MIS 4123 Exam #4

Ace your homework & exams now with Quizwiz!

At the DSL local carriers office, the ______________ demultiplexes the data streams and converts them into digital data

DSLAM

____________ is also called automatic software distribution.

Desktop management

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.

False

Researchers estimate that only one or two new viruses are developed every week.

False

Social engineering refers to creating a team that solves virus problems.

False

The Internet Engineering Steering Group provides strategic architectural oversight for the Internet.

False

The Internet is flat in structure.

False

The phone line from the DSL customer to the telephone company end office is referred to as the "remote loop".

False

Triple DES uses a total of 512 bits as the key.

False

With application level firewalls, any access that has not been explicitly denied is automatically permitted.

False

With regards to DSL, on a circuit, the longer the distance, less attenuation occurs.

False

With regards to DSL, on a circuit, the longer the distance, the higher the speed

False

With regards to DSL, on a circuit, the longer the distance, the higher the speed.

False

With regards to DSL, when more attenuation occurs, higher frequency signals can be used effectively

False

With regards to DSL, when more attenuation occurs, higher frequency signals can be used effectively.

False

__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software.

Fault management

Which of the following type of media is least susceptible to eavesdropping?

Fiber optics

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan.

Firefighting

The use of hacking techniques to bring attention to a larger political or social goal is referred to as

Hacktivism

Which of the following is a type of intrusion prevention system?

Host-based

Tier 1 ISPs connect together and exchange data at ___________.

IXPs

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:

Increased because this commitment to data communications has changed the potential vulnerability of the organization's assets.

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet.

Internet Engineering Task Force

__________ has led to the belief that the Internet is "free".

Peering

______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site.

MTTFix

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.

Peering

In a DSL environment, local loops from many customers enter and are connected to the _____.

Main distribution facility

A security hole is a(n) _____.

Malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

___________ ensures that the network is operating as efficiently as possible.

Performance Management

_________ controls stop a person from acting.

Preventive

_____________ helps ensure that critical problems get priority over less important ones.

Problem prioritizing

A(n) ____________ examines the source and destination address of every network packet that passes through it.

Packet level firewall

Some of the new applications being developed for a high-speed Internet include

Tele-immersion

Which of the following is not true about one-time passwords

They create a packet level firewall on the system

Which of the following is not true about one-time passwords?

They create a packet level firewall on the system.

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity

True

Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data

True

Disk mirroring writes duplicate copies of all data on at least two different disks.

True

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.

True

Due to changing communication technologies, most companies have combined voice and data communications functions.

True

Intrusion primarily refers to the loss of confidentiality of organizational data.

True

Mean time between failures is a statistic that is used to track device reliability

True

Network management is the process of operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users.

True

Network management software is designed primarily to provide automated support for at least some of the network management functions

True

Network management software is designed primarily to provide automated support for at least some of the network management functions.

True

Network management software is used by most large organization to monitor and control their networks.

True

One common configuration activity is updating the software on the client computers in the network.

True

Performance management means ensuring the network is operating as efficiently as possible.

True

Quality control charts are a simple tool that can be used by network managers to monitor network conditions.

True

Secure Sockets Layer is an encryption standard designed for use on the Web.

True

Service level agreements specify the exact type of performance and fault conditions that an organization will accept from a common carrier or Internet service provider.

True

The RFCs that form the basis for Internet standards are developed by the IETF and its working groups.

True

The device similar to a DSL router, but used in a FTTH environment is called an optical network unit.

True

The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or manmade disaster that would destroy the original network.

True

The most common access point used by attackers to gain access to an organization's network is the Internet connection.

True

The most common cable modem standard is Data over Cable Service Interface Specification.

True

The most common type of DSL today is ADSL.

True

Corrective controls reveal or discover unwanted events

False

Crackers are casual hackers with a limited knowledge of computer security.

False

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into digital data.

DSLAM

In-class training for end users should focus on _____.

20% of the network functions that the user will use 80% of the time

A sniffer program is a _____.

A program that records all LAN messages received for later analysis

In some cases, one failure generates several dozen-problem reports, which makes it difficult to pinpoint the true source of the problem quickly. This is referred to as a(n)

Alarm storm

A fundamental technique to determine if an intrusion is in progress in a stable network is:

Anomaly detection

A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats.

Application level firewall

Desktop management _____.

Automatically produces documentation of software installed on each client computer

_____________ is the percentage of time the network is usable by users.

Avaliability

A digital service offered by cable companies is the _________.

Cable modem

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP.

Cable modem termination system

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users.

Charge-back

A ______ is a group of computers that are connected together to perform the same task.

Cluster

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution.

Combiner

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as _____.

Computer forensics

Which of the following is not part of the work of the Internet Society?

Connecting optical-electrical converters

________ controls fix a trespass into the network.

Corrective

At the DSL customer premises is a device called a(n)

DSL modem

A DSL modem is also known as a:

DSL router

A tornado that eliminates a network control center would be an example of a natural __________.

Disaster

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information.

Dumb

A way to prevent intrusion by disguising information through algorithms is _____.

Encryption

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

False

DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM and is the recommended encryption algorithm for highly sensitive data

False

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data.

False

Desktop management software requires managers to install software such as antivirus updates or application updates on client computers manually.

False

Each of the networks in Internet 2 has a set of access points called terapops.

False

Failure control requires developing a decentralized control philosophy for problem reporting.

False

Fault-intolerant servers contain many redundant components to prevent failure.

False

IXPs were originally designed to connect only tier 3 ISPs.

False

In a DSL environment, the line splitter and DSL modem are always two separate devices.

False

In transport mode, IPSec encrypts the entire IP packet.

False

Maintaining data integrity is not a primary goal of security.

False

Microsoft's Windows operating system meets the US government's A1 level security.

False

One of the least common configuration activities for a network manager is adding and deleting user accounts.

False

The _________operates like the IETF through small research groups focused on specific issues.

Internet Research Task Force

The ______________ operates like the 1ETF through small research groups focued on specific issues

Internet research task force

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint.

Internet service providers

Which of the following new Internet efforts was started by 34 universities?

Internet2

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.

Intrusion

DES _____.

Is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

The _________ is the connection from a home or business to the telephone company end office.

Local Loop

The _____________ is the connection from a home or business to the telephone company end office

Local loop

________________ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure

MTTDiagnose

_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions.

Managed devices

Which of the following is not an important step in reducing network costs?

Moving to fat client architectures

A ______ uses an address table to translate the private IP addresses used inside the organization into proxy IP addresses used on the Internet.

NAT proxy server

_____________ are used by many large and small organizations to monitor and control their networks today

Network management software packages

_______________ refers to keeping track of the operations of network circuits to make sure they are working properly

Network monitoring

A __________ is an organizational department that is responsible for monitoring and fixing overall network problems.

Network operations center

In 1996, the national science foundation provided $100 million to start the _____________ program to develop the very high performance

Next generation internet

___________ allows the network manager to determine who is responsible for correcting any outstanding problems.

Problem tracking

A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates.

Quality control chart

The key principle in preventing disruption, destruction and disaster is ___________.

Redundancy

A ___________ is used by ISPs to authenticate its customers.

Remote-access server

We can calculate the relative ___________, by multiplying the impact score by the likelihood.

Risk score

Which of the following is typically not a part of configuration documentation?

Sales brochures for new hardware products being considered by the organization

Which of the following is not a main function within end user support?

Spin control

Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS?

Stats on user response times

____________ are reports produced by numerous network software packages for recording fault information.

Trouble tickets

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.

True

A brute-force attack is a method of trying to guess the correct password by trying every possible key.

True

A cable company distribution hub includes a combiner and a cable modem termination system.

True

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.

True

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.

True

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall.

True

ADSL uses FDM to create three channels over the one local loop circuit: one for voice, one for upstream data, and one for downstream data.

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.

True

Tier 1 service providers connect together and exchange data at IXPs.

True

To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network.

True

To help in negotiating site licenses for software, it is important to document which software packages are installed on each client.

True

Trouble tickets are reports produced by a software package that records fault information.

True

User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user.

True

When someone external to your organization blocks access to your network and/or its resources, this is known as a denial-of-service attack.

True

When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.

True

With regards to DSL, on a circuit, the shorter the distance, the higher the speed.

True

network management software is used by most large organization to monitor and control their networks

True

the most common cable modem standard is data over cable service interface specification

True

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.

Uninterruptible power supply

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?

Unlocked wiring closet for network devices

Which of the following is not a basic function of a network manager?

Web surfing to shop on eBay

A sniffer program is a _________________

a program that records all LAN messages received for later analysis

In some cases, one failure generates several dozen problem reports, which makes it difficult to pinpoint the true source of the problem quickly. This is referred to as a(n)

alarm storm

_______________ is the percentage of time that network is usable by users

avaliability

A _________________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication

certificate authority

________________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users

charge-back

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?

controlled chaos

A ________________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users messages from being processed

denial-of-service attack

An example of _____ data would be if a computer virus eliminated files on that computer.

destruction

A tornado that eliminates a network control center would be an example of a natural ___________

disaster

RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____

disk mirroring

RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____.

disk mirroring

A cable company headend is also referred to as a:

distribution hub

When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution.

escalated

Desktop Management software requires managers to install software on client computers manually.

false

The internet engineering steering group provides strategic architectural oversight for the internet

false

failure control requires developing a decentralized control philosophy for problem reporting

false

IP spoofing means to:

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

The use of hacking techniques to bring attention to a larger political or social goal is referred to as _____.

hacktivism

The closest the internet has to an "owning" organization is the _______________

internet society

Often, incidents of unauthorized access known as ___________, involve employees of the organization, surprisingly enough.

intrusion

A _____________ separates traditional voice telephone transmission from the data transmission in the equipment located at the customer site

line splitter

A security hole is a(n)

malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

A(n) ____________, is an information system that is critical to the survival of an organization.

mission critical application

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they

often have weaker security.

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side.

optical-electrical converter

Which of the following is not a method for deterring intrusion?

performing social engineering

To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems.

planning and organizing the network and networking staff

For Ethernet networks, a _______ switch can make eavesdropping more difficult.

secure

_______________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept

service level agreement

Ideally, when users receive training about fundamentals of network use, they become confident about what they need to do when working on a network.

true

Management reports can be helpful in determining network availability statistics

true

Which of the following is a mode that is used by IPSec?

tunnel

A(n) ________________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption

uninterruptible power supply

Which of the following is not one of the three major sources of a users equipment problem that can be solves by network support?

use of the CD-ROM as a cup holder

Fiber to the Home uses _____.

wavelength division multiplexing

A (n) ______ is a special type of virus that spreads itself without human intervention.

worm


Related study sets

Generative Design for Part Consolidation

View Set

Quiz 7 Information Security Fundamentals

View Set

PMP Ch 9 - Communications Management Questions (Rita Ch 10), FSU COM5450 Exam 3 Prep

View Set

Chapter 23 Conflict: The Cutting Edge of Change

View Set

Chapter 5: Transportation Costs and Ownership Transfer

View Set

Chapter 38 Security and Navigation Systems

View Set

303 Hinkle PrepU Chapter 37: Assessment and Management of Patients With Allergic Disorders

View Set