Telecommunications and Networks

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What does network management ensure?

ensures that the network works as intended and provides value to its user

controls

mechanisms that reduce or eliminate threats to network security.

fault management

preventing, detecting, and correcting faults in the network circuits, hardware, and software

decryption

process of restoring to readable form

business continuity planning

refers primarily to ensuring availability, with some aspects of data integrity.

network operations center

responsible for monitoring and fixing problems

availability

the percentage of time the network is available to users

brute force attack

trying every possible key

network management

understanding network technologies, ability to work with end users and management, and understanding key elements of driving network costs

security hole

A bug that permits unauthorized access.

permanent virtual circuit

Connections between the different locations in the packet network. They are defined for frequent and consistent use by the network.

ring architecture

Connects all computers in a closed loop with each computer linked to the next. Messages flow in both directions around the ring.

star architecture

Connects all computers to one central computer that routes messages to the appropriate computer. Easy to manage because the central computer receives and routes all messages in the network. Can also be faster than the ring.

true

Have companies combined voice and data communication functions?

* Improving device performance * Upgrading the circuits between the locations * Changing the demand place on the network

How can the performance of WANs be improved?

24

How many 64Kbps channels does a T1 circuit have?

IP spoofing

Software that can change the source IP address on the packets they send

desktop management

Solution to configuration problems. It enables network managers to install software on client computers over the network without physically touching each client computer.

service level agreements

Specifies the exact type of performance and fault conditions that the organization will accept.

risk assessment

Strategies for analyzing and prioritizing the security risks to information systems and networks.

CRTC

The _________________ is a Canadian government agency that regulates voice and data communication.

true

The most common authentication protocol used today is Kerberos.

computer forensics

The use of computer analysis techniques to gather evidence for criminal and/or civil trials.

line splitter

Used to separate the traditional voice telephone transmission from the data transmissions.

Inter-exchange Carrier(IXC) (ex: AT&T)

What are common carriers that provide long distance services called?

managed devices

devices that perform their functions: routing and switching and also record data on the messages they process

What is point-of-presence?

(POP): the place at which the ISP provides services to it customers.

No, data also

Can T-carrier circuits only be used to transmit voice?

Triple DES

A newer standard that is harder to break because it uses DES three times, usually with 3 different keys to produce encrypted text. which produces a stronger level of security.

certificate authority

A trusted organization that can vouch for the authenticity of the person or the organization using authentication.

denial-of-service attack

An attacker attempts to disrupt the network by flooding it with messages so that the network cannot process messages from normal users

mission critical application

An information system that is critical to the survival of the organization. An application that cannot be permitted to fail.

threat

Any potential occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization

threat scenario

Describes how an asset can be compromised by one specific threat.

latency

Devices are rated for their speed in converting input packets to output packets

benefits of packet switched services

Different locations have different connection speeds into the common carrier cloud. The PAD compensates for differences in transmission speed between sender and receiver

encryption

Disguising information by the use of mathematical rules known as algorithms.

public utilities commission

Each state or Canadian province has its own ___________ to regulate communications within its borders

application-level firewall

Examines the contents of the application-level packet and searches for known attacks

packet-level firewall

Examines the source and destination address of every network packet that passes through it

No, because it does not perform error control.

Is frame relay a reliable packet service?

configuration management

Managing the network's hardware and software configurations, documenting it, and ensuring it is updated as the configuration changes.

What is MTBF?

Mean Time Between Failure (number of hours or days continuous operation before a component fails

What is MTTF?

Mean Time To Fix

preventive controls

Mitigate or stop a person from acting or an event from occurring.

disadvantages of the star architecture

Most susceptible to traffic problems because the central computer must process all messages on the network.

common carriers

Private companies such as AT&T, Sprint, Bell Canada, BellSouth that provide communication services to the public.

virtual private network

Provides the equivalent of a private packet-switched network over the public internet.

corrective controls

Remedy of an unwanted event or an intrusion

Trojan horse

Remote access to management consoles that enable users to access a computer and manage it from afar.

1. develop standard hardware and software configurations for client computers and servers 2. automate as much of the network management function as possible by deploying a solid set of network management tools 3. reduce the cost of installing new hardware and software by working with vendors 4. centralize help desks 5. move to thin-client or cloud-based architectures

What are important steps in reducing network costs?

1. Algorithm 2. Key

What are the 2 parts of symmetric encryption?

1. internet 2. LANs inside the organization 3. dial-up access from a modem

What are the 3 basic network access points into organizational networks?

Ring, Star, and Mesh

What are the basic architectures for dedicated circuit networks?

- training end users not to divulge passwords - using a smart card in conjunction with a password to gain access to a computer system - using biometric devices to gain access to a computer system - using a security software package that logs out users if that user is 'idle' for a certain amount of time

What are the methods for deterring intrusion?

- casual intruders - experts in security - professional hackers - organization employees

What are the types of intruders who attempt to gain intrusion to computer networks?

Back Orifice, MoSucker, Optix Pro

What are three types of Trojans?

1. require a network impact statement for all new application software developed or purchased by the organization 2. use data compression techniques for all data in the network.

What are ways to reduced network demand?

PAD (Packet Assembly Disassembly) device

What device allows a user to connect into a packet switched service?

confidentiality and integrity of data

What does intrusion primarily refer to?

Committed Information Rate (the data rate the PVC guarantees to transmit. If the network accepts the connection, it guarantees to provide that level of service)

What is CIR?

Data Encryption Standard: a symmetric encryption technique

What is DES?

Demilitarized Zone: it contains the organization's servers but doesn't provide complete security for them.

What is DMZ?

(DSL): Digital Subscriber Line it's a family of point-to-point technologies designed to provide high speed data transmissions over traditional telephone line.

What is DSL?

high-speed dedicated circuit services

What is SONET made up of?

Secure Sockets Layer: encryption protocol

What is SSL?

CSU (Channel Service Unit) DSU (Data Service Unit)

What is a CSU/DSU?

low cost and flexibility

What is a primary advantage of a VPN compared to a private WAN connection?

A patch

What is a software solution to correct a security hole referred to as?

Federal Communications Commission ( U.S)

What is the FCC?

1.544 Mbps

What is the data rate for a T-1 circuit in North America?

Proactive

What is the key principle in preventing disruption, destruction, and disaster?

Detects power failures and permits the devices attached to it to operate as long as its battery lasts.

What is the purpose of an un-interruptable power supply?

1. Public keys 2. Private keys

What keys does asymmetric encryption use?

AT&T, Sprint

What types of tier 1 companies sit at the top of the Internet structure?

Internet2

Which Internet effort was started by 34 universities?

both

Which circuit(s), full or half duplex, can a WAN with a ring topology use?

prestige value of using a particular common carrier

Which of the following is not a key issue to be considered when selecting a WAN service?

personal social engineering

Which of the following is not a method for deterring intrusion?

knowledge of frame relay

Which of the following is not considered a key management task for running a network?

DSU

Which of the following is not one of the large local exchange carriers operating in North America today?

Broadband technologies

Which technologies provide higher-speed communications than traditional modems?

fiber optic

Which type of media is least susceptible to eavesdropping?

infrared

Which type of twisted pair wires are the first choice for eavesdropping?

IXPs (internet exchange points):AT&T, Verizon, Sprint, Qwest, Level 3, Global Crossing

Who do tier 1 companies exchange data with?

Wi-Fi

WiMax easily connects into what types of networks?

digital signatures

a combination of a message digest and other information used to assure non-repudiation.

sniffer program

a program that records all LAN messages received for later (unauthorized) analysis

firewall

a router or special-purpose device that examines packets flowing into and out of a network and restricts access to the organization's network.

local loop

cable from a home or office to the telephone company end office is capable of providing higher data transmission rates.

network monitoring

collecting operational statistics from the network devices-often done by one person aided by a few simple tools

disk mirroring

data on a disk is copied onto another

crackers

hackers who cause damage

T-carrier services

leasing a dedicated circuit from one building in one city to another building in the same or different city


Set pelajaran terkait

Exam 2- Alternation of generations

View Set

Define peritoneum and peritoneal cavity, and describe the relationship of the digestive organs to the peritoneum

View Set

Business Analyst Multiple Choice

View Set

AP Bio Chapter 48 Practice: Neurons, Synapses, and Signaling

View Set

Accounting Theory and History Final

View Set