MIS 4123 Test 4
A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. 9000 8.4 1.5 650 6.1
1.5
WiMAX was designed to use the _______ frequencies. 2.3 GHz and 3.1 GHz 2.4 GHz and 5 GHz 2.3 GHz, 2.5 GHz, and 3.5 GHZ 1.44 GHz, 2.4 GHz, and 5 GHz any frequency between 2.3 GHz and 3.5 GHz
2.3 GHz, 2.5 GHz, and 3.5 GHZ
At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into digital data. DSLAM GrandSlam WAP Line splitter X.25 PAD
DSLAM
Data traffic from the DSL customer premises is sent to a __________ which is located at the local carrier's end office. Modem Codec DSLAM NIC ATM
DSLAM
One of the least common configuration activities for a network manager is adding and deleting user accounts. T/F
False
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN. T/F
False
Problem statistics are not helpful in determining whether vendors are meeting contractual maintenance commitments. T/F
False
Researchers estimate that only one or two new viruses are developed every week. T/F
False
Social engineering refers to creating a team that solves virus problems. T/F
False
Technologies such as DSL and cable modem are called narrowband technologies. T/F
False
The Internet Engineering Steering Group provides strategic architectural oversight for the Internet. T/F
False
The Internet is flat in structure. T/F
False
The Internet is one large network. T/F
False
The phone line from the DSL customer to the telephone company end office is referred to as the "remote loop". T/F
False
To use DSL, a customer needs a DSL Access Multiplexer installed at his or her location.
False
Triple DES uses a total of 512 bits as the key. T/F
False
WiMAX is an older wireless technology that probably won't be used much longer. T/F
False
WiMax is the commercial name for a set of standards developed by the IEEE 802.3 standards group. T/F
False
With application level firewalls, any access that has not been explicitly denied is automatically permitted. T/F
False
__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software. Fault management Fault tolerance Firefighting Performance management Troubleshooting
Fault management
___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan. Panicking Multiplexing Multitasking Firefighting Fireflying
Firefighting
Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. Gigapop Autonomous system ISP IXP Service provider
IXP
Tier 1 ISPs connect together and exchange data at ___________. IXPs Cable modem termination system endpoints Distribution hubs The Internet engineering task force headquarters The Internet Society network center
IXPs
The ___________ is responsible for technical management of IETF and the Internet standards process. Internet Society University Corporation for Advanced Internet Development Internet Engineering Steering Committee Internet Architecture Board Internet Research Task Force
Internet Engineering Steering Committee
The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. Internet Society Internet Engineering Task Force Internet Engineering Steering Committee Internet Architecture Board Internet Research Task Force
Internet Engineering Task Force
A(n) ____________ examines the source and destination address of every network packet that passes through it. Packet level firewall Mullion server ANI system IP spoofing system Network switch
Packet level firewall
__________ has led to the belief that the Internet is "free". Encrypting Peering Bridging Tolling Polling
Peering
______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. MTTDiagnose MTTRespond MTBF MTTFix MTTRate
MTTFix
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. Popping Peering Yiping Napping Chargebacking
Peering
___________ ensures that the network is operating as efficiently as possible. Firefighting Fault tolerance Fault management Performance management Troubleshooting
Performance management
Some of the new applications being developed for a high-speed Internet include Tele-immersion Tele-conferencing QoS Broadband Tele-phoning
Tele-immersion
Which of the following is not true about one-time passwords? Users' pagers or smart phones (via text messaging) can receive them. They can be used in conjunction with a token system. The user must enter the one-time password to gain access or the connection is terminated. This is a good security solution for users who travel frequently and who must have secure dial-in access. They create a packet level firewall on the system.
They create a packet level firewall on the system.
Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account. T/F
True
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity. T/F
True
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders. T/F
True
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data. T/F
True
Controls are mechanisms that reduce or eliminate threats to network security. T/F
True
Disk mirroring writes duplicate copies of all data on at least two different disks. T/F
True
DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages. T/F
True
Due to changing communication technologies, most companies have combined voice and data communications functions. T/F
True
Ideally, when users receive training about fundamentals of network use, they become confident about what they need to do when working on a network. T/F
True
In many organizations, configuration documentation takes the form of a large set of network diagrams, one for each LAN, BN, and WAN. T/F
True
Intrusion primarily refers to the loss of confidentiality of organizational data. T/F
True
Macro viruses can spread when an infected file is opened. T/F
True
Management reports can be helpful in determining network availability statistics. T/F
True
Mean Time Between Failures is a statistic that is used to track device reliability. T/F
True
Network management is the process of operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users. T/F
True
Network management software is designed primarily to provide automated support for at least some of the network management functions. T/F
True
Network management software is used by most large organization to monitor and control their networks. T/F
True
One common configuration activity is updating the software on the client computers in the network. T/F
True
Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages. T/F
True
Performance management means ensuring the network is operating as efficiently as possible. T/F
True
Preventive controls mitigate or stop a person from acting or an event from occurring. T/F
True
Quality control charts are a simple tool that can be used by network managers to monitor network conditions. T/F
True
Secure Sockets Layer is an encryption standard designed for use on the Web. T/F
True
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. T/F
True
Service level agreements specify the exact type of performance and fault conditions that an organization will accept from a common carrier or Internet service provider. T/F
True
The CERT was established at Carnegie Mellon University. T/F
True
The RFCs that form the basis for Internet standards are developed by the IETF and its working groups. T/F
True
The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed. T/F
True
The device similar to a DSL router, but used in a FTTH environment is called an optical network unit. T/F
True
The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network. T/F
True
The most common access point used by attackers to gain access to an organization's network is the Internet connection. T/F
True
The most common cable modem standard is Data over Cable Service Interface Specification. T/F
True
The most common type of DSL today is ADSL. T/F
True
The most commonly used central authentication protocol used today is Kerberos. T/F
True
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets. T/F
True
Most WiMAX providers in the US are using an effective data range of .5 to 1.5 miles 3-10 miles 1-3 miles 0.5-50 miles 1-5 miles
.5 to 1.5 miles
Corrective controls reveal or discover unwanted events. T/F
False
Crackers are casual hackers with a limited knowledge of computer security. T/F
False
In-class training for end users should focus on security exclusively all network topics 20% of the network functions that the user will use 80% of the time proper data entry the half of the applications that this particular uses most of the time
20% of the network functions that the user will use 80% of the time
Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. 100 250 400 750
400
Most organizations strive to resolve between _______ of requests at the first Level of support in less than an hour. 10% and 15% 20% and 30% 50% and 55% 75% and 85% 95% and 99%
75% and 85%
A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats. Application level firewall Bullion server ANI system IP spoofing systems Packet level firewall
Application level firewall
_____________ is the percentage of time the network is usable by users. Retransmission rate Availability MTTDiagnose Downtime MTBF
Availability
A digital service offered by cable companies is the _________. Abilene network WAP proxy G.Lite ADSL Cable modem Next Generation Internet
Cable modem
A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. Internet steering system Optical-electrical converter WAP proxy Cable modem termination system Fixed wireless system
Cable modem termination system
A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. Disaster recovery firm DES company Directory company Certificate authority Fingerprint advisory board
Certificate authority
__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users. Charge-back Web spinning Internet access fees Support staff billing ESD
Charge-back
In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. Modem Router Bridge Combiner CMTS
Combiner
___________ refers to managing and documenting the network's hardware and software configuration. Visioning Troubleshooting Firefighting Configuration management Implementation
Configuration management
In general, tier 3 ISPs make money by charging ________. Customers ICANN UCAID The DSLAM CSUs/DSUs
Customers
A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. Intranet DMZ Zone of authority VLAN Smart hub
DMZ
At the DSL customer premises is a device called a(n) Cable modem DSLAM DSL modem Internet router DSL bridge
DSL modem
A DSL modem is also known as a: DSL bridge DSL brouter DSL router DSL gateway DSL hub
DSL router
____________ is also called automatic software distribution. Electronic Data Interchange Software architecture Desktop management Automatic configuration management Email Software Uploading
Desktop management
___________ provides information about configuration management of client computers on a network. Circuit management software Device management software System management software Application management software Desktop management software
Desktop management software
__________ provide authentication which can legally prove who sent a message over a network. Digital signatures DES keys Directory keys Screen names User Ids
Digital signatures
A cable company headend is also referred to as a: Abilene network WAP proxy Cable modem Distribution hub Fiber node
Distribution hub
To snare intruders, many organizations now use _________ techniques. Entrapment Hacker Trojan horse Cracker DES
Entrapment
WiMax was designed to easily connect into existing ___________. Wide area networks Backbone networks Ethernet LANs ATM backbones FTTH
Ethernet LANs
An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user. T/F
False
An uninterruptible power supply utilizes a second redundant disk for every disk on the server. T/F
False
Asymmetric encryption uses the same key to encrypt and decrypt a message. T/F
False
DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. T/F
False
Decryption is the process of converting plaintext into ciphertext. T/F
False
Desktop Management software requires managers to install software such as antivirus updates or application updates on client computers manually. T/F
False
Digital Subscriber Line is a family of multipoint technologies. T/F
False
Each of the networks in Internet 2 has a set of access points called terapops. T/F
False
Failure control requires developing a decentralized control philosophy for problem reporting. T/F
False
Fault-intolerant servers contain many redundant components to prevent failure. T/F
False
IXPs were originally designed to connect only tier 3 ISPs. T/F
False
If managers do not pay enough attention to planning and organizing the network, they are going to end up being proactive vs. reactive in solving network problems. T/F
False
In a DSL environment, the line splitter and DSL modem are always two separate devices. T/F
False
In transport mode, IPSec encrypts the entire IP packet. T/F
False
Maintaining data integrity is not a primary goal of security. T/F
False
Microsoft's Windows operating system meets the US government's A1 level security. T/F
False
Network cables are the easiest target for eavesdropping. T/F
False
The _________ operates like the IETF through small research groups focused on specific issues. Internet Society University Corporation for Advanced Internet Development Internet Engineering Steering Committee Internet Architecture Board Internet Research Task Force
Internet Research Task Force
The closest the Internet has to an "owning" organization is the ___________. Internet Service Provider Abilene network CA*Net3 University Corporation for Advanced Internet Development Internet Society
Internet Society
At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. Network Access Points Internet service providers Bridges LATAs Digital subscriber lines
Internet service providers
Which of the following new Internet efforts was started by 34 universities? CA*net 3 ARDNOC VBNS NGI Internet2
Internet2
A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. Line splitter V.32bis modem Line analyzer Main distribution frame Network access point
Line splitter
The _________ is the connection from a home or business to the telephone company end office. Distribution hub RFC UCAID Local loop CA*net 3
Local loop
_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails. MTTDiagnose MTTRespond MTTRepair MTTFix MTBF
MTBF
_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. MTBF Availability MTTRespond MTTDiagnose MTTRate
MTTDiagnose
A security hole is a(n): Malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users Small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location Packet-level firewall Missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system
Malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions. Faulty Bursty Trouble tickets Voice-activated Managed devices
Managed devices
A(n) ____________, is an information system that is critical to the survival of an organization. Network plan Accounting system IDS Mission critical application Firewall
Mission critical application
__________ refers to the process of translating between one set of private IP addresses inside a network and a set of public addresses outside the network. Translation Conversion Network Address Translation Proxy translation IP conversion
Network Address Translation
_____________ are used by many large and small organizations to monitor and control their networks today. Network management software packages Firefighter packages Fault creating packages Fault toleraters NICs
Network management software packages
____________ refers to keeping track of the operation of network circuits to make sure they are working properly. Network monitoring Fault tolerance Fault management Firefighting Downtime
Network monitoring
In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. CA*Net3 UCAID Next Generation Internet Internet 3 WAP proxy
Next Generation Internet
Which of the following statements is true in regards to DSL? On a circuit, the shorter the distance, the higher the speed. On a circuit, the longer the distance, the higher the speed. On a circuit, the longer the distance, less attenuation occurs. On a circuit, the shorter the distance, more attenuation occurs. When more attenuation occurs, higher frequency signals can be used effectively.
On a circuit, the shorter the distance, the higher the speed.
A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. CA*net 3 RFC WAP proxy Fixed wireless connection Optical-electrical converter
Optical-electrical converter
_____________ helps ensure that critical problems get priority over less important ones. Protocol analyzing Problem prioritizing Uptime Availability Reliability
Problem prioritizing
___________ allows the network manager to determine who is responsible for correcting any outstanding problems. Load balancing MTBF Availability Reliability Problem tracking
Problem tracking
A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. Quality control chart Quality of service Service leveling chart Desktop management Alarm cloud
Quality control chart
The key principle in preventing disruption, destruction and disaster is ___________. Redundancy Control spreadsheet IDS Anti-virus software Prevention controls
Redundancy
A ___________ is used by ISPs to authenticate its customers. Password server Remote-access server File server WAP server Web server
Remote-access server
___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept. Service level agreements Trouble tickets Smart hub lists Bursty router printouts Wish list documentation
Service level agreements
Which of the following is not considered one of the five most common business impacts? Financial Productivity Reputation Social Safety
Social
Which of the following is one of the tier 1 ISPs in North America? IETF IEEE IAB Sprint ISOC
Sprint
Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. System Satisfaction Speedy Subscriber Switch
Subscriber
_______________ describes how an asset can be compromised by one specific threat. Threat scenarios Threat plans Threat hacks Threat contingencies Threat attacks
Threat scenarios
________ is a measure of how much it costs per year to keep one computer operating. Web gardening Software installation cost Hardware upgrade cost Total cost of ownership Support staff cost
Total cost of ownership
_______________ is an encryption standard that uses a total of 168 bits as the key. Triple DES Dial-back WEP EAP Ciphering
Triple DES
Spyware, adware and DDOS agents are three types of: IP spoofing attacks Denial-of-service attacks Trojans Physical security threats Intrusion prevention detection approaches
Trojans
____________ are reports produced by numerous network software packages for recording fault information. Wish list documentation Trouble tickets Smart hub lists Bursty router printouts Roger systems checks
Trouble tickets
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet. T/F
True
A Trojan horse may allow an unauthorized user to access a computer from a remote location. T/F
True
A brute-force attack is a method of trying to guess the correct password by trying every possible key. T/F
True
A cable company distribution hub includes a combiner and a cable modem termination system. T/F
True
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization. T/F
True
A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. T/F
True
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall. T/F
True
A point of presence is the place at which the ISP provides services to its customers. T/F
True
A security hole is a bug or vulnerability that permits intrusion to a computer. T/F
True
A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. T/F
True
ADSL uses FDM to create three channels over the one local loop circuit: one for voice, one for upstream data, and one for downstream data. T/F
True
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. T/F
True
The term "firefighting" is used to describe a situation where network managers spend all of their time dealing with breakdowns and immediate problems and do not have time to plan and organize properly. T/F
True
Tier 1 service providers connect together and exchange data at IXPs. T/F
True
To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network. T/F
True
To help in negotiating site licenses for software, it is important to document which software packages are installed on each client. T/F
True
Trouble tickets are reports produced by a software package that records fault information. T/F
True
User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user. T/F
True
When someone external to your organization blocks access to your network and/or its resources, this is known as a denial-of-service attack. T/F
True
When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key. T/F
True
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. WLANs Intranet Extranet WAN None of the above
WLANs
A sniffer program is a: type of macro-virus small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location used in a call-back modem a program that records all LAN messages received for later analysis secure hub program
a program that records all LAN messages received for later analysis
In some cases, one failure generates several dozen problem reports, which makes it difficult to pinpoint the true source of the problem quickly. This is referred to as a(n) monday service failure alarm storm catastrophic issue server farm
alarm storm
Symmetric encryption systems have two parts: the key and the ____________. algorithm spamming method IP spoofer clearance code smart card bits
algorithm
A fundamental technique to determine if an intrusion is in progress in a stable network is: anomaly detection armoring cable RSA algorithm patching scanning a user's fingerprint
anomaly detection
A(n) _________ is something of value and can be either hardware or software. asset service level agreement threat security plan network design
asset
Desktop management: increases the cost of configuration management over the long term requires managers to install software and application updates manually on client computers automatically produces documentation of software installed on each client computer can not maintain documentation of software installed on each client computer decreases costs in the short term
automatically produces documentation of software installed on each client computer
A ______ is a group of computers that are connected together to perform the same task. server farm cluster load balancer virtual server both a. and b.
both a. and b.
Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. middleband narrowband rubberband metalband broadband
broadband
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: trojan horse sniffing tunneling computer forensics misuse detection
computer forensics
Which of the following is not part of the work of the Internet Society? public policy connecting optical-electrical converters education development of Internet standards maintenance of Internet standards
connecting optical-electrical converters
The basic idea behind _______ is to store other people's Web data closer to your users. managing networks content caching cost management load balancing traffic shaping
content caching
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? disruption destruction controlled chaos intrusion disaster
controlled chaos
________ controls fix a trespass into the network. corrective detective preventive mitigating backup
corrective
For access to DSL, __________ equipment is installed at the customer location. point-of-presence satellite dish customer premises metropolitan area exchange network access point
customer premises
Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? delphi team member script kiddies crackers professional hackers organization employees
delphi team member
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. denial-of-service attack service level agreement virus spamming scamming
denial-of-service attack
An example of _____ of data would be if a computer virus eliminated files on that computer. disruption controlled chaos intrusion destruction disaster
destruction
________ controls discover unwanted events. preventive corrective detective mitigating backup
detective
A tornado that eliminates a network control center would be an example of a natural __________ disaster disruption controlled chaos destruction intrusion
disaster
Encryption is the process of: transmission of information over secure lines in analog form to prevent illegal access detecting errors in messages by means of mathematical rules correcting errors in message by means of mathematical rules disguising information by the use of mathematical rules, known as algorithms preventing errors in messages by means of logical rules
disguising information by the use of mathematical rules, known as algorithms
RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____ disk backup hard drive duplication cloud backups disk duplication disk mirroring
disk mirroring
A network switch failure is an example of a(n) ________ threat. internal disruptive causal intrusion disaster
disruptive
Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information. voice-activated bursty faulty dumb intelligent
dumb
A way to prevent intrusion by disguising information through algorithms is: spoofing call-back access encryption disk elevatoring disk mirroring
encryption
When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution. firefought spun escalated burst delimited
escalated
Which of the following type of media is least susceptible to eavesdropping? fiber optics twisted pair microwave infrared coaxial cable
fiber optics
A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. firewall token system ANI call-back modem firefighter
firewall
IP spoofing means to: fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation illegally tape or listen in on telephone conversations detect and prevent denial-of-service attacks act as an intermediate host computer between the Internet and the rest of the organization's networks
fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
A high-speed Internet has a set of access points called ____ pops that provide point-of-presence at ________ speeds. giga, gigabit mega, megabit multi, multibit giga, megabit multi, gigabit
giga, gigabit
The use of hacking techniques to bring attention to a larger political or social goal is referred to as cracking ethical politics hacktivism social engineering brute force attacks
hacktivism
Which of the following is a type of intrusion prevention system? zoned-based data link-based host-based transport-based none of the above is an appropriate answer
host-based
Another term for cable networks that use both fiber-optic and coaxial cable is __________. fixed wireless mobile wireless distribution hub hybrid fiber coax fibrax
hybrid fiber coax
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: decreased because the new sophisticated technology is far more secure than the old manual methods remained the same because management was always deeply interest in control and security decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society increased because this commitment to data communications has changed the potential vulnerability of the organization's assets remained the same because there are very few threats to data communications
increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. disruptive controlled chaos disruptive intrusion disaster
intrusion
Often, incidents of unauthorized access known as___________, involve employees of the organization, surprisingly enough. intrusion disruption controlled chaos destruction disaster
intrusion
DES: is maintained by ISO refers to Date Electronic Security is a commonly used symmetric encryption algorithm that was developed in the mid-1970s was developed by a joint effort that included Microsoft is an asymmetric algorithm
is a commonly used symmetric encryption algorithm that was developed in the mid-1970s
Documentation for network and application software: usually does not include information about the network operating system usually does not include information about any special purpose network software includes information about which data files each user can access is not generally needed since networks are comprised of hardware only is important for monitoring adherence to software license rules
is important for monitoring adherence to software license rules
Which of the following is not considered a key management task for running a network? knowledge of frame relay planning organizing activities directing activities controlling activities
knowledge of frame relay
In a DSL environment, local loops from many customers enter and are connected to the central office computer center main central office main distribution facility rack
main distribution facility
Which of the following is not an important step in reducing network costs? moving to fat client architectures automating as much of the network management process as possible developing standards for computers on the network reducing the time spent manually installing new software centralizing help desks
moving to fat client architectures
A costing method that examines only the direct costs of operating the computers, omitting softer indirect costs such as "wasted" time is referred to as total cost of ownership network cost of ownership transactions costs ownership privileges total direct costs
network cost of ownership
A __________ is an organizational department that is responsible for monitoring and fixing overall network problems. mission critical area fault tolerance department network operations center mullion delimiter agency web surfing guru headquarters
network operations center
According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they often have weaker security have more assets are more likely to have credit card numbers available are likely off-shore have lower bandwidth
often have weaker security
A ______________ is a browser add-in or app that stores website passwords. password collaborator password manager script manager security envelope security manager
password manager
Which of the following is not a method for deterring intrusion? training end users not to divulge passwords using a smart card in conjunction with a password to gain access to a computer system using biometric devices to gain access to a computer system using a security software package that logs out users if that user is 'idle' for a certain amount of time performing social engineering
performing social engineering
To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems. planning and organizing the network and networking staff LAN manual fault log trouble ticket troubleshooting log
planning and organizing the network and networking staff
A _________ is the place at which the ISP provides services to its customers. remote access point network access point cable modem termination system endpoint point-of-presence metropolitan area exchange
point-of-presence
_________ controls stop a person from acting. detective corrective mitigating preventive backup
preventive
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. risk assessment backplane mitigating control factor analysis control verification worksheet control test plan
risk assessment
We can calculate the relative ___________, by multiplying the impact score by the likelihood. rootkit authentication risk score risk assessment risk event
risk score
Which of the following is typically not a part of configuration documentation? hardware documentation sales brochures for new hardware products being considered by the organization user profiles network software documentation software documentation
sales brochures for new hardware products being considered by the organization
For Ethernet networks, a _______ switch can make eavesdropping more difficult. secure trojan horse proxy spoofing spamming
secure
IP Security Protocol: is focused on Web applications is primarily used to encrypt e-mail is a policy which makes public key encryption work on the Internet sits between IP at the network layer and TCP/UDP at the transport layer operates in entrapment mode
sits between IP at the network layer and TCP/UDP at the transport layer
Which of the following is not a main function within end user support? resolving network faults training resolving user problems spin control none of these answers are appropriate
spin control
Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS? stats on multiplexers stats on modems stats on circuits in the network stats on user response times stats on malfunctioning devices
stats on user response times
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. asset service level agreement threat security plan network design
threat
A brute force attack against an encryption system: is called RC4 tries to gain access by trying every possible key is also known as 3DES always uses the Rijndael algorithm is part of the Advanced Encyrption Standard
tries to gain access by trying every possible key
A brute force attack against an encryption system: is called RC4 tries to gain access by trying every possible key is also known as 3DES always uses the Rijndael algorithm is part of the Advanced Encyrption Standard
tries to gain access by trying every possible key
Which of the following is a mode that is used by IPSec? exchange sniffer tunnel creeper firefighter
tunnel
A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. network cloaking device backup punch card reader uninterruptible power supply service level agreement help desk
uninterruptible power supply
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? locked doors on all communication closets passwords that disable the screen and keyboard of a computer secured network cabling behind walls and above ceilings use of armored cable unlocked wiring closet for network devices
unlocked wiring closet for network devices
Which of the following is not one of the three major sources of a user's equipment problem that can be solved by network support? use of the CD-ROM as a cup holder failed hardware device lack of user knowledge incompatibility between user software and network hardware and software none of the above is an appropriate answer
use of the CD-ROM as a cup holder
Fiber to the Home uses: frequency division multiplexing wavelength division multiplexing time division multiplexing statistical time division multiplexing all of the above
wavelength division multiplexing
Which of the following is not a basic function of a network manager? web surfing to shop on eBay cost management performance and fault management configuration management end user support
web surfing to shop on eBay
Which of the following are usually the first choice for eavesdropping? unshielded twisted pair shielded twisted pair local cables owned by the organization wireless LANs fiber optics
wireless LANs
A (n) ______ is a special type of virus that spreads itself without human intervention. snake worm trojan horse boot sector virus stealth virus
worm