ITN
The data rate for a T-1 circuit in North America is:
1.544 Mbps
OC-3072 has a data rate of
159.25 Gbps
Data traffic from the DSL customer premises is sent to a __________, which is located at the local carrier's end office.
DSLAM
______________ are sometimes called private line services.
Dedicated-circuit networks
Problem statistics are not helpful in determining whether vendors are meeting contractual maintenance commitments.
False
Routers can only connect the same type of cable.
False
STP cable is least costly type of cable used in today's networks and is the most commonly used cable type in connecting computers to switches.
False
Switched backbones are harder to maintain and upgrade than a BN that is not rack-based.
False
Switched backbones make it more difficult to move computers from one LAN to another.
False
Switches connect two or more network segments that use different data link protocols.
False
Switches operate at the physical layer only.
False
T carrier circuits can only be used to transmit voice.
False
The Internet Engineering Steering Group provides strategic architectural oversight for the Internet.
False
The Internet is flat in structure.
False
The NOS software for the server computer provides the physical, data link, and network layer functions.
False
To connect into a packet switched network, a network terminator is generally used.
False
VLAN configurations are limited to spanning over no more than two switches.
False
With regards to DSL, on a circuit, the longer the distance, less attenuation occurs.
False
With regards to DSL, on a circuit, the longer the distance, the higher the speed.
False
A Software Defined WAN (SDWAN) provides four benefits. Which of the following is not one of those benefits?
Flexibility
The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet.
Internet Engineering Task Force
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.
Peering
___________ ensures that the network is operating as efficiently as possible.
Performance management
_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today.
T-carrier services
With switched Ethernet, it essentially provides a point-to-point connection between computers.
TRUE
Some of the new applications being developed for a high-speed Internet include
Tele-immersion
Which of the following is not true about layer-2 switched Ethernet?
The physical topology is the same as the physical topology of shared Ethernet: a ring.
Which of the following is not true about one-time passwords?
They create a packet level firewall on the system.
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.
True
Controls are mechanisms that reduce or eliminate threats to network security.
True
Ethernet services are now being successfully used in WAN environments.
True
Hub-based Ethernet is a star physical topology and a bus logical topology.
True
Layer-3 switches have more simultaneously active ports than routers.
True
Layer-3 switches switch messages based on their IP address.
True
Network management is the process of operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users.
True
Network management software is designed primarily to provide automated support for at least some of the network management functions.
True
One basic component of a backbone network is the hardware device that connects other networks to the backbone.
True
One difference between a switch and a router is that a router will only process messages addressed to the router (at layer 2), while a switch processes all messages.
True
Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages.
True
Physical topology refers to the geometric layout of the network and describes how the computers are interconnected.
True
Routers use network layer address to forward packets between network segments.
True
Service level agreements specify the exact type of performance and fault conditions that an organization will accept from a common carrier or Internet service provider.
True
The RFCs that form the basis for Internet standards are developed by the IETF and its working groups.
True
The device similar to a DSL router, but used in a FTTH environment is called an optical network unit.
True
The most common cable modem standard is Data over Cable Service Interface Specification.
True
IEEE 802.11ac runs on two different frequency spectrums simultaneously. Which of the following are those two frequencies?
2.4GHz and 5GHz
Backbone networks tend to use lower speed circuits than LANs.
False
Crackers are casual hackers with a limited knowledge of computer security.
False
In-class training for end users should focus on _____.
20% of the network functions that the user will use 80% of the time
In North America, a T1 circuit has ______ 64Kbps channels.
24
Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations.
400
Most organizations strive to resolve between _______ of requests at the first level of support in less than an hour.
75% and 85%
How many channels does the 802.11ac standard provide for communication between the access point and clients?
8
_____ a special type of Internet service that works in the opposite direction.
Akamai
_____________ is the percentage of time the network is usable by users.
Availability
Backbone networks are rarely used anymore.
False
Standard voice-grade twisted-pair wires.
Category 1 cable
Old standard that is no longer in use today.
Category 2 cable
__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users.
Charge-back
____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.
Common carriers
___________ refers to managing and documenting the network's hardware and software configuration.
Configuration management
Ethernet LAN was developed by:
DEC, Xerox, and Intel.
_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.
Directory Services
The architecture of an SDWAN has three parts, which are also called planes. Which of the following is not one of those planes?
Encryption plane
The _________________ is a United States government agency that regulates voice and data communication.
FCC
A VLAN requires the computer manager to reconfigure the physical cables to the switch if a computer is moved from one port to another port on a switch.
False
A dedicated circuit is usually not available late at nights or on weekends.
False
A switched backbone uses a bus topology
False
An access point plays the same role in a wireless network as a router does in a wired Ethernet network.
False
DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data.
False
Each of the networks in Internet 2 has a set of access points called terapops.
False
Failure control requires developing a decentralized control philosophy for problem reporting.
False
In a DSL environment, the line splitter and DSL modem are always two separate devices.
False
Layer-3 switches can only switch messages based on their data link layer addresses.
False
Layer-3 switches function slower than routers.
False
MPLS operate at layer 4.
False
Microsoft's Windows operating system meets the US government's A1 level security.
False
Multiprotocol label switching (MPLS) is a technology that is classified within the 5‑layer network model.
False
The _________operates like the IETF through small research groups focused on specific issues.
Internet Research Task Force
Which WAN technology is designed to work with a variety of commonly used layer-2 protocols and is sometimes called a layer-2.5 technology because it inserts a 4-byte header that contains its own information between the layer-2 frame and the layer-3 IP packet?
MPLS
_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails.
MTBF
_______ are wired into a Wi-Fi Controller. They report what devices are attached to them and how busy they are to the controller, which balances traffic across the APs it manages.
Managed APs
Which of the following statements is true in regards to DSL?
On a circuit, the shorter the distance, the higher the speed.
____ is the process of creating several logically separate servers on the same physical computer.
Server virtualization
Which of the following is not considered one of the five most common business impacts?
Social
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.
True
A WAN with a ring topology can use full or half-duplex circuits
True
A cable company distribution hub includes a combiner and a cable modem termination system.
True
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.
True
A hardware device that is not included in a network profile cannot be accessed by another computer on the network.
True
A hub in a network can be used to connect network cables.
True
A point of presence is the place at which the ISP provides services to its customers.
True
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.
True
The term "firefighting" is used to describe a situation where network managers spend all of their time dealing with breakdowns and immediate problems and do not have time to plan and organize properly.
True
To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network.
True
To help in negotiating site licenses for software, it is important to document which software packages are installed on each client.
True
VLANs provide faster performance compared to switched, collapsed or routed backbone architectures.
True
When a switch receives an Ethernet frame with a destination address that is not in its forwarding table, the switch will broadcast the frame out all of its other ports.
True
With switched Ethernet, it has forwarding tables in which entries are learned over time.
True
With switched backbones, each connection into the switch is a separate point-to-point circuit, which supports simultaneous access by the LANs connected to the switch.
True
Which of the following is not true about multi-switch VLANs?
VLAN configurations are limited to spanning over no more than two switches.
Which of the following is a fundamental backbone network architecture?
Virtual LAN
Which of the following is not a basic function of a network manager?
Web surfing to shop on eBay
As security becomes more important, most routers now have software that enables the network manager to create a(n) _______ that specifies what traffic the router should allow through and what traffic the router should block.
access control list
A fundamental technique to determine if an intrusion is in progress in a stable network is:
anomaly detection
A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats.
application level firewall
Ethernet/IP packet networks:
are supported with gigabit fiber optic networks in large cities
The type of logical topology that hub-based Ethernet uses is a:
bus
A digital service offered by cable companies is the _________.
cable modem
A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.
ring design
A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP.
cable modem termination system
In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.
cloud-based mesh design
A ______ is a group of computers that are connected together to perform the same task.
cluster
The basic idea behind _______ is to store other people's Web data closer to your users.
content caching
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?
controlled chaos
________ controls fix a trespass into the network.
corrective
The ___________ is where the organization housing its primary servers.
data center
_________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.
directional
A tornado that eliminates a network control center would be an example of a natural __________.
disaster
RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____.
disk mirroring
Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information.
dumb
Network demand will not be reduced by:
encouraging the use of applications such as medical imaging.
In a ring architecture WAN,
failure in one circuit means that the network can most likely continue to function
A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.
firewall
A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a/n ___________.
forest
A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.
giga, gigabit
Circuit capacity on a backbone network will not be improved by:
going from 100Base-T Ethernet to 10Base-T Ethernet.
The use of hacking techniques to bring attention to a larger political or social goal is referred to as _____.
hacktivism
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.
intrusion
A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.
risk assessment
The _________ is the connection from a home or business to the telephone company end office.
local loop
Which of the following is a primary advantage of a VPN in comparison to a private WAN connection?
low cost
In a DSL environment, local loops from many customers enter and are connected to the _____.
main distribution facility
A security hole is a(n) _____.
malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
In a ring architecture WAN,
messages can take a long time to travel from the sender to the receiver
A(n) ____________, is an information system that is critical to the survival of an organization.
mission critical application
Which of the following is not an important step in reducing network costs?
moving to fat client architectures
A costing method that examines only the direct costs of operating the computers, omitting softer indirect costs such as "wasted" time is referred to as _____.
network cost of ownership
A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.
network profile
A ______________ is a browser add-in or app that stores website passwords
password manager
A ___________ is used by ISPs to authenticate its customers.
remote-access server.
We can calculate the relative ___________, by multiplying the impact score by the likelihood.
risk score
Which of the following is typically not a part of configuration documentation?
sales brochures for new hardware products being considered by the organization
For Ethernet networks, a _______ switch can make eavesdropping more difficult.
secure
Breaking a network into smaller parts is called network:
segmentation
Which of the following is not a main function within end user support?
spin control
A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits.
star design
Device performance on a backbone network will not be improved by:
translating packets from one protocol to another as they enter the BN.
Which of the following is not one of the three major sources of a user's equipment problem that can be solved by network support?
use of the CD-ROM as a cup holder
A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.
virtual private network