MIS140 Final Exam MC study set
A backbone network that connects many backbone networks spanning serveral buildings at a single location is often called a Internet backbone? (T/F)
False
A hardware device that operates at the application layer is a router (T/F)
False
Backbone networks typicaly use lower speed circuits to interconnect a series of LANs and provide connections to other backbone networks (T/F)
False
Routers can only connect the same type of cable (T/F)
False
Routers operate at the application layer (T/F)
False
The cable to connect BNs is usually twisted pair. (T/F)
False
One basic component of a backbone network is the hardware device that connects other networks to the backbone. (T/F)
True
Routers connect tow or more network segments that use the same or different data link protocols, but the same network protocol (T/F)
True
Routers use network layer address to forward packets between network segments. (T/F)
True
Switches and routers are devices that can connect networks to the BN (T/F)
True
The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps
1.544 Mbps
OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps
159.25 Gbps
In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36
24
The data rate for a T-3 circuit in North America is: 1.544 Mbps 6.312 Mbps 44.376 Mbps 274.176 Mbps 1.544 Gbps
44.376
The backbone architecture layer that is closest to the users is the A. access layer B. Distribution layer C. Core layer D. Privacy Layer E. Switched layer
Access layer
Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements.
All of the above are true statements
The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN b. FCC c. CRTC d. CSU e. POTS
CRTC
A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM
CSU/DSU
____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs
Common Carriers
The ___ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer
Core later
______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks
Dedicated-circuit networks
Which of the follwing is not a type of intruder who attempts to gain intrusion to computer networks? a. script kiddies b.delphi team members c. crackers d. professional hackers e. organization employees
Delphi team member
__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids
Digital signatures
The ____ is the part of the backbone that connects the LANs together A. access layer B. Distribution layer C. Core layer D. Privacy Layer E. Switched layer
Distribution layer
VLANs prioritize traffic based on the _____ a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics
IEEE 802.1q standard
_____________ is a common standard for use by layer 2 access VPNs for encapsulation. L2TP VPN2 Encapsule2 TCP/IP PPP
L2TP
__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay
Latency
Most IP services use _______ as the data link layer protocol. Ethernet TCP MPLS IRoute T1
MPLS
_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP
MPLS
A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT firewall c. IP spoofing bridge d. packet level firewall e. smart hub
NAT firewall
__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. Translation Conversion Network address translation Proxy translation IP conversion.
Network address translation
With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. PAD gateway switch router WAN
PAD
computers can be assigned to a VLAN based on the _____ a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer
Physical port on the switch
Using___ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access
QoS
A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone
Routed backbone
_________ move packets along the backbone based on their network layer address. 1. Bridged backbones 2. Hubbed backbones 3. Multistation access unit backbones 4. Routed backbones 5. NIC backbones
Routed backbones
Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety
Social
A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone
Switched backbone
_________ have no backbone cable. a. Switched backbones b. Cloud routed backbones 3. Hubbed backbones 4. Bridged backbones 5. Multistation access unit backbones
Switched backbones
Which of the following is not a type of VPN? intranet VPN extranet VPN access VPN T-1 VPN a VPN that enables employees to access an organization's network from a remote location
T-1 VPN
_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN
T-carrier services
Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.
The data transmission rates tend to be lower than dial-up or dedicated circuits.
Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.
They can be used in place of routers.
Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based
They place all network devices for one part of the building physically in the same room, often in a rack of equipment
Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs.
They tend to use lower speed circuits than LANS
_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks
Threat scenarios
_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering
Triple DES
Spyware, adware and DDOS agents are three types of: A. IP spoofing attacks B. Denial-of-service attacks C. Trojans D. Physical security threats E. Intrusion prevention detection approaches
Trojans
A backbone network is a high-speed network that connects many networks? T/F
True
A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone Routed backbone
Virtual LAN
Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone
Virtual LAN
The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. WLANs b. intranet c. extranet d. WAN e. none of the above
WLANs
a sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program
a program that records all LAN messaged recieved for later (unauthorized) analysis
Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network
adding new keyboards to the client computers
A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits
algorithm
A fundamental technique to determine if an intrusion is in progress in a stable network is: anomaly detection armoring cable RSA algorithm patching scanning a user's fingerprint
anomaly detection
A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall
application level firewall
Ethernet/IP packet networks: are supported with gigabit fiber optic networks in large cities are offered only by the common carriers use token ring layer 2 media access control use IPX/SPX protocols provide CIR up to a maximum of 1.544 Mbps
are supported with gigabit fiber optic networks in large cities
A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design
asset
Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization
both inside and outside of the organization
Which of the following is not a basic architecture for dedicated circuit networks? ring partial mesh bus star full mesh
bus
A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board
certificate authority
In a packet switched network, permanent virtual circuits that look very similar to a ____ move packets through a network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design
cloud-based mesh design
Which of the following would not be part of an "ideal" backbone design for the future? A. access layer composed of 10/100 layer 2 Ethernet switches B. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T C. redundant switches D. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber E. coax cabling throughout LANs and BN
coax cabling throughout LANs and BN
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: Trojan horse sniffing tunneling computer forensics misuse detection
computer forensics
A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c . connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above
connects all computers to one central computer that routes messages to the appropriate computer
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster
controlled chaos
Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements
controls
________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup
corrective
the biggest drawbacks to VLANs are their _____ a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size
cost and management complexity
_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup
preventive
Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above
data link-based
A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit
datagram
Which of the following is not a technology layer that is considered when designing backbone networks? access layer distribution layer decentralized layer core layer none of the options
decentralized layer
A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming
denial-of-service attack
A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails
dependent upon the capacity of the central computer for its performance
An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster
destruction
A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion
disaster
Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules
disguising information by the use of mathematical rules, known as algorithms
A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster
disruptive
Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used
dumb terminals
Network demand will not be reduced by: A. restricting (or moving) applications such as desktop videoconferencing B. using network devices to ensure that broadcast messages do not go to other networks C. encouraging the use of applications such as medical imaging D. sending status information to all computers on all LANs in the backbone network E. restricting (or moving) applications such as multimedia
encouraging the use of applications such as medical imaging
A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring
encryption
To snare intruders, many organizations now use _________ techniques. entrapment hacker Trojan horse cracker DES
entrapment
Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable
fiber optics
A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. a. firewall b. token system c. ANI d. call-back modem e. firefighter
firewall
IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization's networks
fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design
full mesh design
Circuit capacity on a backbone network will not be improved by: A. going from 100Base-T Ethernet to 10Base-T Ethernet B. going from 100Base-T Ethernet to gigabit Ethernet C. adding additional circuits alongside heavily used ones D. replacing a shared circuit backbone with a switched circuit backbone E. providing a faster circuit to the server
going from 100Base-T Ethernet to 10Base-T Ethernet
The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. hacking b. ethical politics c. hacktivism d. social engineering e. brute force attacks
hacktivism
Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs
imposes an overhead cost by increasing network traffic
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications
increased because this commitment to data communications has changed the potential vulnerability of the organization's assets
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster
intrusion
Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster
intrusion
DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm
is a commonly used encryption algorithm that was developed in the mid-1970s
Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only
is typically offered only to commercial customers
Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches
learn addresses by reading the source and destination addresses
Which of the following is a primary advantage of a VPN? low cost inflexibility unpredictable traffic congestion security complexity to the user
low cost
Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility
main distribution facility
A security hole is a(n): A. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users small peep-hole in a door or wall to allow a B. security guard to examine an individual before allowing that individual access to a secure area or location C. packet-level firewall D. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution E. ANI system
malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer
may also be called TCP/IP gateways
In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver
messages can take a long time to travel from the sender to the receiver
A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall
mission critical application
Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times
moving data further from the applications and people who use them
According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth
often have weaker security
A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device
packet assembly/disassembly device
A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall
packet level firewall
Which of the following type of networks permit packets from separate messages to be interleaved? circuit switched network dedicated circuit network dial up circuit network packet switched network Fractional T-1 network
packet switched network
Devices in a rack are connected together using ___ a.) patch cables b.) string c.) servers d.) modules e.) chassis switches
patch cables
Which of the following is not a method for deterring intrusion? a.training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c.using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time. e. performing social engineering
performing social engineering
A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network
permanent virtual circuit
Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability
prestige value of using a particular common carrier
________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup
preventive
Basic rate interface: A. is typically offered only to commercial customers B. provides a communications circuit with two 64 Kbps B channels, plus one D channel C. is defined exactly the same way in Europe D. has an upper capacity of 1.544 Mbps E. is comprised of analog circuits only
provides a communications circuit with two 64 Kbps B channels, plus one D channel
Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT
public utilities commission
With a switched backbone network, the equipment is usually placed in a ___ a.) server b.) NIC c.) cabinet d.) basement e.) rack
rack
The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls
redundancy
Routers: a. require more management than switches b. are not susceptible to time delays 3. use data link layer addresses to move packets that leave the subnet 4. require only a few set of TCP/IP addresses 5. don't need much time to establish separate subnet addresses for each LAN
require more management than switches
Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded
require more processing by each computer in the network than in star or ring networks
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design
ring design
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan
risk assessment
We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event
risk score
A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone
routed backbone
Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet
routers perform more processing on each message than switch
For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming
secure
IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode
sits between IP at the network layer and TCP/UDP at the transport layer
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design
star design
Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11
sufficient memory
Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable
there are many more networking devices in a switched backbone network
Which of the following is not true about one-time passwords? a. Users' pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system.
they create a packet level firewall on the system
A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. asset service level agreement threat security plan network design
threat
Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN none of the options
translating packets from one protocol to another as they enter the BN
A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard
tries to gain access by trying every possible key
Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter
tunnel
With a virtual private network, users create permanent virtual circuits through the Internet called: bursts cells tunnels rings clouds
tunnels
A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk
uninterruptible power supply
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices
unlocked wiring closet for network devices
The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic
upgrading the circuits between the computers
Switched backbone networks: a. always use a ring topology 2. are the least common type of BN used in one building 3. use a star topology with one device, usually a switch 4. have a great deal of cable in their backbones 5. tend to have less cable, but more network devices
use a star topology with one device, usually a switch
SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities
uses inverse multiplexing above the OC-1 level
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network
virtual private network
Which of the following are usually the first choice for eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. local cables owned by the organization d. wireless LANs e. fiber optics
wireless LANs
A (n) ______ is a special type of virus that spreads itself without human intervention. snake worm Trojan horse boot sector virus stealth virus
worm