Data Comm Final

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

One of the best techniques for determining current network capacities is creating a ____. a.baseline c.return of investment (ROI) b.payback analysis d.topline

a.baseline

After the 1984's Modified Final Judgment, the long-distance telephone companies became known as ____. a.local exchange carriers (LECs) c.interexchange carriers (IECs or IXCs) b.central office exchange service d.private branch exchange (PBXs)

c.interexchange carriers (IECs or IXCs)

Some common types of denial of service include e-mail bombing, ____, and ping storm. a.firewalling c.smurfing b.filtering d.routing

c.smurfing

____ usually involves having a software program that monitors every transaction within a system. a.Firewalling c.Access rights b.Routing d.Computer auditing

d.Computer auditing

Possibly the earliest example of a polyalphabetic cipher is the ____ cipher. a.Caesars c.Enigma b.Roman d.Vigenére

d.Vigenére

A protocol analyzer is also known as a ____. a.cable tester c.simulator b.catcher d.sniffer

d.sniffer

Digital subscriber line comes in a variety of formats. Often collectively referred to as ____. a.ADSL c.SDSL b.CDSL d.xDSL

d.xDSL

The designation layer ____ protocol means that frame relay technology is only one part of a network application and resides at the data link layer. a.2 c.4 b.3 d.6

a.2

The ____ standard is a 56,000-bps dial-up modem standard approved by a standards-making organization rather than a single company. a.R.56 c.802.11Q b.V.90 d.803.1

b.V.90

Many certificates conform to the ____ standard. a.X.309 c.X.509 b.X.409 d.X.609

c.X.509

Four statistics, or measures, that are useful in evaluating networks are mean time between failures, mean time to repair, ____, and reliability. a.payback c.availability b.integrity d.ROI

c.availability

A ____ virus is usually stored on some form of removable media. When the removable media (such as a flash drive) is connected to a new machine and is used to boot the machine, the virus moves from the media into the host system. a.polymorphic c.boot sector b.macro d.file infector

c.boot sector

A(n) ____ is the unique piece of information that is used to create ciphertext and then decrypt the ciphertext back into plaintext. a.encryption algorithm c.key b.firewall d.IP address

c.key

One of the most popular and successful plans currently used by businesses today is the ____. a.network cycle c.systems development life cycle (SDLC) b.software-network cycle d.distributed cycle

c.systems development life cycle (SDLC)

When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree? a.financial c.time b.technical d.operational

c.time

Typically, a network reaches saturation when its network utilization is at ____ percent. a.55 c.80 b.60 d.100

d.100

IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys. a.802.11a c.802.11g b.802.11b d.802.11i

d.802.11i

____ involves the creation of mathematical equations to calculate various network values. a.Linear projection c.Computer simulation b.Benchmarking d.Analytical modeling

d.Analytical modeling

____ is the most expensive ATM class of service. a.Variable bit rate (VBR) c.Unspecified bit rate (UBR) b.Available bit rate (ABR) d.Constant bit rate (CBR)

d.Constant bit rate (CBR)

Network personnel create a ____ to determine the normal and current operating conditions of the network. a.linear projection c.timeline b.computer projection d.baseline

d.baseline

____ involves generating system statistics under a controlled environment and then comparing those statistics against known measurements. a.Linear projection c.Computer simulation b.Benchmarking d.Analytical modeling

b.Benchmarking

The intent of SDLC is for ____ not to be disjointed steps in a big plan, but overlapping layers of activity. a.cycles c.rounds b.phases d.levels

b.phases

In a payback analysis, the ____ Costs are the Cumulative Time-Adjusted Costs plus the Cumulative Time-Adjusted Benefits for each year. a.Time-Adjusted Benefits c.Cumulative Lifetime Time-Adjusted b.Operation and Maintenance d.Time-Adjusted Costs

c.Cumulative Lifetime Time-Adjusted

In a payback analysis, the ____ Costs are simply the running sums of the Time-Adjusted Costs over all the years. a.Operation and Maintenance c.Cumulative Time-Adjusted b.Development d.Time-Adjusted

c.Cumulative Time-Adjusted

The ____ is a commonly employed encryption method used by businesses to send and receive secure transactions. a.firewall c.Data Encryption Standard (DES) b.Trojan horse d.TCP

c.Data Encryption Standard (DES)

____ is a packet-switched network that was designed for transmitting data over fixed lines. a.T-1 c.Frame relay b.IntraLATA d.InterLATA

c.Frame relay

In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____. a.A c.M b.E d.X

c.M

____ scanning works by recognizing the unique pattern of a virus. a.Time-based c.Signature-based b.Amplitude-based d.Frequency-based

c.Signature-based

____ is an industry standard created by the Internet Engineering Task Force and designed originally to manage Internet components. a.Simple Mail Transfer Protocol (SMTP) b.Internet Control Message Protocol (ICMP) c.Simple Network Management Protocol (SNMP) d.Transport Control Protocol (TCP)

c.Simple Network Management Protocol (SNMP)

____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation. a.E-mail bombing c.Smurfing b.Spoofing d.Firewalling

c.Smurfing

____ is a format in which the transfer rate can vary, depending on noise levels within the telephone line's local loop. a.DSL Lite c.Very high data rate DSL (VDSL) b.High bit-rate DSL (HDSL) d.Rate-adaptive DSL (RADSL)

d.Rate-adaptive DSL (RADSL)

____ means that if something is going to cost one dollar one year from now, you need to put away less than a dollar today to pay for it. a.Operational feasibility c.Technical feasibility b.The money value of time d.The time value of money

d.The time value of money

One technique used to model a corporation's network environment is to create ____. a.link shadows c.dots model b.node approaches d.connectivity maps

d.connectivity maps

Because DSL is an always-on connection, it uses a ____ circuit instead of a switched circuit. a.changing c.virtual b.dynamic d.permanent

d.permanent

A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available. a.ping c.router b.firewall d.DNS

a.ping

A ____ virus mutates with every infection, thus making them difficult to locate. a.polymorphic c.boot sector b.macro d.file infector

a.polymorphic

When performing a payback analysis calculation, you should show all dollar amounts using the ____. a.time value of money c.computer simulation b.money value of time d.benchmarking

a.time value of money

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved. a.transposition-based c.polyalphabetic b.monoalphabetic d.multialphabetic

a.transposition-based

The telephone network consists of two basic types of telephone lines: a subscriber loop, or standard telephone line, and a ____. a.trunk c.LATA b.CIR d.SONET

a.trunk

A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company's central (local) office are offered to business users, so that they don't need to purchase their own facilities. a.local exchange carriers (LECs) c.interexchange carriers (IECs or IXCs) b.central office exchange service d.private branch exchange (PBXs)

b.central office exchange service

The ____ includes the time needed to bring the system back up to normal operation. a.mean time between failures c.availability b.mean time to repair d.reliability

b.mean time to repair

A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters. a.transposition c.monotransposition b.monoalphabetic d.polytransposition

b.monoalphabetic

Collecting baseline information on ____ involves listing the types of operational protocols used throughout the system. a.system users c.network application b.operational protocols d.system nodes

b.operational protocols

In ____, a Web user seeking to visit a particular company's Web site is unknowingly redirected to a bogus Web site that looks exactly like that company's official Web site. a.smurfing c.worming b.pharming d.e-mail bombing

b.pharming

The concept of two keys, public and private, is called ____ cryptography. a.private key c.secret key b.public key d.symmetric

b.public key

When no splitter is used to separate the DSL signal from the POTS signal, then the service is called ____. a.asymmetric DSL c.symmetric DSL b.splitterless DSL d.POTSless DSL

b.splitterless DSL

Before ATM can transfer any data, you must first create a logical connection called a ____. a.virtual path connection (VPC) c.network-network interface b.virtual channel connection (VCC) d.network-user interface

b.virtual channel connection (VCC)

____ is a popular format that transmits the downstream data at a faster rate than the upstream rate. a.Asymmetric digital subscriber line (ADSL) b.Consumer DSL (CDSL) c.DSL Lite d.High bit-rate DSL (HDSL)

a.Asymmetric digital subscriber line (ADSL)

In a wide area connectivity map, external sites, such as suppliers or external agents, are denoted by circles containing the letter ____. a.E c.M b.F d.X

a.E

____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography. a.Kerberos c.3DES b.DES d.AES

a.Kerberos

____ analysis is a common financial analysis technique that involves determining a proposed system's costs and benefits. a.Payback c.Operational b.Time d.Technical

a.Payback

____ is data before any encryption has been performed. a.Plaintext c.Encriptext b.Ciphertext d.Cryptotext

a.Plaintext

When a company calculates the ____ for a proposed project, it compares the revenue generated from the project with the expenses incurred. a.ROI (return on investment) c.operational feasibility b.technical feasibility d.time feasibility

a.ROI (return on investment)

____ is a protocol that allows a network administrator to monitor, analyze, and troubleshoot a group of remotely managed elements. a.Remote Network Monitoring (RMON) b.Simple Mail Transfer Protocol (SMTP) c.Remote Login (rlogin) d.File Transfer Protocol (FTP)

a.Remote Network Monitoring (RMON)

____ technology essentially takes the data to be transmitted and rather than transmitting it in a fixed bandwidth spreads it over a wider bandwidth. a.Spread spectrum c.AES b.3DES d.PKI

a.Spread spectrum

____ are permanent direct connections between two specified points. a.Tie lines c.Centrex b.PBXs d.IPX

a.Tie lines

SSL's successor is ____, which is based upon SSL version 3 and contains a few technical improvements over SSL. a.Transport Layer Security (TLS) c.Date Encryption Standard (DES) b.IPsec d.Advanced Encryption Standard (AES)

a.Transport Layer Security (TLS)

____ applications often send bursts of data, and the ATM network guarantees that its traffic is delivered on time. a.Variable bit rate (VBR) c.Unspecified bit rate (UBR) b.Available bit rate (ABR) d.Constant bit rate (CBR)

a.Variable bit rate (VBR)

The advantage of using a ____ is that it can mimic conditions that would be extremely difficult, if not impossible, to create on a real network. a.computer simulation c.time projection b.linear projection d.benchmark

a.computer simulation

An antivirus technique that is used in conjunction with signature-based scanning and terminate-and-stay-resident monitoring is ____. a.integrity checking c.direct sequence b.time division d.frequency hopping

a.integrity checking

A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms. a.local area detailed connectivity c.metropolitan area connectivity b.local area overview connectivity d.wide area connectivity

a.local area detailed connectivity

A ____ is a bundle of VCCs that have the same endpoints. a.virtual path connection (VPC) c.network-network interface b.virtual interface connection (VIC) d.network-user interface

a.virtual path connection (VPC)

The local loop commonly consists of either four or ____ wires. a.six c.nine b.eight d.ten

b. eight

In a payback analysis, the ____ values are the running sums of the Time-Adjusted Benefits over all the years. a.Time-Adjusted Benefits c.Cumulative Time-Adjusted Costs b.Cumulative Time-Adjusted Benefits d.Time-Adjusted Costs

b.Cumulative Time-Adjusted Benefits

In a payback analysis, the ____ Cost is a one-time cost that occurs in Year 0. a.Operation and Maintenance c.Time-Adjusted b.Development d.Cumulative Time-Adjusted

b.Development

____ spread spectrum spreads the transmission of a signal over a wide range of frequencies using mathematical values. a.Frequency hopping c.Time hopping b.Direct sequence d.Amplitude sequence

b.Direct sequence

____ is the earliest form of DSL. a.DSL Lite c.Very high data rate DSL (VDSL) b.High bit-rate DSL (HDSL) d.Rate-adaptive DSL (RADSL)

b.High bit-rate DSL (HDSL)

____ is a set of protocols created to support the secure transfer of data at the IP layer. a.Transport Layer Security (TLS) c.Date Encryption Standard (DES) b.IPsec (IP security) d.Advanced Encryption Standard (AES)

b.IPsec (IP security)

____ involves electronically monitoring data flow and system requests into and out of their systems. a.Worms c.Firewalls b.Intrusion detection d.Routers

b.Intrusion detection

____ is high-quality encryption software that has become quite popular for creating secure e-mail messages and encrypting other types of data files for average users. a.DES c.3DES b.PGP d.AES

b.PGP

The ____ software controls the operations of a managed element and maintains a database of information about all managed elements. a.SNMP agent c.SMTP manager b.SNMP manager d.SMTP agent

b.SNMP manager

The first security protocol for wireless LANs was ____. a.Wi-Fi Protected Access (WPA) c.IPsec b.Wired Equivalency Protocol (WEP) d.IEEE 802.11i

b.Wired Equivalency Protocol (WEP)

The ____ allows the customer to exceed the committed information rate by a fixed amount for brief moments of time. a.bit rate c.committed information rate (CIR) b.burst rate d.LATA rate

b.burst rate

If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____. a.e-mail bombing c.smurfing b.spoofing d.firewalling

b.spoofing

With respect to ____ benefits, the most common measurement is the monthly or annual savings that will result from the use of the proposed system. a.intangible c.imaginary b.tangible d.projected

b.tangible

A number of techniques exist for performing ____ planning, including linear projection, computer simulation, benchmarking, and analytical modeling. a.financial c.capacity b.time d.money

c.capacity

On the other end of the local loop is the local telephone company's ____. a.trunk c.central office b.interLATA d.intraLATA

c.central office

When a customer establishes a permanent virtual circuit with a frame relay carrier, both customer and carrier agree on a data transfer rate called the ____. a.bit rate c.committed information rate (CIR) b.PVC rate d.LATA rate

c.committed information rate (CIR)

MPLS and VPNs continue to replace which long-distance data services? a.Google and Yahoo c.frame relay and ATM b.Telnet and FTP d.frame relay and FTP

c.frame relay and ATM

The Telecommunications Act of 1996 mandated that the existing local telephone companies, now called ____, must give CLECs access to their telephone lines. a.private Branch Exchange (PBX) b.Centrex (central office exchange service) c.incumbent local exchange carriers (ILECs) d.interexchange carriers (IECs)

c.incumbent local exchange carriers (ILECs)

When a VCC transmits network management and routing signals, it is called the ____. a.virtual path connection (VPC) c.network-network interface b.virtual interface connection (VIC) d.network-user interface

c.network-network interface

The ____ firewall is essentially a router that has been programmed to filter out certain IP addresses or TCP port numbers. a.proxy server c.packet filter b.switch d.hub

c.packet filter

To collect baseline information on ____, you create a list of the number and types of system nodes in the network. a.operational protocol c.system nodes b.system users d.network application

c.system nodes

____ means that a user calling into a company telephone system provides some form of data by speaking into the telephone, and a database query is performed using this spoken information. a.Third-party call control b.Unified messaging c.Fax-back d.Integrated voice recognition and response

d.Integrated voice recognition and response

____ is the combination of encryption techniques, software, and services that involves all the necessary pieces to support digital certificates, certificate authorities, and public key generation, storage, and management. a.3DES c.Data Encryption Standard (DES) b.Advanced Encryption Standard (AES) d.Public key infrastructure (PKI)

d.Public key infrastructure (PKI)

A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key. a.certificate c.PKI b.certificate authority d.digital signature

d.digital signature

A(n) ____ is the computer program that converts plaintext into an enciphered form. a.worm c.firewall b.Trojan horse d.encryption algorithm

d.encryption algorithm

A new parameter that might have an impact on metropolitan area design is the ____. a.link shadow c.link length b.node distance d.failover time

d.failover time

A ____ virus is a virus that infects a piece of executable code such as an .exe or .com file. a.polymorphic c.boot sector b.macro d.file infector

d.file infector

If the telephone call passes out of one LATA and into another (a(n) ____ call), the telephone call is long distance and must be handled by a long-distance telephone company. a.intraLATA c.inLATA b.innerLATA d.interLATA

d.interLATA

One very common technique to attack a system is to deliver an e-mail or Web page that contains a malicious piece of code called a ____. a.NOS c.proxy b.firewall d.mobile malicious code

d.mobile malicious code

When a company is evaluating a project's ____ feasibility, the company must ask: Will the proposed system produce the expected results? a.financial c.time b.technical d.operational

d.operational

A(n) ____ handles all in-house calls and places calls onto outside telephone lines. a.local exchange carriers (LECs) c.interexchange carriers (IECs or IXCs) b.local access transport area (LATA) d.private branch exchange (PBXs)

d.private branch exchange (PBXs)

Payback analysis helps you determine the approximate time for a project's payback, or ____, to occur. a.cumulative lifetime c.discount factor b.benefits derived d.return on investment (ROI)

d.return on investment (ROI)


संबंधित स्टडी सेट्स

Chapter 63: Management of Patients with Neurologic Trauma

View Set

BU3 - LIGHTING AND ILLUMINATION FUNDAMENTALS

View Set

Unit 4: Alterations of the Renal/Urinary System

View Set