Network Pro Mid Term Prep
A patch is a software solution to correct a security hole
True
ANSI is a voting participant in the ISO.
True
Data communication standards enable each layer in the sending computer to communicate with its corresponding layer in the receiving computer.
True
In 1874, Alexander Graham Bell developed the concept for the telephone.
True
In technology design, a network designer looks at available technologies to see which options will satisfy users' needs.
True
In the OSI model, the application layer is the end user's access to the network.
True
Macro viruses can spread when an infected file is opened.
True
Network management is the process to operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users.
True
Network management software is used by most large organization to monitor and control their networks.
True
Networks requirements can be divided into mandatory, desirable, and wish-list requirements.
True
The Telecommunications Act of 1996 now permits the RBOCs to provide long distance outside the region in which they provide local telephone services.
True
The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.
True
The future of network management lies in the management of LANs, BNs, and Internet resources instead of concentrating on mainframe resources
True
Newer telephone circuits, built during the last decade, offer higher quality because they were built using analog transmission.
False
Nonreturn to zero is a type of unipolar signaling
False
Problem statistics are not helpful in determining whether vendors are meeting contractual maintenance commitments.
False
The amount of time it takes to switch between sending and receiving in half-duplex transmission is called the propagation delay.
False
Today, all network traffic is due to traffic from internal application systems.
False
Network cables are the easiest target for eavesdropping.
False
Application management software monitors devices such as routers, hubs and switches
False
Desktop Management software requires managers to install software on client computers manually.
False
Digital transmission occurs when the signal sent over the transmission media constantly varies among an infinite number of states.
False
Fault-intolerant servers contain many redundant components to prevent failure
False
If managers do not pay enough attention to planning and organizing the network, they are going to end up being proactive vs. reactive in solving network problems.
False
In a multipoint circuit configuration, each computer can use the circuit at the same time.
False
In transport mode, IPSec encrypts the entire IP packet.
False
Wavelength division multiplexing can only used with copper cables.
False
A car manufacturer may give access to certain portions of its network to some of its suppliers via Internet. This is an example of an Extranet.
True
Capacity planning is used to design circuit capacity.
True
Common carriers include the RBOCs, IXCs, and Cable TV companies.
True
Computers produce digital data whose values are binary: 0 or 1.
True
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
True
Cost assessment is the step in the network design in which many complex factors related to costs are documented.
True
Cost assessment is used to look at the relative cost of technologies used in a network design.
True
One key to integrating diverse networks in an organization is for the individual network managers to realize that they no longer wield the same amount of power.
True
One of the most commonly used network management protocols is Common Management Interface Protocol.
True
One perspective of data communications and networking as stated in the textbook, examines the management of networking technologies, including security, network design, and managing the network on a day-to-day basis and long term basis.
True
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
True
Simulation is a tool that can be used in designing networks.
True
Statistical time division multiplexing does not require the capacity of the circuit to be equal to the sum of the combined circuits.
True
The "local loop" refers to the wires that run from the customer premises to the telephone switch of the telephone company.
True
The network layer is responsible for routing messages from the source computer to the destination computer.
True
The physical layer is a layer where two communicating nodes are directly connected.
True
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
True
The specification stage of the de juro standardization process consists of developing nomenclature and identifying the problems to be addressed.
True
To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network
True
Today, the critical issue of network management is managing only the mainframe's network.
True
Traffic analysis involves determining why some circuits are heavily used.
True
Trouble tickets are reports produced by a software package that records fault information.
True
When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
True