MIS 340 Final Exam
Microwave transmission is ____
- a type of high frequency radio communication - requires a clear line of sight path - is typically used for long distance data transmission - does not require the laying of any cable
List the Layers of the Internet (TCP/IP) Model and list common standards
1. Physical - CAT 5, RS-232, v.92 2. Data Link - Ethernet (LAN), Frame Relay (WAN), T1 (MAN and WAN) 3. Network - IP 4. Trasport - TCP 5. Application - HTTP, HTML, MPEG, H.323, SMTP, IMAP, POP
In Moore's law, a CPU transistor count doubles every ________ months.
18
The data rate for a T-3 circuit in North America is:
44.376 Mbps
A local area network is
A group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings
The following are steps under the traditional network design approach?
An analyst develops cost estimates of the circuits needed to support the network., An analyst meets with users to identify user needs., An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network., An analyst designs the circuits to support the estimated traffic, allowing for modest growth.
__________ is a data footprint that tells where you've been.
Artifact
What are the 3 tiers of quality for power supply?
Bronze, Gold, Silver
The type of logical topology that hub-based Ethernet uses is a:
Bus
What title does Ashley Ewing hold at the University?
CISO
The ________ works with the bios to help boot the computer
CMOS
What works with BIOS to help boot the computer?
CMOS
What part is considered the "brain of the computer"?
CPU
Temporary storage used before RAM
Cache
Which of the following is true for USB?
Can be used to connect computer to external controllers, Also used for storage, does enumeration
The following are basic LAN components
Client, Server, Network Interface Card, Network operating system
_______________ waits for instruction, ___________ performs the instruction.
Client, server
The three major steps used in of the building-block process to network design
Cost Assessment, Technology Design, Needs Analysis
Two fundamentally different types of data are:
Digital and analog
_____________ connect hardware to software.
Drivers
Which of the following would be a standard or protocol used at the Data Link Layer of the Internet or OSI model?
Ethernet
The 2 ways to connect to a network are by ____ or ______.
Ethernet and wifi
(true/false) An SSD is volatile
False
SSD is slower and cheaper than traditional drives
False
(true/false) In a multipoint circuit configuration, each computer has a dedicated circuit between itself and each of the other computers in the network.
False ( not a specific circuit for each)
(t/f) Technologies such as DSL and cable modem are called narrowband technologies.
False (DSL is broadband)
(true/false) Digital transmission produces more errors than analog transmission.
False (analog transmission produces more errors, older style)
(true/false) With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer.
False (digital not analog)
(true/false) A local area network (LAN) connects other LANs and backbone networks (BNs) located in different areas to each other and to wide area networks in a span from 3 to 30 miles.
False (doesnt reach 3 to 30 miles)
(true/false) Ethernet is a layer 3 protocol, which operates at the network layer.
False (ethernet is internet)
(true/false) Only the sender of a data transmission needs to be concerned about the rule or protocols that govern how it communicates with the receiver.
False (everyone)
(true/false) An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization.
False (extranet)
(true/false) Ethernet is wireless connectivity.
False (has wires)
(t/f) An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.
False (intruder is an insider)
(true/false) Raid uses a single drive to either create better dependency or more speed
False (it uses multiple drives)
(t/f) WiMAX is an older wireless technology that probably wont be used much longer.
False (its a newer technology)
(t/f) Network cables are the easiest target for eavesdropping
False (lans are easiest target for eavesdropping)
(t/f) Routers operate at the application layer
False (no, it operates at physical, network, and data link NOT application)
(true/false) Traditional network design approach works very well for rapidly changing networks.
False (not rapid)
(true/false) The campus backbone (or core layer) is the network architecture component responsible for providing end user access to the network
False (not responsible for end user access)
(true/false) The primary goal of the needs analysis step in network design is to develop a physical network design
False (not the primary goals)
(true/false) An access point plays the same role in a wireless network as a router does in a wired Ethernet network.
False (router and access point are complete dif)
(true/false) A switch always broadcasts all the packets it receives to all the computers that are connected to the switch
False (switch does not broadcast to all packets)
(true/false) Fiber optic cable is thicker and heaver than unshielded twisted pair.
False (unshielded is thicker and heavier)
(t/f) Today, a common carrier that provides long distance services is typically called a local exchange carrier.
False(long distance is not local)
Which of the following type of media is most commonly used in backbone networks because of its high capacity?
Fiber
Which of the following media has the lowest error rates and the highest transmission speeds
Fiber optic cable
A _______ allows many users to share the same set of files on a common, shared disk drive.
File server
Having a conversation with someone using a cellular phone is an example of ______ transmission.
Full-duplex
What are the tiers of quality power supply?
Gold, silver, bronze
What does GPU stand for?
Graphics Processing Unit
The ability to transmit in both directions, but only in one direction at a time is an example of _____ transmission.
Half-duplex
What reads/writes data for permanent storage?
Hard Drives
The ___________ is used to read and write data for permanent storage.
Hard drive
______________ writes all data in Ram to disk before going to low power
Hibernation
Please list the 4 architecture types:
Host-based, Client-based, Client-server, Peer-to-peer
A mouse is
Internal, External, USB driven
Which of the following is true with respect to the data link layer?
It performs error detection
Which of the following is true about roll call polling?
It typically involves some waiting because the server has to wait for a response from the polled client or terminal
______________ principle - any interaction between two entities leads to a creation or transfer of data.
Locard's Exchange
Any interaction between two entities leads to a creation or transfer of data
Locard's Exchange Principle
A ____ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.
Mainframe
________ is the software that controls the network.
Network operating system
Cloud storage is __________.
Online storage
Networks that are designed to connect similar computers that share data and software with each other are called:
Peer-to-peer networks
Data is physically transmitted from one computer or terminal to another in the ______ layer.
Physical
With the two-tier client-server architecture the client is responsible for the ______ logic.
Presentation
Please list the 4 components of applications:
Presentation Logic, Application Logic, Data Access Logic, Data Storage
Which of the following can provide fault tolerance for the storage space on a server?
RAID
____________ is temporary storage between CPU and hard drive.
RAM
What does RAM stand for?
Random Access Memory
The traditional network design approach does not work well for ______ networks.
Rapidly growing
What does RAID stand for?
Redundant Array of Independent Disks
On digital circuits, we use ____ to reshape the incoming signal and prevent attenuation.
Repeaters
When all bits of a character are transferred one after another, the bits are transferred in _________ mode.
Serial
What does SATA stand for?
Serial Advanced Technology Attachment
A _____ provides shared access to data
Server
Please provide the definition of Middleware
Software that acts as an intermediary by "sitting between" client and server applications
What does SSD stand for?
Solid State Drive
Which of the following happens when you delete something?
Stays until overwritten. Leaves artifacts. It's never really deleted.
______ is the dominant network protocol today and is used in virtually every LAN and WAN in the world.
TCP/IP
(True/False) Ram is volatile
True
(t/f) A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.
True
(t/f) A T1 circuit provides a data rate of 1.544Mbps
True
(t/f) A backbone network is a high speed network that connects many networks
True
(t/f) A room that contains a rack of equipment for a rack-based collapsed backbone is also called the main distribution facility (MDF) or central distribution facility (CDF)
True
(t/f) A software solution to correct a security hole is often referred to as a patch or update.
True
(t/f) A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss the organization.
True
(t/f) Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.
True
(t/f) Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
True
(t/f) Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
True
(t/f) Controls are mechanisms that reduce or eliminate threats to network security.
True
(t/f) Ethernet services are now being successfully used in WAN environments
True
(t/f) One basic component of a backbone network is the hardware device that connects other networks to the backbone
True
(t/f) One difference between a switch and a router is that a router will only process messages addressed to the router (at layer 2) while a switch processes all messages.
True
(t/f) Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages.
True
(t/f) Secure sockets layer is an encryption standard designed for use on the Web.
True
(t/f) The device similar to a DSL router, but used in a FTTH environment is called an optical network unit.
True
(t/f) Tier 1 service providers connect together and exchange data at IXPs.
True
(t/f) WANs can connect BNs across distances that can span up to thousands of miles
True
(t/f) the denial-service of attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.
True
(true/false) 802.11n LANs operate at speeds up to 600 mbps.
True
(true/false) A server waits for instruction.
True
(true/false) At the transport layer in the Internet model, TCP is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferring them.
True
(true/false) Capacity planning is used to design circuit capacity
True
(true/false) Media acess controls refer to the need to control when computers transmit.
True
(true/false) Simulation is a tool that can be used in designing networks
True
(true/false) The network layer performs the same functions in both the OSI and Internet models and is responsible for routing messages from the source computer to the destination computer.
True
(true/false) the network interface card (NIC) permits a computer to be physically connected to a network cable.
True
The 4 general functions of any application program are: data storage, data access logic, application logic and presentation logic
True
A(n) ______ -tiered architecture uses only two sets of computers: one set of clients and one set of servers.
Two
Which of the following are input/output ports?
UDB, HDMI, Ethernet/NIC
What is used to connect a computer to external controllers?
USB
List three I/O ports that are used in a computer.
USB, VGA, HDMI, Audio, Ethernet/NIC
These are directly contributing to the dramatic increase in network traffic today?
Video applications on networks are becoming common., Electronic mail is now used by most people who work in organizations., Web searches are now commonly performed by network users., Multimedia applications on networks are becoming common. Answer: D
To interact with the World Wide Web, a client computer needs an application layer software package called a:
Web browser
What happens once a computer goes into hibernation?
Writes all data in RAM to disk before going to low power mode
Using parity, the probability for detecting an error, given that one has occurred, is:
about 50% for either even or odd parity
In general, older networks and local loops designed to transmit voice data are likely to be _______.
analog
Another term for the weakening of a signal over distance is:
attenuation
Errors on a network can occur:
because of noise on the line
A digital service offered by cable companies is the ________.
cable modem
Which of the following is TRUE for cd/dvd drives?
can boot from cd, different speeds, Can be external/internal, can be used as a hard drive
100 Base-T:
can run at either full or half-duplex
In general, tier 3 ISPs make money by charging _______.
customers
A network switch failure is an example of a(n) _______ threat.
disruptive
The cheapest time to install network cabling is:
during the construction of the building
(true/false) The latest version of IP is IPv7 which increases the address space from 128 bits to 256 bits
false
(true/false) TCP/IP is a data link protocol that is used on the Internet
false (tcp breaks large files to smaller messages)
Which of the following media can best withstand harsh environmental conditions?
fiber optic cable
The two basic types of media are:
guided and wireless (radiated)
The newer from of IP, version 6 (IPv6):
has an increased address size from 32 bits to 128 bits
Another term for cable networks that use both fiber-optic and coaxial cable is ________.
hybrid fiber coax
At the top of the Internet structure are tier 1 _______, such as AT&T and Sprint.
internet service providers
Often, incidents of unauthorized access known as _____, involve employees of the organization, surprisingly enough.
intrusion
In ARQ, a NAK:
is sent by the recipient if the message contains an error
Switches:
learn addresses by reading the source and destination addresses
A _______ separates traditional voice telephone transmission for the data transmissions in the equipment located at the customer site for DSL.
line splitter
The _____ is the connection from a home or business to the telephone company end office.
local loop
Which of the following would be considered a type of wireless media?
microwave
What component of a computer connects the major parts together?
motherboard
The following are potential bottleneck for LAN performance:
number and speed of hard disks in the server, amount of memory in the server, speed of servers CPU, network interface card
These are error detections method used in the data link layer?
parity check, cyclic redundancy check, CRC-32 checking, odd parity
Cloud computer Models (fill in the table)
picture on laptop
A _______ is the place at which the ISP provides services to its customers.
point-of-presence
The key principle in preventing disruption, destruction and disaster is ______.
redundancy
There are optional and required parts of an HTTP request. They are:
request line, request header, request body
A ________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
risk assessment
Which of the following is true about a server?
stores data and software that can be accessed by the client., may be a personal computer or a mainframe on the network., in client/server computing they work together over the network with client computers to support the business application., stores documents and graphics that can be accessed from any Web
A ___ refers to a group of computers that are logically grouped together by IP number
subnet
Which of the following is true in regard to a CPU?
the cpu is the brain of the computer, fastest processor is the Xeon, must be cooled
A(n) ________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.
threat
(true/false) Today, most network designers use a three to five year planning horizon
true
Mesh networks:
typically contain more circuits in the network than in star or ring networks
The familiar background static on radios and telephones is called:
white noise