MIS 4123 Exam #4
At the DSL local carriers office, the ______________ demultiplexes the data streams and converts them into digital data
DSLAM
____________ is also called automatic software distribution.
Desktop management
Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.
False
Researchers estimate that only one or two new viruses are developed every week.
False
Social engineering refers to creating a team that solves virus problems.
False
The Internet Engineering Steering Group provides strategic architectural oversight for the Internet.
False
The Internet is flat in structure.
False
The phone line from the DSL customer to the telephone company end office is referred to as the "remote loop".
False
Triple DES uses a total of 512 bits as the key.
False
With application level firewalls, any access that has not been explicitly denied is automatically permitted.
False
With regards to DSL, on a circuit, the longer the distance, less attenuation occurs.
False
With regards to DSL, on a circuit, the longer the distance, the higher the speed
False
With regards to DSL, on a circuit, the longer the distance, the higher the speed.
False
With regards to DSL, when more attenuation occurs, higher frequency signals can be used effectively
False
With regards to DSL, when more attenuation occurs, higher frequency signals can be used effectively.
False
__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software.
Fault management
Which of the following type of media is least susceptible to eavesdropping?
Fiber optics
___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan.
Firefighting
The use of hacking techniques to bring attention to a larger political or social goal is referred to as
Hacktivism
Which of the following is a type of intrusion prevention system?
Host-based
Tier 1 ISPs connect together and exchange data at ___________.
IXPs
In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has:
Increased because this commitment to data communications has changed the potential vulnerability of the organization's assets.
The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet.
Internet Engineering Task Force
__________ has led to the belief that the Internet is "free".
Peering
______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site.
MTTFix
___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.
Peering
In a DSL environment, local loops from many customers enter and are connected to the _____.
Main distribution facility
A security hole is a(n) _____.
Malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
___________ ensures that the network is operating as efficiently as possible.
Performance Management
_________ controls stop a person from acting.
Preventive
_____________ helps ensure that critical problems get priority over less important ones.
Problem prioritizing
A(n) ____________ examines the source and destination address of every network packet that passes through it.
Packet level firewall
Some of the new applications being developed for a high-speed Internet include
Tele-immersion
Which of the following is not true about one-time passwords
They create a packet level firewall on the system
Which of the following is not true about one-time passwords?
They create a packet level firewall on the system.
Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity
True
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
True
Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data
True
Disk mirroring writes duplicate copies of all data on at least two different disks.
True
DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.
True
Due to changing communication technologies, most companies have combined voice and data communications functions.
True
Intrusion primarily refers to the loss of confidentiality of organizational data.
True
Mean time between failures is a statistic that is used to track device reliability
True
Network management is the process of operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users.
True
Network management software is designed primarily to provide automated support for at least some of the network management functions
True
Network management software is designed primarily to provide automated support for at least some of the network management functions.
True
Network management software is used by most large organization to monitor and control their networks.
True
One common configuration activity is updating the software on the client computers in the network.
True
Performance management means ensuring the network is operating as efficiently as possible.
True
Quality control charts are a simple tool that can be used by network managers to monitor network conditions.
True
Secure Sockets Layer is an encryption standard designed for use on the Web.
True
Service level agreements specify the exact type of performance and fault conditions that an organization will accept from a common carrier or Internet service provider.
True
The RFCs that form the basis for Internet standards are developed by the IETF and its working groups.
True
The device similar to a DSL router, but used in a FTTH environment is called an optical network unit.
True
The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or manmade disaster that would destroy the original network.
True
The most common access point used by attackers to gain access to an organization's network is the Internet connection.
True
The most common cable modem standard is Data over Cable Service Interface Specification.
True
The most common type of DSL today is ADSL.
True
Corrective controls reveal or discover unwanted events
False
Crackers are casual hackers with a limited knowledge of computer security.
False
At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into digital data.
DSLAM
In-class training for end users should focus on _____.
20% of the network functions that the user will use 80% of the time
A sniffer program is a _____.
A program that records all LAN messages received for later analysis
In some cases, one failure generates several dozen-problem reports, which makes it difficult to pinpoint the true source of the problem quickly. This is referred to as a(n)
Alarm storm
A fundamental technique to determine if an intrusion is in progress in a stable network is:
Anomaly detection
A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats.
Application level firewall
Desktop management _____.
Automatically produces documentation of software installed on each client computer
_____________ is the percentage of time the network is usable by users.
Avaliability
A digital service offered by cable companies is the _________.
Cable modem
A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP.
Cable modem termination system
__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users.
Charge-back
A ______ is a group of computers that are connected together to perform the same task.
Cluster
In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution.
Combiner
The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as _____.
Computer forensics
Which of the following is not part of the work of the Internet Society?
Connecting optical-electrical converters
________ controls fix a trespass into the network.
Corrective
At the DSL customer premises is a device called a(n)
DSL modem
A DSL modem is also known as a:
DSL router
A tornado that eliminates a network control center would be an example of a natural __________.
Disaster
Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information.
Dumb
A way to prevent intrusion by disguising information through algorithms is _____.
Encryption
An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.
False
DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM and is the recommended encryption algorithm for highly sensitive data
False
DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data.
False
Desktop management software requires managers to install software such as antivirus updates or application updates on client computers manually.
False
Each of the networks in Internet 2 has a set of access points called terapops.
False
Failure control requires developing a decentralized control philosophy for problem reporting.
False
Fault-intolerant servers contain many redundant components to prevent failure.
False
IXPs were originally designed to connect only tier 3 ISPs.
False
In a DSL environment, the line splitter and DSL modem are always two separate devices.
False
In transport mode, IPSec encrypts the entire IP packet.
False
Maintaining data integrity is not a primary goal of security.
False
Microsoft's Windows operating system meets the US government's A1 level security.
False
One of the least common configuration activities for a network manager is adding and deleting user accounts.
False
The _________operates like the IETF through small research groups focused on specific issues.
Internet Research Task Force
The ______________ operates like the 1ETF through small research groups focued on specific issues
Internet research task force
At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint.
Internet service providers
Which of the following new Internet efforts was started by 34 universities?
Internet2
A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat.
Intrusion
DES _____.
Is a commonly used symmetric encryption algorithm that was developed in the mid-1970s
The _________ is the connection from a home or business to the telephone company end office.
Local Loop
The _____________ is the connection from a home or business to the telephone company end office
Local loop
________________ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure
MTTDiagnose
_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions.
Managed devices
Which of the following is not an important step in reducing network costs?
Moving to fat client architectures
A ______ uses an address table to translate the private IP addresses used inside the organization into proxy IP addresses used on the Internet.
NAT proxy server
_____________ are used by many large and small organizations to monitor and control their networks today
Network management software packages
_______________ refers to keeping track of the operations of network circuits to make sure they are working properly
Network monitoring
A __________ is an organizational department that is responsible for monitoring and fixing overall network problems.
Network operations center
In 1996, the national science foundation provided $100 million to start the _____________ program to develop the very high performance
Next generation internet
___________ allows the network manager to determine who is responsible for correcting any outstanding problems.
Problem tracking
A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates.
Quality control chart
The key principle in preventing disruption, destruction and disaster is ___________.
Redundancy
A ___________ is used by ISPs to authenticate its customers.
Remote-access server
We can calculate the relative ___________, by multiplying the impact score by the likelihood.
Risk score
Which of the following is typically not a part of configuration documentation?
Sales brochures for new hardware products being considered by the organization
Which of the following is not a main function within end user support?
Spin control
Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS?
Stats on user response times
____________ are reports produced by numerous network software packages for recording fault information.
Trouble tickets
A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet.
True
A brute-force attack is a method of trying to guess the correct password by trying every possible key.
True
A cable company distribution hub includes a combiner and a cable modem termination system.
True
A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.
True
A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.
True
A packet-level firewall examines the source and destination address of every network packet that passes though the firewall.
True
ADSL uses FDM to create three channels over the one local loop circuit: one for voice, one for upstream data, and one for downstream data.
True
An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset.
True
Tier 1 service providers connect together and exchange data at IXPs.
True
To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network.
True
To help in negotiating site licenses for software, it is important to document which software packages are installed on each client.
True
Trouble tickets are reports produced by a software package that records fault information.
True
User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user.
True
When someone external to your organization blocks access to your network and/or its resources, this is known as a denial-of-service attack.
True
When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.
True
With regards to DSL, on a circuit, the shorter the distance, the higher the speed.
True
network management software is used by most large organization to monitor and control their networks
True
the most common cable modem standard is data over cable service interface specification
True
A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.
Uninterruptible power supply
Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities?
Unlocked wiring closet for network devices
Which of the following is not a basic function of a network manager?
Web surfing to shop on eBay
A sniffer program is a _________________
a program that records all LAN messages received for later analysis
In some cases, one failure generates several dozen problem reports, which makes it difficult to pinpoint the true source of the problem quickly. This is referred to as a(n)
alarm storm
_______________ is the percentage of time that network is usable by users
avaliability
A _________________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication
certificate authority
________________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users
charge-back
Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed?
controlled chaos
A ________________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users messages from being processed
denial-of-service attack
An example of _____ data would be if a computer virus eliminated files on that computer.
destruction
A tornado that eliminates a network control center would be an example of a natural ___________
disaster
RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____
disk mirroring
RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____.
disk mirroring
A cable company headend is also referred to as a:
distribution hub
When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution.
escalated
Desktop Management software requires managers to install software on client computers manually.
false
The internet engineering steering group provides strategic architectural oversight for the internet
false
failure control requires developing a decentralized control philosophy for problem reporting
false
IP spoofing means to:
fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
The use of hacking techniques to bring attention to a larger political or social goal is referred to as _____.
hacktivism
The closest the internet has to an "owning" organization is the _______________
internet society
Often, incidents of unauthorized access known as ___________, involve employees of the organization, surprisingly enough.
intrusion
A _____________ separates traditional voice telephone transmission from the data transmission in the equipment located at the customer site
line splitter
A security hole is a(n)
malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users
A(n) ____________, is an information system that is critical to the survival of an organization.
mission critical application
According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they
often have weaker security.
A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side.
optical-electrical converter
Which of the following is not a method for deterring intrusion?
performing social engineering
To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems.
planning and organizing the network and networking staff
For Ethernet networks, a _______ switch can make eavesdropping more difficult.
secure
_______________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept
service level agreement
Ideally, when users receive training about fundamentals of network use, they become confident about what they need to do when working on a network.
true
Management reports can be helpful in determining network availability statistics
true
Which of the following is a mode that is used by IPSec?
tunnel
A(n) ________________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption
uninterruptible power supply
Which of the following is not one of the three major sources of a users equipment problem that can be solves by network support?
use of the CD-ROM as a cup holder
Fiber to the Home uses _____.
wavelength division multiplexing
A (n) ______ is a special type of virus that spreads itself without human intervention.
worm