do not require any configuration by the network administrator E. use data link layer addresses to move packets that leave the subnet

C. Routers connect different IP networks or subnetworks

A network switch failure is an example of a(n) ________ threat. A. causal B. intrusion C. disruptive D. internal E. disaster

C. a network switch failure is an example of a disruptive threat

The _________________ is a United States government agency that regulates voice and data communication. A. c. CRTC B. a. PSTN C. b. FCC D. d. CSU E. e. POTS

C. the FCC is a US government agency that regulates voice and data communication

Which of the following is one of the tier 1 ISPs in North America? A. IAB B. IEEE C. IETF D. Sprint E. ISOC

D. Sprint is one of the tier 1 ISPs in North America, some others include AT&T, Verizon, Qwest, and Level 3

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? A. crackers B. professional hackers C. script kiddies D. Delphi team member E. organization employees

D. a Delphi team member is not a type of intruder types of intruders include crackers, professional hackers, script kiddies, and organization employees

A ___________ is used by ISPs to authenticate its customers. A. file server B. password server C. Web server D. remote-access server. E. WAP server.

D. a remote-access server is used by ISPs to authenticate customers

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information. A. c. faulty B. b. bursty C. e. intelligent D. d. dumb E. a. voice-activated

D. dumb network devices are used only for what they are designed to do

To snare intruders, many organizations now use _________ techniques. A. DES B. cracker C. hacker D. entrapment E. Trojan horse

D. entrapment techniques are used to snare intruders by giving them a fake "honey pot"

Which of the following is typically not a part of configuration documentation? A. c. user profiles B. d. network software documentation C. a. hardware documentation D. b. sales brochures for new hardware products being considered by the organization E. e. software documentation

D. parts of configuration documentation include user profiles, network software documentation, hardware documentation, and software documentation

Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS? A. c. stats on circuits in the network B. a. stats on multiplexers C. e. stats on malfunctioning devices D. d. stats on user response times E. b. stats on modems

D. physical network parameter stats monitored by a NMS would include stats on: circuits multiplexers malfunctioning devices and modems NOT user response times

Which of the following is a type of intrusion prevention system? A. none of the above is an appropriate answer B. transport-based C. data link-based D. host-based E. zoned-based

D. the two most common types of intrusion prevention systems are host-based and network-based

Most WiMAX providers in the US are using an effective data range of A. 3-10 miles B. 1-5 miles C. 1-3 miles D. 0.5-50 miles E. 0.5 to 1.5 miles

E. Most WiMAX providers in the US use an effective data range of 0.5 to 1.5 miles

_______________ describes how an asset can be compromised by one specific threat. A. Threat hacks B. Threat attacks C. Threat contingencies D. Threat plans E. Threat scenarios

E. Threat scenarios describe how an asset can be compromised by one specific threat

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. A. Internet steering system B. fixed wireless system C. optical-electrical converter D. WAP proxy E. cable modem termination system

E. a cable modem termination system contains a series of cable modems and converts the data from cable modem protocols into internet protocols

A __________ is an organizational department that is responsible for monitoring and fixing overall network problems. A. a. mission critical area B. d. mullion delimiter agency C. b. fault tolerance department D. e. Web surfing guru headquarters E. c. network operations center

E. a network operations center is a department that is responsible for monitoring and fixing overall problems

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. A. b. star design B. c. full mesh design C. e. partial mesh design D. a. bus design E. d. ring design

E. a ring design connects all computers in a closed loop like a ring, each computer is linked to the next

Which of the following is not considered a key management task for running a network? A. b. planning B. d. directing activities C. c. organizing activities D. a. controlling activities E. a. knowledge of frame relay

E. key management tasks for running a network include planning directing activities organizing activities and controlling activities

With application level firewalls, any access that has not been explicitly denied is automatically permitted. True False

False

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. True False

False, DES is a commonly used symmetric encryption algorithm BUT it was developed in the mid-1970's AND it is no longer the recommended encryption algorithm

WiMAX is an older wireless technology that probably won't be used much longer. True False

False, WiMAX is an older technology but it is still being used all over the country

WiMax is the commercial name for a set of standards developed by the IEEE 802.3 standards group. True False

False, WiMAX is the commercial name for a set of standards developed by the IEEE 802.16 standards group

Today, a common carrier that provides long distance services is typically called a local exchange carrier. True False

False, a local exchange carrier (LEC) provides local telephone services an interexchange carrier (IXC) provides long-distance services

An intranet VPN connects different organizations over the Internet. True False

False, an intranet VPN provides virtual circuits between organization offices

Full mesh networks are inexpensive. True False

False, full mesh networks are seldom used because of the extremely high cost

Maintaining data integrity is not a primary goal of security. True False

False, it is definitely the primary goal of security

Routers operate at the application layer. True False

False, routers operate at the network layer

The phone line from the DSL customer to the telephone company end office is referred to as the "remote loop". True False

False, the phone line between the DSL customer and the telephone company office is called a "local loop"

Desktop Management software requires managers to install software such as antivirus updates or application updates on client computers manually. True False

False, this software allows managers to install software on computers without ever touching them

In transport mode, IPSec encrypts the entire IP packet. True False

False, transport mode doesn't encrypt the packet header

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization. True False

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data. True False

True

Routers connect two or more network segments that use the same or different data link protocols, but the same network protocol. True False

True

SONET is made up of very high speed dedicated circuits that incorporate inverse multiplexing (IMUX) for all levels above the OC-1 level. True False

True

Switches and routers are devices that can connect networks to the BN. True False

True

The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network. True False

True

The device similar to a DSL router, but used in a FTTH environment is called an optical network unit. True False

True, FTTH architecture is very similar to DSL and cable modem, an OPU acts like a cable modem or router

When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key. True False

True, sender encrypts with private, recipient decrypts with public

Quality control charts are a simple tool that can be used by network managers to monitor network conditions. True False

True, used to show when certain circuits might need to be upgraded


Ensembles d'études connexes

FIN 310 CHAPTER 10, Fin 310 Chapter 9, Fin 310 Chapter 8, FIN 310 Chapter 6, Fin 310 Chapter 7

View Set

ATI Parenteral (IV) Medications Test

View Set

Inteligencia de Negocio 2do Parcial

View Set

Gastric & Duodenal Disorders Prep U

View Set

Chapter 7 business law "Negligence"

View Set