MIS 340 Final Exam

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Microwave transmission is ____

- a type of high frequency radio communication - requires a clear line of sight path - is typically used for long distance data transmission - does not require the laying of any cable

List the Layers of the Internet (TCP/IP) Model and list common standards

1. Physical - CAT 5, RS-232, v.92 2. Data Link - Ethernet (LAN), Frame Relay (WAN), T1 (MAN and WAN) 3. Network - IP 4. Trasport - TCP 5. Application - HTTP, HTML, MPEG, H.323, SMTP, IMAP, POP

In Moore's law, a CPU transistor count doubles every ________ months.

18

The data rate for a T-3 circuit in North America is:

44.376 Mbps

A local area network is

A group of personal computers or terminals located in the same general area and connected by a common cable (communication circuit) so they can exchange information such as a set of rooms, a single building, or a set of well-connected buildings

The following are steps under the traditional network design approach?

An analyst develops cost estimates of the circuits needed to support the network., An analyst meets with users to identify user needs., An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network., An analyst designs the circuits to support the estimated traffic, allowing for modest growth.

__________ is a data footprint that tells where you've been.

Artifact

What are the 3 tiers of quality for power supply?

Bronze, Gold, Silver

The type of logical topology that hub-based Ethernet uses is a:

Bus

What title does Ashley Ewing hold at the University?

CISO

The ________ works with the bios to help boot the computer

CMOS

What works with BIOS to help boot the computer?

CMOS

What part is considered the "brain of the computer"?

CPU

Temporary storage used before RAM

Cache

Which of the following is true for USB?

Can be used to connect computer to external controllers, Also used for storage, does enumeration

The following are basic LAN components

Client, Server, Network Interface Card, Network operating system

_______________ waits for instruction, ___________ performs the instruction.

Client, server

The three major steps used in of the building-block process to network design

Cost Assessment, Technology Design, Needs Analysis

Two fundamentally different types of data are:

Digital and analog

_____________ connect hardware to software.

Drivers

Which of the following would be a standard or protocol used at the Data Link Layer of the Internet or OSI model?

Ethernet

The 2 ways to connect to a network are by ____ or ______.

Ethernet and wifi

(true/false) An SSD is volatile

False

SSD is slower and cheaper than traditional drives

False

(true/false) In a multipoint circuit configuration, each computer has a dedicated circuit between itself and each of the other computers in the network.

False ( not a specific circuit for each)

(t/f) Technologies such as DSL and cable modem are called narrowband technologies.

False (DSL is broadband)

(true/false) Digital transmission produces more errors than analog transmission.

False (analog transmission produces more errors, older style)

(true/false) With modem communications, the receiving modem converts the incoming digital signal from the telephone line into an analog signal that can be understood by the computer.

False (digital not analog)

(true/false) A local area network (LAN) connects other LANs and backbone networks (BNs) located in different areas to each other and to wide area networks in a span from 3 to 30 miles.

False (doesnt reach 3 to 30 miles)

(true/false) Ethernet is a layer 3 protocol, which operates at the network layer.

False (ethernet is internet)

(true/false) Only the sender of a data transmission needs to be concerned about the rule or protocols that govern how it communicates with the receiver.

False (everyone)

(true/false) An intranet is a LAN that uses Internet technologies and is publicly available to people outside of the organization.

False (extranet)

(true/false) Ethernet is wireless connectivity.

False (has wires)

(t/f) An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

False (intruder is an insider)

(true/false) Raid uses a single drive to either create better dependency or more speed

False (it uses multiple drives)

(t/f) WiMAX is an older wireless technology that probably wont be used much longer.

False (its a newer technology)

(t/f) Network cables are the easiest target for eavesdropping

False (lans are easiest target for eavesdropping)

(t/f) Routers operate at the application layer

False (no, it operates at physical, network, and data link NOT application)

(true/false) Traditional network design approach works very well for rapidly changing networks.

False (not rapid)

(true/false) The campus backbone (or core layer) is the network architecture component responsible for providing end user access to the network

False (not responsible for end user access)

(true/false) The primary goal of the needs analysis step in network design is to develop a physical network design

False (not the primary goals)

(true/false) An access point plays the same role in a wireless network as a router does in a wired Ethernet network.

False (router and access point are complete dif)

(true/false) A switch always broadcasts all the packets it receives to all the computers that are connected to the switch

False (switch does not broadcast to all packets)

(true/false) Fiber optic cable is thicker and heaver than unshielded twisted pair.

False (unshielded is thicker and heavier)

(t/f) Today, a common carrier that provides long distance services is typically called a local exchange carrier.

False(long distance is not local)

Which of the following type of media is most commonly used in backbone networks because of its high capacity?

Fiber

Which of the following media has the lowest error rates and the highest transmission speeds

Fiber optic cable

A _______ allows many users to share the same set of files on a common, shared disk drive.

File server

Having a conversation with someone using a cellular phone is an example of ______ transmission.

Full-duplex

What are the tiers of quality power supply?

Gold, silver, bronze

What does GPU stand for?

Graphics Processing Unit

The ability to transmit in both directions, but only in one direction at a time is an example of _____ transmission.

Half-duplex

What reads/writes data for permanent storage?

Hard Drives

The ___________ is used to read and write data for permanent storage.

Hard drive

______________ writes all data in Ram to disk before going to low power

Hibernation

Please list the 4 architecture types:

Host-based, Client-based, Client-server, Peer-to-peer

A mouse is

Internal, External, USB driven

Which of the following is true with respect to the data link layer?

It performs error detection

Which of the following is true about roll call polling?

It typically involves some waiting because the server has to wait for a response from the polled client or terminal

______________ principle - any interaction between two entities leads to a creation or transfer of data.

Locard's Exchange

Any interaction between two entities leads to a creation or transfer of data

Locard's Exchange Principle

A ____ is a very large general-purpose computer that is capable of performing very many functions as if these are done simultaneously, and storing extremely large amounts of data.

Mainframe

________ is the software that controls the network.

Network operating system

Cloud storage is __________.

Online storage

Networks that are designed to connect similar computers that share data and software with each other are called:

Peer-to-peer networks

Data is physically transmitted from one computer or terminal to another in the ______ layer.

Physical

With the two-tier client-server architecture the client is responsible for the ______ logic.

Presentation

Please list the 4 components of applications:

Presentation Logic, Application Logic, Data Access Logic, Data Storage

Which of the following can provide fault tolerance for the storage space on a server?

RAID

____________ is temporary storage between CPU and hard drive.

RAM

What does RAM stand for?

Random Access Memory

The traditional network design approach does not work well for ______ networks.

Rapidly growing

What does RAID stand for?

Redundant Array of Independent Disks

On digital circuits, we use ____ to reshape the incoming signal and prevent attenuation.

Repeaters

When all bits of a character are transferred one after another, the bits are transferred in _________ mode.

Serial

What does SATA stand for?

Serial Advanced Technology Attachment

A _____ provides shared access to data

Server

Please provide the definition of Middleware

Software that acts as an intermediary by "sitting between" client and server applications

What does SSD stand for?

Solid State Drive

Which of the following happens when you delete something?

Stays until overwritten. Leaves artifacts. It's never really deleted.

______ is the dominant network protocol today and is used in virtually every LAN and WAN in the world.

TCP/IP

(True/False) Ram is volatile

True

(t/f) A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.

True

(t/f) A T1 circuit provides a data rate of 1.544Mbps

True

(t/f) A backbone network is a high speed network that connects many networks

True

(t/f) A room that contains a rack of equipment for a rack-based collapsed backbone is also called the main distribution facility (MDF) or central distribution facility (CDF)

True

(t/f) A software solution to correct a security hole is often referred to as a patch or update.

True

(t/f) A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss the organization.

True

(t/f) Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

True

(t/f) Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.

True

(t/f) Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

True

(t/f) Controls are mechanisms that reduce or eliminate threats to network security.

True

(t/f) Ethernet services are now being successfully used in WAN environments

True

(t/f) One basic component of a backbone network is the hardware device that connects other networks to the backbone

True

(t/f) One difference between a switch and a router is that a router will only process messages addressed to the router (at layer 2) while a switch processes all messages.

True

(t/f) Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages.

True

(t/f) Secure sockets layer is an encryption standard designed for use on the Web.

True

(t/f) The device similar to a DSL router, but used in a FTTH environment is called an optical network unit.

True

(t/f) Tier 1 service providers connect together and exchange data at IXPs.

True

(t/f) WANs can connect BNs across distances that can span up to thousands of miles

True

(t/f) the denial-service of attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.

True

(true/false) 802.11n LANs operate at speeds up to 600 mbps.

True

(true/false) A server waits for instruction.

True

(true/false) At the transport layer in the Internet model, TCP is responsible for breaking large files received from the application layer into smaller messages and opening a connection to a server for transferring them.

True

(true/false) Capacity planning is used to design circuit capacity

True

(true/false) Media acess controls refer to the need to control when computers transmit.

True

(true/false) Simulation is a tool that can be used in designing networks

True

(true/false) The network layer performs the same functions in both the OSI and Internet models and is responsible for routing messages from the source computer to the destination computer.

True

(true/false) the network interface card (NIC) permits a computer to be physically connected to a network cable.

True

The 4 general functions of any application program are: data storage, data access logic, application logic and presentation logic

True

A(n) ______ -tiered architecture uses only two sets of computers: one set of clients and one set of servers.

Two

Which of the following are input/output ports?

UDB, HDMI, Ethernet/NIC

What is used to connect a computer to external controllers?

USB

List three I/O ports that are used in a computer.

USB, VGA, HDMI, Audio, Ethernet/NIC

These are directly contributing to the dramatic increase in network traffic today?

Video applications on networks are becoming common., Electronic mail is now used by most people who work in organizations., Web searches are now commonly performed by network users., Multimedia applications on networks are becoming common. Answer: D

To interact with the World Wide Web, a client computer needs an application layer software package called a:

Web browser

What happens once a computer goes into hibernation?

Writes all data in RAM to disk before going to low power mode

Using parity, the probability for detecting an error, given that one has occurred, is:

about 50% for either even or odd parity

In general, older networks and local loops designed to transmit voice data are likely to be _______.

analog

Another term for the weakening of a signal over distance is:

attenuation

Errors on a network can occur:

because of noise on the line

A digital service offered by cable companies is the ________.

cable modem

Which of the following is TRUE for cd/dvd drives?

can boot from cd, different speeds, Can be external/internal, can be used as a hard drive

100 Base-T:

can run at either full or half-duplex

In general, tier 3 ISPs make money by charging _______.

customers

A network switch failure is an example of a(n) _______ threat.

disruptive

The cheapest time to install network cabling is:

during the construction of the building

(true/false) The latest version of IP is IPv7 which increases the address space from 128 bits to 256 bits

false

(true/false) TCP/IP is a data link protocol that is used on the Internet

false (tcp breaks large files to smaller messages)

Which of the following media can best withstand harsh environmental conditions?

fiber optic cable

The two basic types of media are:

guided and wireless (radiated)

The newer from of IP, version 6 (IPv6):

has an increased address size from 32 bits to 128 bits

Another term for cable networks that use both fiber-optic and coaxial cable is ________.

hybrid fiber coax

At the top of the Internet structure are tier 1 _______, such as AT&T and Sprint.

internet service providers

Often, incidents of unauthorized access known as _____, involve employees of the organization, surprisingly enough.

intrusion

In ARQ, a NAK:

is sent by the recipient if the message contains an error

Switches:

learn addresses by reading the source and destination addresses

A _______ separates traditional voice telephone transmission for the data transmissions in the equipment located at the customer site for DSL.

line splitter

The _____ is the connection from a home or business to the telephone company end office.

local loop

Which of the following would be considered a type of wireless media?

microwave

What component of a computer connects the major parts together?

motherboard

The following are potential bottleneck for LAN performance:

number and speed of hard disks in the server, amount of memory in the server, speed of servers CPU, network interface card

These are error detections method used in the data link layer?

parity check, cyclic redundancy check, CRC-32 checking, odd parity

Cloud computer Models (fill in the table)

picture on laptop

A _______ is the place at which the ISP provides services to its customers.

point-of-presence

The key principle in preventing disruption, destruction and disaster is ______.

redundancy

There are optional and required parts of an HTTP request. They are:

request line, request header, request body

A ________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

risk assessment

Which of the following is true about a server?

stores data and software that can be accessed by the client., may be a personal computer or a mainframe on the network., in client/server computing they work together over the network with client computers to support the business application., stores documents and graphics that can be accessed from any Web

A ___ refers to a group of computers that are logically grouped together by IP number

subnet

Which of the following is true in regard to a CPU?

the cpu is the brain of the computer, fastest processor is the Xeon, must be cooled

A(n) ________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

threat

(true/false) Today, most network designers use a three to five year planning horizon

true

Mesh networks:

typically contain more circuits in the network than in star or ring networks

The familiar background static on radios and telephones is called:

white noise


Set pelajaran terkait

Chapter 5: Electrostatics and Magnetism

View Set

Ultrasound Registry Review Anatomy GYN

View Set

Chemistry - Scientific Notation and Significant Figures

View Set

Cardiology/respiratory/endocrine

View Set

Sociology Chapter 1-Symbolic Interactionism Quiz

View Set

Ch 12 Oncologic Management PrepU

View Set