ITN

Ace your homework & exams now with Quizwiz!

The data rate for a T-1 circuit in North America is:

1.544 Mbps

OC-3072 has a data rate of

159.25 Gbps

Data traffic from the DSL customer premises is sent to a __________, which is located at the local carrier's end office.

DSLAM

______________ are sometimes called private line services.

Dedicated-circuit networks

Problem statistics are not helpful in determining whether vendors are meeting contractual maintenance commitments.

False

Routers can only connect the same type of cable.

False

STP cable is least costly type of cable used in today's networks and is the most commonly used cable type in connecting computers to switches.

False

Switched backbones are harder to maintain and upgrade than a BN that is not rack-based.

False

Switched backbones make it more difficult to move computers from one LAN to another.

False

Switches connect two or more network segments that use different data link protocols.

False

Switches operate at the physical layer only.

False

T carrier circuits can only be used to transmit voice.

False

The Internet Engineering Steering Group provides strategic architectural oversight for the Internet.

False

The Internet is flat in structure.

False

The NOS software for the server computer provides the physical, data link, and network layer functions.

False

To connect into a packet switched network, a network terminator is generally used.

False

VLAN configurations are limited to spanning over no more than two switches.

False

With regards to DSL, on a circuit, the longer the distance, less attenuation occurs.

False

With regards to DSL, on a circuit, the longer the distance, the higher the speed.

False

A Software Defined WAN (SDWAN) provides four benefits. Which of the following is not one of those benefits?

Flexibility

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet.

Internet Engineering Task Force

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.

Peering

___________ ensures that the network is operating as efficiently as possible.

Performance management

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today.

T-carrier services

With switched Ethernet, it essentially provides a point-to-point connection between computers.

TRUE

Some of the new applications being developed for a high-speed Internet include

Tele-immersion

Which of the following is not true about layer-2 switched Ethernet?

The physical topology is the same as the physical topology of shared Ethernet: a ring.

Which of the following is not true about one-time passwords?

They create a packet level firewall on the system.

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

True

Controls are mechanisms that reduce or eliminate threats to network security.

True

Ethernet services are now being successfully used in WAN environments.

True

Hub-based Ethernet is a star physical topology and a bus logical topology.

True

Layer-3 switches have more simultaneously active ports than routers.

True

Layer-3 switches switch messages based on their IP address.

True

Network management is the process of operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users.

True

Network management software is designed primarily to provide automated support for at least some of the network management functions.

True

One basic component of a backbone network is the hardware device that connects other networks to the backbone.

True

One difference between a switch and a router is that a router will only process messages addressed to the router (at layer 2), while a switch processes all messages.

True

Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages.

True

Physical topology refers to the geometric layout of the network and describes how the computers are interconnected.

True

Routers use network layer address to forward packets between network segments.

True

Service level agreements specify the exact type of performance and fault conditions that an organization will accept from a common carrier or Internet service provider.

True

The RFCs that form the basis for Internet standards are developed by the IETF and its working groups.

True

The device similar to a DSL router, but used in a FTTH environment is called an optical network unit.

True

The most common cable modem standard is Data over Cable Service Interface Specification.

True

IEEE 802.11ac runs on two different frequency spectrums simultaneously. Which of the following are those two frequencies?

2.4GHz and 5GHz

Backbone networks tend to use lower speed circuits than LANs.

False

Crackers are casual hackers with a limited knowledge of computer security.

False

In-class training for end users should focus on _____.

20% of the network functions that the user will use 80% of the time

In North America, a T1 circuit has ______ 64Kbps channels.

24

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations.

400

Most organizations strive to resolve between _______ of requests at the first level of support in less than an hour.

75% and 85%

How many channels does the 802.11ac standard provide for communication between the access point and clients?

8

_____ a special type of Internet service that works in the opposite direction.

Akamai

_____________ is the percentage of time the network is usable by users.

Availability

Backbone networks are rarely used anymore.

False

Standard voice-grade twisted-pair wires.

Category 1 cable

Old standard that is no longer in use today.

Category 2 cable

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users.

Charge-back

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs.

Common carriers

___________ refers to managing and documenting the network's hardware and software configuration.

Configuration management

Ethernet LAN was developed by:

DEC, Xerox, and Intel.

_____________ provide information about resources on the network that are available to the users, such as shared printers, file servers and application software.

Directory Services

The architecture of an SDWAN has three parts, which are also called planes. Which of the following is not one of those planes?

Encryption plane

The _________________ is a United States government agency that regulates voice and data communication.

FCC

A VLAN requires the computer manager to reconfigure the physical cables to the switch if a computer is moved from one port to another port on a switch.

False

A dedicated circuit is usually not available late at nights or on weekends.

False

A switched backbone uses a bus topology

False

An access point plays the same role in a wireless network as a router does in a wired Ethernet network.

False

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data.

False

Each of the networks in Internet 2 has a set of access points called terapops.

False

Failure control requires developing a decentralized control philosophy for problem reporting.

False

In a DSL environment, the line splitter and DSL modem are always two separate devices.

False

Layer-3 switches can only switch messages based on their data link layer addresses.

False

Layer-3 switches function slower than routers.

False

MPLS operate at layer 4.

False

Microsoft's Windows operating system meets the US government's A1 level security.

False

Multiprotocol label switching (MPLS) is a technology that is classified within the 5‑layer network model.

False

The _________operates like the IETF through small research groups focused on specific issues.

Internet Research Task Force

Which WAN technology is designed to work with a variety of commonly used layer-2 protocols and is sometimes called a layer-2.5 technology because it inserts a 4-byte header that contains its own information between the layer-2 frame and the layer-3 IP packet?

MPLS

_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails.

MTBF

_______ are wired into a Wi-Fi Controller. They report what devices are attached to them and how busy they are to the controller, which balances traffic across the APs it manages.

Managed APs

Which of the following statements is true in regards to DSL?

On a circuit, the shorter the distance, the higher the speed.

____ is the process of creating several logically separate servers on the same physical computer.

Server virtualization

Which of the following is not considered one of the five most common business impacts?

Social

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.

True

A WAN with a ring topology can use full or half-duplex circuits

True

A cable company distribution hub includes a combiner and a cable modem termination system.

True

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.

True

A hardware device that is not included in a network profile cannot be accessed by another computer on the network.

True

A hub in a network can be used to connect network cables.

True

A point of presence is the place at which the ISP provides services to its customers.

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.

True

The term "firefighting" is used to describe a situation where network managers spend all of their time dealing with breakdowns and immediate problems and do not have time to plan and organize properly.

True

To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network.

True

To help in negotiating site licenses for software, it is important to document which software packages are installed on each client.

True

VLANs provide faster performance compared to switched, collapsed or routed backbone architectures.

True

When a switch receives an Ethernet frame with a destination address that is not in its forwarding table, the switch will broadcast the frame out all of its other ports.

True

With switched Ethernet, it has forwarding tables in which entries are learned over time.

True

With switched backbones, each connection into the switch is a separate point-to-point circuit, which supports simultaneous access by the LANs connected to the switch.

True

Which of the following is not true about multi-switch VLANs?

VLAN configurations are limited to spanning over no more than two switches.

Which of the following is a fundamental backbone network architecture?

Virtual LAN

Which of the following is not a basic function of a network manager?

Web surfing to shop on eBay

As security becomes more important, most routers now have software that enables the network manager to create a(n) _______ that specifies what traffic the router should allow through and what traffic the router should block.

access control list

A fundamental technique to determine if an intrusion is in progress in a stable network is:

anomaly detection

A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats.

application level firewall

Ethernet/IP packet networks:

are supported with gigabit fiber optic networks in large cities

The type of logical topology that hub-based Ethernet uses is a:

bus

A digital service offered by cable companies is the _________.

cable modem

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.

ring design

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP.

cable modem termination system

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network.

cloud-based mesh design

A ______ is a group of computers that are connected together to perform the same task.

cluster

The basic idea behind _______ is to store other people's Web data closer to your users.

content caching

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?

controlled chaos

________ controls fix a trespass into the network.

corrective

The ___________ is where the organization housing its primary servers.

data center

_________ antennas project a signal in only one direction and are most often used on the inside of an exterior wall pointing to the inside of the building for security reasons.

directional

A tornado that eliminates a network control center would be an example of a natural __________.

disaster

RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____.

disk mirroring

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information.

dumb

Network demand will not be reduced by:

encouraging the use of applications such as medical imaging.

In a ring architecture WAN,

failure in one circuit means that the network can most likely continue to function

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.

firewall

A hierarchical tree of active directory domains within one organization that is linked to other trees in the organization is called a/n ___________.

forest

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds.

giga, gigabit

Circuit capacity on a backbone network will not be improved by:

going from 100Base-T Ethernet to 10Base-T Ethernet.

The use of hacking techniques to bring attention to a larger political or social goal is referred to as _____.

hacktivism

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.

intrusion

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them.

risk assessment

The _________ is the connection from a home or business to the telephone company end office.

local loop

Which of the following is a primary advantage of a VPN in comparison to a private WAN connection?

low cost

In a DSL environment, local loops from many customers enter and are connected to the _____.

main distribution facility

A security hole is a(n) _____.

malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

In a ring architecture WAN,

messages can take a long time to travel from the sender to the receiver

A(n) ____________, is an information system that is critical to the survival of an organization.

mission critical application

Which of the following is not an important step in reducing network costs?

moving to fat client architectures

A costing method that examines only the direct costs of operating the computers, omitting softer indirect costs such as "wasted" time is referred to as _____.

network cost of ownership

A __________ indicates what resources on each server are available on the network for use by other computers and what people are allowed what access to the network.

network profile

A ______________ is a browser add-in or app that stores website passwords

password manager

A ___________ is used by ISPs to authenticate its customers.

remote-access server.

We can calculate the relative ___________, by multiplying the impact score by the likelihood.

risk score

Which of the following is typically not a part of configuration documentation?

sales brochures for new hardware products being considered by the organization

For Ethernet networks, a _______ switch can make eavesdropping more difficult.

secure

Breaking a network into smaller parts is called network:

segmentation

Which of the following is not a main function within end user support?

spin control

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits.

star design

Device performance on a backbone network will not be improved by:

translating packets from one protocol to another as they enter the BN.

Which of the following is not one of the three major sources of a user's equipment problem that can be solved by network support?

use of the CD-ROM as a cup holder

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network.

virtual private network


Related study sets

Chapter 9: Managing Conflict in Relationships

View Set

International Relations Chapter 9

View Set

Intro to Cybersecurity - Chapters 2 & 3 (Cisco Networking Academy)

View Set

human anatomyChapter 8: Appendicular Skeleton Part 1 - PECTORAL GIRDLE & UPPER LIMB

View Set

Advanced Chemistry: Lab Safety Quiz Study Guide

View Set

Prep U: Chapter 65 Managment of patients with oncologic or degenerative neurologic disorders.

View Set