MIS 4123 Test 4

Ace your homework & exams now with Quizwiz!

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. 9000 8.4 1.5 650 6.1

1.5

WiMAX was designed to use the _______ frequencies. 2.3 GHz and 3.1 GHz 2.4 GHz and 5 GHz 2.3 GHz, 2.5 GHz, and 3.5 GHZ 1.44 GHz, 2.4 GHz, and 5 GHz any frequency between 2.3 GHz and 3.5 GHz

2.3 GHz, 2.5 GHz, and 3.5 GHZ

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into digital data. DSLAM GrandSlam WAP Line splitter X.25 PAD

DSLAM

Data traffic from the DSL customer premises is sent to a __________ which is located at the local carrier's end office. Modem Codec DSLAM NIC ATM

DSLAM

One of the least common configuration activities for a network manager is adding and deleting user accounts. T/F

False

Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN. T/F

False

Problem statistics are not helpful in determining whether vendors are meeting contractual maintenance commitments. T/F

False

Researchers estimate that only one or two new viruses are developed every week. T/F

False

Social engineering refers to creating a team that solves virus problems. T/F

False

Technologies such as DSL and cable modem are called narrowband technologies. T/F

False

The Internet Engineering Steering Group provides strategic architectural oversight for the Internet. T/F

False

The Internet is flat in structure. T/F

False

The Internet is one large network. T/F

False

The phone line from the DSL customer to the telephone company end office is referred to as the "remote loop". T/F

False

To use DSL, a customer needs a DSL Access Multiplexer installed at his or her location.

False

Triple DES uses a total of 512 bits as the key. T/F

False

WiMAX is an older wireless technology that probably won't be used much longer. T/F

False

WiMax is the commercial name for a set of standards developed by the IEEE 802.3 standards group. T/F

False

With application level firewalls, any access that has not been explicitly denied is automatically permitted. T/F

False

__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software. Fault management Fault tolerance Firefighting Performance management Troubleshooting

Fault management

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan. Panicking Multiplexing Multitasking Firefighting Fireflying

Firefighting

Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. Gigapop Autonomous system ISP IXP Service provider

IXP

Tier 1 ISPs connect together and exchange data at ___________. IXPs Cable modem termination system endpoints Distribution hubs The Internet engineering task force headquarters The Internet Society network center

IXPs

The ___________ is responsible for technical management of IETF and the Internet standards process. Internet Society University Corporation for Advanced Internet Development Internet Engineering Steering Committee Internet Architecture Board Internet Research Task Force

Internet Engineering Steering Committee

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. Internet Society Internet Engineering Task Force Internet Engineering Steering Committee Internet Architecture Board Internet Research Task Force

Internet Engineering Task Force

A(n) ____________ examines the source and destination address of every network packet that passes through it. Packet level firewall Mullion server ANI system IP spoofing system Network switch

Packet level firewall

__________ has led to the belief that the Internet is "free". Encrypting Peering Bridging Tolling Polling

Peering

______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. MTTDiagnose MTTRespond MTBF MTTFix MTTRate

MTTFix

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. Popping Peering Yiping Napping Chargebacking

Peering

___________ ensures that the network is operating as efficiently as possible. Firefighting Fault tolerance Fault management Performance management Troubleshooting

Performance management

Some of the new applications being developed for a high-speed Internet include Tele-immersion Tele-conferencing QoS Broadband Tele-phoning

Tele-immersion

Which of the following is not true about one-time passwords? Users' pagers or smart phones (via text messaging) can receive them. They can be used in conjunction with a token system. The user must enter the one-time password to gain access or the connection is terminated. This is a good security solution for users who travel frequently and who must have secure dial-in access. They create a packet level firewall on the system.

They create a packet level firewall on the system.

Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account. T/F

True

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity. T/F

True

Companies have learned that threats from hacking from its own employees occur about as often as by outsiders. T/F

True

Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data. T/F

True

Controls are mechanisms that reduce or eliminate threats to network security. T/F

True

Disk mirroring writes duplicate copies of all data on at least two different disks. T/F

True

DoS attackers generally use fake source IP addresses, making it harder to identify the DoS messages. T/F

True

Due to changing communication technologies, most companies have combined voice and data communications functions. T/F

True

Ideally, when users receive training about fundamentals of network use, they become confident about what they need to do when working on a network. T/F

True

In many organizations, configuration documentation takes the form of a large set of network diagrams, one for each LAN, BN, and WAN. T/F

True

Intrusion primarily refers to the loss of confidentiality of organizational data. T/F

True

Macro viruses can spread when an infected file is opened. T/F

True

Management reports can be helpful in determining network availability statistics. T/F

True

Mean Time Between Failures is a statistic that is used to track device reliability. T/F

True

Network management is the process of operating, monitoring, and controlling the network to ensure it works as intended and provides value to its users. T/F

True

Network management software is designed primarily to provide automated support for at least some of the network management functions. T/F

True

Network management software is used by most large organization to monitor and control their networks. T/F

True

One common configuration activity is updating the software on the client computers in the network. T/F

True

Peering means that a tier 1 ISP does not charge another tier 1 ISP to transmit its messages. T/F

True

Performance management means ensuring the network is operating as efficiently as possible. T/F

True

Preventive controls mitigate or stop a person from acting or an event from occurring. T/F

True

Quality control charts are a simple tool that can be used by network managers to monitor network conditions. T/F

True

Secure Sockets Layer is an encryption standard designed for use on the Web. T/F

True

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters. T/F

True

Service level agreements specify the exact type of performance and fault conditions that an organization will accept from a common carrier or Internet service provider. T/F

True

The CERT was established at Carnegie Mellon University. T/F

True

The RFCs that form the basis for Internet standards are developed by the IETF and its working groups. T/F

True

The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed. T/F

True

The device similar to a DSL router, but used in a FTTH environment is called an optical network unit. T/F

True

The ideal solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network. T/F

True

The most common access point used by attackers to gain access to an organization's network is the Internet connection. T/F

True

The most common cable modem standard is Data over Cable Service Interface Specification. T/F

True

The most common type of DSL today is ADSL. T/F

True

The most commonly used central authentication protocol used today is Kerberos. T/F

True

The rise of the Internet has increased significantly the potential vulnerability of an organization's assets. T/F

True

Most WiMAX providers in the US are using an effective data range of .5 to 1.5 miles 3-10 miles 1-3 miles 0.5-50 miles 1-5 miles

.5 to 1.5 miles

Corrective controls reveal or discover unwanted events. T/F

False

Crackers are casual hackers with a limited knowledge of computer security. T/F

False

In-class training for end users should focus on security exclusively all network topics 20% of the network functions that the user will use 80% of the time proper data entry the half of the applications that this particular uses most of the time

20% of the network functions that the user will use 80% of the time

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. 100 250 400 750

400

Most organizations strive to resolve between _______ of requests at the first Level of support in less than an hour. 10% and 15% 20% and 30% 50% and 55% 75% and 85% 95% and 99%

75% and 85%

A(n) ____________ can use stateful inspection to monitor and record the status of each connection and can use this information in making decisions about what packets to discard as security threats. Application level firewall Bullion server ANI system IP spoofing systems Packet level firewall

Application level firewall

_____________ is the percentage of time the network is usable by users. Retransmission rate Availability MTTDiagnose Downtime MTBF

Availability

A digital service offered by cable companies is the _________. Abilene network WAP proxy G.Lite ADSL Cable modem Next Generation Internet

Cable modem

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. Internet steering system Optical-electrical converter WAP proxy Cable modem termination system Fixed wireless system

Cable modem termination system

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. Disaster recovery firm DES company Directory company Certificate authority Fingerprint advisory board

Certificate authority

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users. Charge-back Web spinning Internet access fees Support staff billing ESD

Charge-back

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. Modem Router Bridge Combiner CMTS

Combiner

___________ refers to managing and documenting the network's hardware and software configuration. Visioning Troubleshooting Firefighting Configuration management Implementation

Configuration management

In general, tier 3 ISPs make money by charging ________. Customers ICANN UCAID The DSLAM CSUs/DSUs

Customers

A(n) _______ is a screened subnet devoted solely to public access servers such as Web servers and public DNS servers. Intranet DMZ Zone of authority VLAN Smart hub

DMZ

At the DSL customer premises is a device called a(n) Cable modem DSLAM DSL modem Internet router DSL bridge

DSL modem

A DSL modem is also known as a: DSL bridge DSL brouter DSL router DSL gateway DSL hub

DSL router

____________ is also called automatic software distribution. Electronic Data Interchange Software architecture Desktop management Automatic configuration management Email Software Uploading

Desktop management

___________ provides information about configuration management of client computers on a network. Circuit management software Device management software System management software Application management software Desktop management software

Desktop management software

__________ provide authentication which can legally prove who sent a message over a network. Digital signatures DES keys Directory keys Screen names User Ids

Digital signatures

A cable company headend is also referred to as a: Abilene network WAP proxy Cable modem Distribution hub Fiber node

Distribution hub

To snare intruders, many organizations now use _________ techniques. Entrapment Hacker Trojan horse Cracker DES

Entrapment

WiMax was designed to easily connect into existing ___________. Wide area networks Backbone networks Ethernet LANs ATM backbones FTTH

Ethernet LANs

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user. T/F

False

An uninterruptible power supply utilizes a second redundant disk for every disk on the server. T/F

False

Asymmetric encryption uses the same key to encrypt and decrypt a message. T/F

False

DES is a commonly used symmetric encryption algorithm, developed in the mid-1990s by the American government in conjunction with IBM, and is the recommended encryption algorithm for highly sensitive data. T/F

False

Decryption is the process of converting plaintext into ciphertext. T/F

False

Desktop Management software requires managers to install software such as antivirus updates or application updates on client computers manually. T/F

False

Digital Subscriber Line is a family of multipoint technologies. T/F

False

Each of the networks in Internet 2 has a set of access points called terapops. T/F

False

Failure control requires developing a decentralized control philosophy for problem reporting. T/F

False

Fault-intolerant servers contain many redundant components to prevent failure. T/F

False

IXPs were originally designed to connect only tier 3 ISPs. T/F

False

If managers do not pay enough attention to planning and organizing the network, they are going to end up being proactive vs. reactive in solving network problems. T/F

False

In a DSL environment, the line splitter and DSL modem are always two separate devices. T/F

False

In transport mode, IPSec encrypts the entire IP packet. T/F

False

Maintaining data integrity is not a primary goal of security. T/F

False

Microsoft's Windows operating system meets the US government's A1 level security. T/F

False

Network cables are the easiest target for eavesdropping. T/F

False

The _________ operates like the IETF through small research groups focused on specific issues. Internet Society University Corporation for Advanced Internet Development Internet Engineering Steering Committee Internet Architecture Board Internet Research Task Force

Internet Research Task Force

The closest the Internet has to an "owning" organization is the ___________. Internet Service Provider Abilene network CA*Net3 University Corporation for Advanced Internet Development Internet Society

Internet Society

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. Network Access Points Internet service providers Bridges LATAs Digital subscriber lines

Internet service providers

Which of the following new Internet efforts was started by 34 universities? CA*net 3 ARDNOC VBNS NGI Internet2

Internet2

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. Line splitter V.32bis modem Line analyzer Main distribution frame Network access point

Line splitter

The _________ is the connection from a home or business to the telephone company end office. Distribution hub RFC UCAID Local loop CA*net 3

Local loop

_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails. MTTDiagnose MTTRespond MTTRepair MTTFix MTBF

MTBF

_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. MTBF Availability MTTRespond MTTDiagnose MTTRate

MTTDiagnose

A security hole is a(n): Malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users Small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location Packet-level firewall Missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution ANI system

Malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions. Faulty Bursty Trouble tickets Voice-activated Managed devices

Managed devices

A(n) ____________, is an information system that is critical to the survival of an organization. Network plan Accounting system IDS Mission critical application Firewall

Mission critical application

__________ refers to the process of translating between one set of private IP addresses inside a network and a set of public addresses outside the network. Translation Conversion Network Address Translation Proxy translation IP conversion

Network Address Translation

_____________ are used by many large and small organizations to monitor and control their networks today. Network management software packages Firefighter packages Fault creating packages Fault toleraters NICs

Network management software packages

____________ refers to keeping track of the operation of network circuits to make sure they are working properly. Network monitoring Fault tolerance Fault management Firefighting Downtime

Network monitoring

In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. CA*Net3 UCAID Next Generation Internet Internet 3 WAP proxy

Next Generation Internet

Which of the following statements is true in regards to DSL? On a circuit, the shorter the distance, the higher the speed. On a circuit, the longer the distance, the higher the speed. On a circuit, the longer the distance, less attenuation occurs. On a circuit, the shorter the distance, more attenuation occurs. When more attenuation occurs, higher frequency signals can be used effectively.

On a circuit, the shorter the distance, the higher the speed.

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. CA*net 3 RFC WAP proxy Fixed wireless connection Optical-electrical converter

Optical-electrical converter

_____________ helps ensure that critical problems get priority over less important ones. Protocol analyzing Problem prioritizing Uptime Availability Reliability

Problem prioritizing

___________ allows the network manager to determine who is responsible for correcting any outstanding problems. Load balancing MTBF Availability Reliability Problem tracking

Problem tracking

A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. Quality control chart Quality of service Service leveling chart Desktop management Alarm cloud

Quality control chart

The key principle in preventing disruption, destruction and disaster is ___________. Redundancy Control spreadsheet IDS Anti-virus software Prevention controls

Redundancy

A ___________ is used by ISPs to authenticate its customers. Password server Remote-access server File server WAP server Web server

Remote-access server

___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept. Service level agreements Trouble tickets Smart hub lists Bursty router printouts Wish list documentation

Service level agreements

Which of the following is not considered one of the five most common business impacts? Financial Productivity Reputation Social Safety

Social

Which of the following is one of the tier 1 ISPs in North America? IETF IEEE IAB Sprint ISOC

Sprint

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. System Satisfaction Speedy Subscriber Switch

Subscriber

_______________ describes how an asset can be compromised by one specific threat. Threat scenarios Threat plans Threat hacks Threat contingencies Threat attacks

Threat scenarios

________ is a measure of how much it costs per year to keep one computer operating. Web gardening Software installation cost Hardware upgrade cost Total cost of ownership Support staff cost

Total cost of ownership

_______________ is an encryption standard that uses a total of 168 bits as the key. Triple DES Dial-back WEP EAP Ciphering

Triple DES

Spyware, adware and DDOS agents are three types of: IP spoofing attacks Denial-of-service attacks Trojans Physical security threats Intrusion prevention detection approaches

Trojans

____________ are reports produced by numerous network software packages for recording fault information. Wish list documentation Trouble tickets Smart hub lists Bursty router printouts Roger systems checks

Trouble tickets

A NAT firewall uses an address table to translate private IP addresses used inside the organization into proxy IP addresses used on the Internet. T/F

True

A Trojan horse may allow an unauthorized user to access a computer from a remote location. T/F

True

A brute-force attack is a method of trying to guess the correct password by trying every possible key. T/F

True

A cable company distribution hub includes a combiner and a cable modem termination system. T/F

True

A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization. T/F

True

A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console. T/F

True

A packet-level firewall examines the source and destination address of every network packet that passes though the firewall. T/F

True

A point of presence is the place at which the ISP provides services to its customers. T/F

True

A security hole is a bug or vulnerability that permits intrusion to a computer. T/F

True

A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. T/F

True

ADSL uses FDM to create three channels over the one local loop circuit: one for voice, one for upstream data, and one for downstream data. T/F

True

An asset can be compromised by more than one threat, so it is common to have more than one threat scenario for each asset. T/F

True

The term "firefighting" is used to describe a situation where network managers spend all of their time dealing with breakdowns and immediate problems and do not have time to plan and organize properly. T/F

True

Tier 1 service providers connect together and exchange data at IXPs. T/F

True

To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network. T/F

True

To help in negotiating site licenses for software, it is important to document which software packages are installed on each client. T/F

True

Trouble tickets are reports produced by a software package that records fault information. T/F

True

User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user. T/F

True

When someone external to your organization blocks access to your network and/or its resources, this is known as a denial-of-service attack. T/F

True

When using a digital signature for the process of authentication, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key. T/F

True

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. WLANs Intranet Extranet WAN None of the above

WLANs

A sniffer program is a: type of macro-virus small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location used in a call-back modem a program that records all LAN messages received for later analysis secure hub program

a program that records all LAN messages received for later analysis

In some cases, one failure generates several dozen problem reports, which makes it difficult to pinpoint the true source of the problem quickly. This is referred to as a(n) monday service failure alarm storm catastrophic issue server farm

alarm storm

Symmetric encryption systems have two parts: the key and the ____________. algorithm spamming method IP spoofer clearance code smart card bits

algorithm

A fundamental technique to determine if an intrusion is in progress in a stable network is: anomaly detection armoring cable RSA algorithm patching scanning a user's fingerprint

anomaly detection

A(n) _________ is something of value and can be either hardware or software. asset service level agreement threat security plan network design

asset

Desktop management: increases the cost of configuration management over the long term requires managers to install software and application updates manually on client computers automatically produces documentation of software installed on each client computer can not maintain documentation of software installed on each client computer decreases costs in the short term

automatically produces documentation of software installed on each client computer

A ______ is a group of computers that are connected together to perform the same task. server farm cluster load balancer virtual server both a. and b.

both a. and b.

Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. middleband narrowband rubberband metalband broadband

broadband

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: trojan horse sniffing tunneling computer forensics misuse detection

computer forensics

Which of the following is not part of the work of the Internet Society? public policy connecting optical-electrical converters education development of Internet standards maintenance of Internet standards

connecting optical-electrical converters

The basic idea behind _______ is to store other people's Web data closer to your users. managing networks content caching cost management load balancing traffic shaping

content caching

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? disruption destruction controlled chaos intrusion disaster

controlled chaos

________ controls fix a trespass into the network. corrective detective preventive mitigating backup

corrective

For access to DSL, __________ equipment is installed at the customer location. point-of-presence satellite dish customer premises metropolitan area exchange network access point

customer premises

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? delphi team member script kiddies crackers professional hackers organization employees

delphi team member

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. denial-of-service attack service level agreement virus spamming scamming

denial-of-service attack

An example of _____ of data would be if a computer virus eliminated files on that computer. disruption controlled chaos intrusion destruction disaster

destruction

________ controls discover unwanted events. preventive corrective detective mitigating backup

detective

A tornado that eliminates a network control center would be an example of a natural __________ disaster disruption controlled chaos destruction intrusion

disaster

Encryption is the process of: transmission of information over secure lines in analog form to prevent illegal access detecting errors in messages by means of mathematical rules correcting errors in message by means of mathematical rules disguising information by the use of mathematical rules, known as algorithms preventing errors in messages by means of logical rules

disguising information by the use of mathematical rules, known as algorithms

RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as _____ disk backup hard drive duplication cloud backups disk duplication disk mirroring

disk mirroring

A network switch failure is an example of a(n) ________ threat. internal disruptive causal intrusion disaster

disruptive

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information. voice-activated bursty faulty dumb intelligent

dumb

A way to prevent intrusion by disguising information through algorithms is: spoofing call-back access encryption disk elevatoring disk mirroring

encryption

When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution. firefought spun escalated burst delimited

escalated

Which of the following type of media is least susceptible to eavesdropping? fiber optics twisted pair microwave infrared coaxial cable

fiber optics

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. firewall token system ANI call-back modem firefighter

firewall

IP spoofing means to: fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation illegally tape or listen in on telephone conversations detect and prevent denial-of-service attacks act as an intermediate host computer between the Internet and the rest of the organization's networks

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

A high-speed Internet has a set of access points called ____ pops that provide point-of-presence at ________ speeds. giga, gigabit mega, megabit multi, multibit giga, megabit multi, gigabit

giga, gigabit

The use of hacking techniques to bring attention to a larger political or social goal is referred to as cracking ethical politics hacktivism social engineering brute force attacks

hacktivism

Which of the following is a type of intrusion prevention system? zoned-based data link-based host-based transport-based none of the above is an appropriate answer

host-based

Another term for cable networks that use both fiber-optic and coaxial cable is __________. fixed wireless mobile wireless distribution hub hybrid fiber coax fibrax

hybrid fiber coax

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: decreased because the new sophisticated technology is far more secure than the old manual methods remained the same because management was always deeply interest in control and security decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society increased because this commitment to data communications has changed the potential vulnerability of the organization's assets remained the same because there are very few threats to data communications

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. disruptive controlled chaos disruptive intrusion disaster

intrusion

Often, incidents of unauthorized access known as___________, involve employees of the organization, surprisingly enough. intrusion disruption controlled chaos destruction disaster

intrusion

DES: is maintained by ISO refers to Date Electronic Security is a commonly used symmetric encryption algorithm that was developed in the mid-1970s was developed by a joint effort that included Microsoft is an asymmetric algorithm

is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

Documentation for network and application software: usually does not include information about the network operating system usually does not include information about any special purpose network software includes information about which data files each user can access is not generally needed since networks are comprised of hardware only is important for monitoring adherence to software license rules

is important for monitoring adherence to software license rules

Which of the following is not considered a key management task for running a network? knowledge of frame relay planning organizing activities directing activities controlling activities

knowledge of frame relay

In a DSL environment, local loops from many customers enter and are connected to the central office computer center main central office main distribution facility rack

main distribution facility

Which of the following is not an important step in reducing network costs? moving to fat client architectures automating as much of the network management process as possible developing standards for computers on the network reducing the time spent manually installing new software centralizing help desks

moving to fat client architectures

A costing method that examines only the direct costs of operating the computers, omitting softer indirect costs such as "wasted" time is referred to as total cost of ownership network cost of ownership transactions costs ownership privileges total direct costs

network cost of ownership

A __________ is an organizational department that is responsible for monitoring and fixing overall network problems. mission critical area fault tolerance department network operations center mullion delimiter agency web surfing guru headquarters

network operations center

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they often have weaker security have more assets are more likely to have credit card numbers available are likely off-shore have lower bandwidth

often have weaker security

A ______________ is a browser add-in or app that stores website passwords. password collaborator password manager script manager security envelope security manager

password manager

Which of the following is not a method for deterring intrusion? training end users not to divulge passwords using a smart card in conjunction with a password to gain access to a computer system using biometric devices to gain access to a computer system using a security software package that logs out users if that user is 'idle' for a certain amount of time performing social engineering

performing social engineering

To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems. planning and organizing the network and networking staff LAN manual fault log trouble ticket troubleshooting log

planning and organizing the network and networking staff

A _________ is the place at which the ISP provides services to its customers. remote access point network access point cable modem termination system endpoint point-of-presence metropolitan area exchange

point-of-presence

_________ controls stop a person from acting. detective corrective mitigating preventive backup

preventive

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. risk assessment backplane mitigating control factor analysis control verification worksheet control test plan

risk assessment

We can calculate the relative ___________, by multiplying the impact score by the likelihood. rootkit authentication risk score risk assessment risk event

risk score

Which of the following is typically not a part of configuration documentation? hardware documentation sales brochures for new hardware products being considered by the organization user profiles network software documentation software documentation

sales brochures for new hardware products being considered by the organization

For Ethernet networks, a _______ switch can make eavesdropping more difficult. secure trojan horse proxy spoofing spamming

secure

IP Security Protocol: is focused on Web applications is primarily used to encrypt e-mail is a policy which makes public key encryption work on the Internet sits between IP at the network layer and TCP/UDP at the transport layer operates in entrapment mode

sits between IP at the network layer and TCP/UDP at the transport layer

Which of the following is not a main function within end user support? resolving network faults training resolving user problems spin control none of these answers are appropriate

spin control

Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS? stats on multiplexers stats on modems stats on circuits in the network stats on user response times stats on malfunctioning devices

stats on user response times

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. asset service level agreement threat security plan network design

threat

A brute force attack against an encryption system: is called RC4 tries to gain access by trying every possible key is also known as 3DES always uses the Rijndael algorithm is part of the Advanced Encyrption Standard

tries to gain access by trying every possible key

A brute force attack against an encryption system: is called RC4 tries to gain access by trying every possible key is also known as 3DES always uses the Rijndael algorithm is part of the Advanced Encyrption Standard

tries to gain access by trying every possible key

Which of the following is a mode that is used by IPSec? exchange sniffer tunnel creeper firefighter

tunnel

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. network cloaking device backup punch card reader uninterruptible power supply service level agreement help desk

uninterruptible power supply

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? locked doors on all communication closets passwords that disable the screen and keyboard of a computer secured network cabling behind walls and above ceilings use of armored cable unlocked wiring closet for network devices

unlocked wiring closet for network devices

Which of the following is not one of the three major sources of a user's equipment problem that can be solved by network support? use of the CD-ROM as a cup holder failed hardware device lack of user knowledge incompatibility between user software and network hardware and software none of the above is an appropriate answer

use of the CD-ROM as a cup holder

Fiber to the Home uses: frequency division multiplexing wavelength division multiplexing time division multiplexing statistical time division multiplexing all of the above

wavelength division multiplexing

Which of the following is not a basic function of a network manager? web surfing to shop on eBay cost management performance and fault management configuration management end user support

web surfing to shop on eBay

Which of the following are usually the first choice for eavesdropping? unshielded twisted pair shielded twisted pair local cables owned by the organization wireless LANs fiber optics

wireless LANs

A (n) ______ is a special type of virus that spreads itself without human intervention. snake worm trojan horse boot sector virus stealth virus

worm


Related study sets

Social Problems, chapter 1, Social Problems, chapter 3, Social Problems, chapter 4, Social Problems, chapter 5, Social Problems, chapter 7, Social Problems, chapter 8, Social Problems, chapter 9, Social Problems, chapter 10, Social Problems, chapter...

View Set

Political Science Exam 2 Study Guide

View Set

Sociology Chapter Review Quizzes 12-18

View Set

Campbell Biology 8th Edition - Chapter 7: Photosynthesis

View Set

Communication and Conflict Midterm

View Set

NURS 401 PrepU CH 40 (Pediatrics)

View Set