MIS 140 (Ch. 8 - 11)

Ace your homework & exams now with Quizwiz!

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages. a) True b) False

a

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs

a

Ethernet/IP packet networks are not provided by common carriers such as AT&T. a) True b) False

a

Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps

a

For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming

a

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user. a) True b) False

b

An uninterruptible power supply utilizes a second redundant disk for every disk on the server. a) True b) False

b

Another term for a DSL modem is a DSL brouter. a) True b) False

b

Associated with a switched backbone, MDF is an acronym for: a. multi-station device foundation b. main distribution facility c. manual data frequency d. multiplexer downstream flow e. maximum data facility

b

Asymmetric encryption uses the same key to encrypt and decrypt an message.. a) True b) False

b

An OC-1 circuit provides a data rate of 155 Mbps. a) True b) False

b

An intranet VPN connects different organizations over the Internet. a) True b) False

b

A distribution hub includes a combiner and a Cable modem termination system. a) True b) False

a

A switched backbone uses a bus topology. a) True b) False

b

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet. a) True b) False

a

A T1 circuit provides a data rate of 1.544Mbps. a) True b) False

a

A Trojan horse allows a user to access a computer from a remote location. a) True b) False

a

A WAN with a ring topology can use full or half duplex circuits. a) True b) False

a

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network

a

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. a. firewall b. token system c. ANI d. call-back modem e. firefighter

a

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point

a

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan

a

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming

a

A backbone network is a high-speed network that connects many networks. a) True b) False

a

A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard

a

A brute-force attack is a method of trying to guess the correct password by trying every possible key. a) True b) False

a

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization. a) True b) False

a

A denial-of-service attack occurs when someone external blocks access to your network. a) True b) False

a

A fundamental technique to determine if an intrusion is in progress in a stable network is: a. anomaly detection b. armoring cable c. RSA algorithm d. patching e. scanning a user's fingerprint

a

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit

a

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. a) True b) False

a

A key advantage of a chassis switch is its flexibility. a) True b) False

a

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall a) True b) False

a

A patch is a software solution to correct a security hole. a) True b) False

a

A point of presence is the place at which the ISP provides services to its customers. a) True b) False

a

A recent study by CSO Magazine and the Computer Security Institute stated that the average loss suffered by businesses because of computer security breaches was approximately $350,000. a) True b) False

a

A room that contains a rack of equipment for a rack-based collapsed backbone is also called the main distribution facility (MDF) or central distribution facility (CDF). a) True b) False

a

A routed backbone tends to be used more for large networks than VLANs, although VLAN high speed switches and this new type of LAN-BN architecture are now being considered. a) True b) False

a

A security hole is a bug that permits intrusion to a computer. a) True b) False

a

A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system

a

A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits

a

A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. a) True b) False

a

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion

a

A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design

a

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall

a

A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall

a

A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall

a

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth

a

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. a) True b) False

a

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD

a

Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account. a) True b) False

a

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity. a) True b) False

a

Circuit capacity on a backbone network will not be improved by: a. going from 100Base-T Ethernet to 10Base-T Ethernet b. going from 100Base-T Ethernet to gigabit Ethernet c. adding additional circuits alongside heavily used ones d. replacing a shared circuit backbone with a switched circuit backbone e. providing a faster circuit to the server

a

Common carriers sell or lease communication services and facilities to the public. a) True b) False

a

Companies have learned that threats from hacking from its own employees occur about as often as by outsiders. a) True b) False

a

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data. a) True b) False

a

Controls are mechanisms that reduce or eliminate threats to network security. a) True b) False

a

Devices in a rack are connected together using ___________. a.) patch cables b.) string c.) servers d.) modules e.) chassis switches

a

Disk mirroring writes duplicate copies of all data on at least two different disks. a) True b) False

a

IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization's networks

a

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design

a

In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic

a

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

a

In building Wide Area Networks, many organizations do not build their own long distance communication circuits. a) True b) False

a

In general, tier 3 ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs

a

Internet 2 is the common name for the Abilene network. a) True b) False

a

Intrusion refers to confidentiality and integrity of data. a) True b) False

a

Macro viruses can spread when an infected file is opened. a) True b) False

a

Most WiMAX providers in the US are using an effective data range of a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles

a

OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps

a

Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

a

One basic component of a backbone network is the hardware device that connects other networks to the backbone. a) True b) False

a

One difference between a switch and a router is that a router will only process messages addressed to the router, while a switch processes all messages. a) True b) False

a

Packet switched networks enable packets from separate messages or separate organizations to be interleaved for transmission. a) True b) False

a

Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages. a) True b) False

a

Preventive controls mitigate or stop a person from acting or an event from occurring. a) True b) False

a

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only

a

Routers connect two or more network segments that use the same or different data link protocols, but the same network protocol. a) True b) False

a

Routers use network layer address to forward packets between network segments. a) True b) False

a

Routers: a. require more management than switches b. are not susceptible to time delays c. use data link layer addresses to move packets that leave the subnet d. require only a few set of TCP/IP addresses e. don't need much time to establish separate subnet addresses for each LAN

a

SONET is made up of very high speed dedicated circuits that incorporate inverse multiplexing (IMUX) for all levels above the OC-1 level. a) True b) False

a

Secure Sockets Layer is an encryption standard designed for use on the Web. a) True b) False

a

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. a) True b) False

a

Some of the new applications being developed for a high-speed Internet include a.) Tele-immersion b.) Tele-conferencing c.) QoS d.) Broadband e.) Tele-phoning

a

Switches and routers are devices that can connect networks to the BN. a) True b) False

a

Switches: a. learn addresses by reading the source and destination addresses b. operate at the physical layer only c. connect two ore more network segments that use different data link protocols d. connect two or more network segments that use different network protocols e. have become more popular than layer 2 switches

a

The CERT was established at Carnegie Mellon University. a) True b) False

a

The backbone architecture layer that is closest to the users is the a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

a

The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network. a) True b) False

a

The biggest drawbacks to VLANs are their_________________. a.) cost and management complexity b.) size and contention c.) contention and cost d.) learning curve and contention e.) speed and size

a

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

a

The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed. a) True b) False

a

The device similar to a DSL router, but used in a FTTH environment is called an optical unit network. a) True b) False

a

The distribution layer of a backbone connects LANs together. a) True b) False

a

The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls

a

The most common authentication protocol used today is Kerberos. a) True b) False

a

The most common cable modem standard is Data over Cable Service Interface Specification. a) True b) False

a

The most common type of DSL today is ADSL. a) True b) False

a

The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic

a

The primary advantage of a routed backbone is that it clearly segments each part of the network connected to the backbone because each segment has its own subnet addresses that can be managed separately. a) True b) False

a

The rise of the Internet has increased significantly the potential vulnerability of an organization's assets. a) True b) False

a

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. WLANs b. intranet c. extranet d. WAN e. none of the above

a

Tier 1 ISPs connect together and exchange data at ___________. a. IXPs b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center

a

Tier 1 service providers connect together and exchange data at IXPs. a) True b) False

a

To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES

a

VLANs prioritize traffic based on the ______. a.) IEEE 802.1q standard b.) IEEE 802.11 standard c.) VLAN size d.) multiswitch allocation e.) switch dynamics

a

VLANs provide faster performance compared to switched, collapsed or routed backbone architectures. a) True b) False

a

Virtual private networks permit users to create permanent virtual circuits, or tunnels, through the Internet. a) True b) False

a

WANs can connect BNs across distances that can span up to thousands of miles. a) True b) False

a

When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key. a) True b) False

a

Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user

a

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.

a

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability

a

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees

a

Which of the following is not a way that a router differs from a switch? a. routers can connect two or more networks that use the same data link protocol b. routers only process messages that are specifically addressed to it c. routers operate at the network layer d. routers perform more processing on each message than switch e. routers can choose the "best" route between networks for forwarding a packet

a

Which of the following is true regarding switched backbones? a. They place all network devices for one part of the building physically in the same room, often in a rack of equipment b. They have an advantage of requiring less cable c. They make it more difficult to move computers from one LAN to another d. Network capacity is always tied to the physical location of the computers e. They are harder to maintain and upgrade than a BN that is not rack-based

a

Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.

a

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable

a

With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. a. PAD b. gateway c. switch d. router e. WAN

a

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup

a

________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup

a

_________ have no backbone cable. a. Switched backbones b. Cloud routed backbones c. Hubbed backbones d. Bridged backbones e. Multistation access unit backbones

a

__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids

a

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs

a

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP

a

_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks

a

_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering

a

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT firewall c. IP spoofing bridge d. packet level firewall e. smart hub

b

A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus

b

A VLAN network assigns computers to LAN segments by hardware. a) True b) False

b

A VLAN requires the computer manager to reconfigure the physical cables to the switch if a computer is moved from one port to another port on a switch. a) True b) False

b

A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server

b

A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

b

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

b

A backbone network that connects many backbone networks spanning several buildings at a single location is often called an Internet backbone. a) True b) False

b

A dedicated circuit is usually not available late at nights or on weekends a) True b) False

b

A disadvantage of a star architecture is that the failure of one circuit will disrupt the entire network. a) True b) False

b

A hardware device that operates at the application layer is a router. a) True b) False

b

A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster

b

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

b

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines

b

Backbone networks typically use lower speed circuits to interconnect a series of LANs and provide connections to other backbone networks. a) True b) False

b

Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only

b

Confidentiality is not a threat to business continuity. a) True b) False

b

Corrective controls reveal or discover unwanted events. a) True b) False

b

Crackers are casual hackers with a limited knowledge of computer security. a) True b) False

b

DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM. a) True b) False

b

DSL uses a remote loop to connect homes to the telephone company end office. a) True b) False

b

Datagrams are connection-oriented. a) True b) False

b

Decryption is the process of converting plaintext into ciphertext. a) True b) False

b

Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements

b

Digital Subscriber Line is a family of multipoint technologies. a) True b) False

b

Each of the networks in Internet 2 has a set of access points called terapops. a) True b) False

b

Fault-intolerant servers contain many redundant components to prevent failure. a) True b) False

b

Fiber to the Home uses a. frequency division multiplexing b. wavelength division multiplexing c. time division multiplexing d. statistical time division multiplexing e. all of the above

b

Frame relay is a reliable packet service. a) True b) False

b

Full mesh design networks are more common than partial mesh design networks. a) True b) False

b

Full mesh networks are inexpensive. a) True b) False

b

IBM recently developed a new WiMAX chip set. a) True b) False

b

IXPs were originally designed to connect only tier 3 ISPs. a) True b) False

b

In a DSL environment, the line splitter and DSL modem are always two separate devices. a) True b) False

b

In transport mode, IPSec encrypts the entire IP packet. a) True b) False

b

Integrity is not a primary goal of security. a) True b) False

b

Layer-3 switches switch messages based on their data link layer address. a) True b) False

b

MPLS operate at layer 4. a) True b) False

b

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

b

Microsoft's Windows operating system meets A1 level security. a) True b) False

b

Most backbone devices are store-and-forward devices. One simple way to improve performance is to ensure that they have ________________. a.) enough ports b.) sufficient memory c.) twisted pair connections d.) large wheels e.) IEEE 802.11

b

Network cables are the easiest target for eavesdropping. a) True b) False

b

One advantage of a routed backbone is that is requires little management. a) True b) False

b

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN. a) True b) False

b

Researchers estimate that only one or two new viruses are developed every week. a) True b) False

b

Routed backbones use switches that move packets based on data link layer addresses. a) True b) False

b

Routers operate at the application layer. a) True b) False

b

Social engineering refers to creating a team that solves virus problems. a) True b) False

b

T carrier circuits can only be used to transmit voice. a) True b) False

b

Technologies such as DSL and cable modem are called narrowband technologies. a) True b) False

b

The Internet Engineering Steering Group provides strategic architectural oversight for the Internet. a) True b) False

b

The Internet is flat in structure. a) True b) False

b

The Internet is one large network. a) True b) False

b

The _______ is the part of the backbone that connects the LANs together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

b

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

b

The cable to connect BNs is usually twisted pair. a) True b) False

b

The committed information rate (CIR) in a permanent virtual circuit is the maximum allowable rate that the network will attempt to provide. a) True b) False

b

The most common access point used by attackers to gain access to an organization's network is the dial-up access via a modem. a) True b) False

b

To connect into a packet switched network, a network terminator is generally used. a) True b) False

b

To use DSL, a customer needs a DSL Access Multiplexer installed at his or her location. a) True b) False

b

Today, a common carrier that provides long distance services is typically called a local exchange carrier. a) True b) False

b

Triple DES uses a total of 512 bits as the key. a) True b) False

b

VPNs offer high security because they operate through the Internet. a) True b) False

b

Which of the following is a fundamental backbone network architecture? a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Gatewayed backbone e. Virtual backbone

b

Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above is an appropriate answer

b

Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards

b

WiMAX is an older wireless technology that probably won't be used much longer. a) True b) False

b

With application level firewalls, any access that has not been disabled is permitted. a) True b) False

b

__________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

b

__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay

b

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking

b

_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP

b

In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 3 e. WAP proxy

c

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36

c

A DSL modem is also known as a: a. DSL bridge b. DSL brouter c. DSL router d. DSL gateway e. DSL hub

c

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. 9000 b. 8.4 c. 1.5 d. 650 e. 6.1

c

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

c

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM

c

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

c

A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring

c

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design

c

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk

c

At the DSL customer premises is a device called a(n) a. cable modem b. DSL router c. DSL modem d. Internet router e. DSL bridge

c

Computers can be assigned to a VLAN based on the ________. a.) IEEE 802.1q standard b.) NIC interface c.) physical port on the switch d.) IEEE 802.3 standard e.) physical location of the computer

c

DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm

c

Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM

c

For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point

c

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design

c

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. a. 100 b. 250 c. 400 d. 750

c

Most IP services use _______ as the data link layer protocol. a. Ethernet b. TCP c. MPLS d. IRoute e. T1

c

Network demand will not be reduced by: a. restricting (or moving) applications such as desktop videoconferencing b. using network devices to ensure that broadcast messages do not go to other networks c. encouraging the use of applications such as medical imaging d. sending status information to all computers on all LANs in the backbone network e. restricting (or moving) applications such as multimedia

c

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities

c

Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches

c

Switched backbone networks: a. always use a ring topology b. are the least common type of BN used in one building c. use a star topology with one device, usually a switch d. have a great deal of cable in their backbones e. tend to have less cable, but more network devices

c

The _________ is the part of the backbone that connects the different backbones together. a.) Access layer b.) Distribution layer c.) Core layer d.) Privacy layer e.) Switched layer

c

The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

c

The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN b. FCC c. CRTC d. CSU e. POTS

c

The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

c

The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. hacking b. ethical politics c. hacktivism d. social engineering e. brute force attacks

c

We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event

c

Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter

c

Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh

c

Which of the following is not a technology layer that is considered when designing backbone networks? a. access layer b. distribution layer c. decentralized layer d. core layer e. none of the options

c

Which of the following is not a type of hardware device that can be used to interconnect networks? a. layer 3 switches b. routers c. dumb terminals d. layer 2 switches e. all of the above can be used

c

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

c

Which of the following is not true about switched backbones? a. performance is improved over traditional (bridged or routed) backbone networks b. each connection into the switch is a separate point-to-point circuit which supports simultaneous access by the LANs connected to the switch c. there are many more networking devices in a switched backbone network d. if the switch fails, so does the entire backbone network e. the backbone essentially exists in the switch; there is no backbone cable

c

Which of the following would be least effective in improving backbone performance? a. improving the computers in the network b. changing the demand placed on the network c. adding new keyboards to the client computers d. upgrading the circuits between computers e. improving devices in the network

c

WiMAX was designed to use the _______ frequencies. a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz

c

WiMax was designed to easily connect into existing ___________. a. wide area networks b. backbone networks c. Ethernet LANs d. ATM backbones e. FTTH

c

With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds

c

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion.

c

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design

d

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design

d

A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange

d

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board

d

A __________ type of BN has a star topology with one device, such as a switch, at its center. a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Switched backbone e. Routed backbone

d

A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device

d

A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet

d

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster

d

A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node

d

A sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program

d

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system

d

A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall

d

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster

d

Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax

d

Device performance on a backbone network will not be improved by: a. using the same protocols in the backbone and the LANs b. using static routing in low to moderate traffic conditions c. ensuring that backbone devices have sufficient memory so that packets do not have to be retransmitted by the sender d. translating packets from one protocol to another as they enter the BN e. none of the options

d

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch

d

Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT

d

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

d

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode

d

In a DSL environment, local loops from many customers enter and are connected to the a. central office b. computer center c. main central office d. main distribution center e. rack

d

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. a. modem b. router c. bridge d. combiner e. CMTS

d

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications

d

Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. a. gigapop b. autonomous system c. ISP d. IXP e. Service provider

d

Routers: a. operate at the application layer b. operate only at the physical layer c. cannot connect two or more networks that use the same type of cable d. may also be called TCP/IP gateways e. operate only at the data link layer

d

The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3

d

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection

d

Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization

d

Using ______ capabilities, network managers can connect VOIP phones directly into a VLAN switch and configure the switch to reserve sufficient network capacity so that they will always be able to send and receive voice messages. a.) backbone b.) switched c.) routed d.) QoS e.) access

d

Which of the following are usually the first choice for eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. local cables owned by the organization d. wireless LANs e. fiber optics

d

Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location

d

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times

d

Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety

d

Which of the following is one of the tier 1 ISPs in North America? a. IETF b. IEEE c. IAB d. Sprint e. ISOC

d

Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network

d

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN

d

_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup

d

_________ move packets along the backbone based on their network layer address. a. Bridged backbones b. Hubbed backbones c. Multistation access unit backbones d. Routed backbones e. NIC backbones

d

______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks

d

A _____________ type of BN segments (each of which has a special set of subnet addresses that can be managed by different network managers) each part of the network connected to the backbone. a. bridged backbone b. virtual LAN c. hubbed backbone d. collapsed backbone e. routed backbone

e

A subnetted or hierarchical backbone can also be called: a. Bridged backbone b. Virtual LAN c. Hubbed backbone d. Collapsed backbone e. Routed backbone

e

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter

e

Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband

e

The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

e

The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society

e

The maximum download data rate for cable modem systems is currently a. 1 Mbps b. 1.44 Mbps c. 5 Mbps d. 100 Mbps e. 150 Mbps

e

Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time e. performing social engineering

e

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices

e

Which of the following is not true about Layer-3 switches? a. They switch messages based on their IP address. b. They can be used in place of routers. c. They function faster than routers. d. They have more simultaneously active ports than routers. e. They can only switch messages based on their data link layer addresses.

e

Which of the following is not true about backbone networks? a. They may also be called enterprise networks if they connect all networks within an organization. b. They typically connect many networks, including LANs. c. They typically provide connections to other BNs, WANs, MANs, and the Internet. d. They may also be called campus networks if they connect many BNs spanning several buildings as a single location. e. They tend to use lower speed circuits than LANs.

e

Which of the following is not true about multiswitch VLANs? a. Several switches are used to build a VLAN b. The switches in the VLAN can send packets among themselves in a way that identifies the VLAN to which the packet belongs. c. In some multi-switch VLANs, the Ethernet packet is modified based on the emerging IEEE 802.1q standard. d. In some multi-switch VLANs, a new VLAN packet encapsulates the Ethernet packet. e. All of the above are true statements.

e

Which of the following is not true about one-time passwords? a. Users' pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system.

e

Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. Internet2

e

Which of the following would not be part of an "ideal" backbone design for the future? a. access layer composed of 10/100 layer 2 Ethernet switches b. distribution layer composed of layer 3 Ethernet switches of 100 (or 1000) Base-T c. redundant switches d. core layer composed of layer 3 Ethernet switches running 10 (or 40) GbE over fiber e. coax cabling throughout LANs and BN

e

With a switched backbone network, the equipment is usually placed in a ______. a.) server b.) NIC c.) cabinet d.) basement e.) rack

e


Related study sets

18: Formation of Sales and Lease Contracts

View Set

Marketing Chapter 14: Pricing Concepts

View Set

MGMT Ch. 11- Building Customer Relationships Through Effective Marketing

View Set

LC11: LearningCurve - Ch. 11: The Labor Market

View Set