Telecom exam 3, IS-3413 Final Exam, IS 3413 Test 3, Telecom Test 3 (Ch 9, 10, 11, 12), Test #3 Study Guide

Ace your homework & exams now with Quizwiz!

Types of intruders

"Script kiddies" - novices using public software Recreational hackers - for fun Professional hackers - espionage or fraud Organization Employees (insider threat)

Routed BN

"Subnetted" or "hierarchical backbones" Pros: LAN segmentation Cons: slower, more expensive, hard to manage

Most WiMAX providers in the US are using an effective data range of a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles

0.5 to 1.5 miles

Risk Assessment

1. Develop Risk measurement Criteria 2. Inventory IT assets 3. ID threats - Risk Scores - impact and likelihood 4. Document existing controls - risk acceptance & mitigation 5. ID improvements

Which is NOT a reason why increasing in computer security over the past few years?

1. Hacking was a hobby 2. Hactivism has become more common 3. Increase in mobil devices offers a very fertile environment for exploitation

Network Management Tasks

1. Monitor current network operations 2. Triage, diagnose, and fix problem 3. Plan for network growth/upgrades

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

1.544 Mbps

The maximum download data rate for cable modem systems is currently a. 1 Mbps b. 1.44 Mbps c. 5 Mbps d. 100 Mbps e. 150 Mbps

150 Mbps

OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps

159.25 Gbps

WiMAX was designed to use the _______ frequencies. a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz

2.3 GHz, 2.5 GHz, and 3.5 GHZ

In-class training for end users should focus on a. security exclusively b. all network topics c. 20% of the network functions that the user will use 80% of the time d. proper data entry e. the half of the applications that this particular uses most of the time

20% of the network functions that the user will use 80% of the time

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36

24

Which of the following step is NOT recommended for reducing network demand?

3 steps to reducing network demand: - Network impact statement for all application software developed or purchased - Data compression technique - Network usage during peak/high-cost time to lower demand/cost time

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. a. 100 b. 250 c. 400 d. 750

400

The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

44.376 Mbps

Most organizations strive to resolve between _______ of requests at the first Level of support in less than an hour. a. 10% and 15% b. 20% and 30% c. 50% and 55% d. 75% and 85% e. 95% and 99%

75% and 85%

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network

A

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. a. firewall b. token system c. ANI d. call-back modem e. firefighter

A

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point

A

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan

A

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming

A

A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard

A

A fundamental technique to determine if an intrusion is in progress in a stable network is: a. anomaly detection b. armoring cable c. RSA algorithm d. patching e. scanning a user's fingerprint

A

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit

A

A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system

A

A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits

A

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion

A

A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design

A

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall

A

A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall

A

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD

A

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs

A

Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware. a. much more b. much less c. about the same d. exactly the same e. a little more

A

Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps

A

For Ethernet networks, a _______ hub can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming

A

IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization's networks

A

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design

A

In __________, the network designer examines the available technologies and assesses which options will meet the users' needs. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

A

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

A

In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic

A

In general, local ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs

A

National ISPs connect together and exchange data at ___________. a. Network Access Points b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center

A

Nowadays, most organizations use a simpler approach to network design called the ___________ approach. a. building-block b. frame definition c. prototype d. systems development life cycle e. guided network

A

Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

A

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only

A

RFP stands for: a. Request for Proposal b. Ring Fault Path c. Routing File Protocol d. Record Facsimile Program e. Redundant File Protocol

A

Running fiber optic cable into the home as an alternative networking technology to DSL is called: a. passive optical networking b. active optical networking c. passive fibrous networking d. active fibrous networking e. wireless networking

A

SMDS: a. is not yet a widely accepted standard b. refers to Subscriber Mainframe Digital Subscriber c. performs error checking, unlike frame relay and ATM d. does not encapsulate packets e. is a reliable packet service

A

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

A

The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls

A

The multipoint version of fixed wireless is sometimes known as: a. point-to-multipoint b. point-to-point c. CA*Net3 d. DOCSIS e. DSLAM

A

The performance of MANs and WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic

A

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. dial-up access through a modem b. intranet c. extranet d. WAN e. none of the above

A

The use of a(n) _________ prevents unauthorized intruders from accessing a computer network because the host or server will only permit access via inbound calling from prespecified phone numbers. a. Automatic number identification b. network cloaking device c. call-back codec d. Trojan horse e. call-forward modem

A

There are some network modeling tools that can ________ the existing network. a. discover b. disassemble c. sensitize d. maintain e. implement

A

To establish circuit loading, the designer usually starts with the: a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met b. individual user training c. bus diameter, disk cache that is used at the server station d. channel bandwidth and baud rate used at each client e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node

A

To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES

A

When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a: a. dedicated circuit b. dialed circuit c. ISDN circuit d. VPN circuit e. T-1 carrier circuit

A

Which of the following are not costs that are generally considered during the cost assessment stage of the network design process? a. cost of advertising brochures for new products to be offered by an organization b. internetworking devices cost c. network management costs d. circuit costs e. software costs for network operating system

A

Which of the following is an advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user

A

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.

A

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability

A

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices

A

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees

A

Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized? a. non-necessary requirements b. wish list requirements c. desirable requirements d. mandatory requirements e. none of the above is an appropriate answer

A

Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network? a. an application will use HTTP over TCP/IP b. an application will run on an IBM mainframe and so the network will require SNA traffic c. an application will need a gateway to translate SNA traffic into TCP/IP protocols d. an application will use SPX/IPX with a Novell file server e. an application will have drop down menu choices

A

Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.

A

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable

A

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup

A

________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup

A

__________ is not an important consideration when network designers review old and new applications. a. Reviewing the NFL scores b. Reviewing the organization's possible changes in product mix c. Understanding the organization's strategic plans d. Understanding development plans for new uses of electronic commerce e. Reviewing the organization's projections of sales

A

__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids

A

___________ refers to the amount of data transmitted on a circuit. a. Circuit loading b. Leading edge deployment c. Capacity planning d. Calculating message volumes e. Requirements documentation

A

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs

A

____________ is a newer type of packet switching technology. a. ATM b. SONET c. ISDN d. ADSL e. X.25

A

_____________ is an emerging standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP

A

Digital Subscriber Line

A family of point-to-point technologies

________________is often performed at an ISP's point of presence (POP). A. Authentication B. Validation C. Emasculation D. Arbitration E. Hibernation

A. Authentication

___________ can be used to convert/obscure internal IP addresses. A. NAT firewalls B. Packet-level firewalls C. Host internet defense systems (HIDS) D. Load balancers E. Layer 2 switches

A. NAT firewalls

The primary challenge in using symmetric encryption is ________________ . A. agreeing upon the shared key B. a lack of acceptable algorithms C. finding mathematical one-way functions D. identifying certifying authorities E. messages cannot be decrypted

A. agreeing upon the shared key

A key principle in mitigating disruption, destruction and disaster is . A. redundancy B. control spreadsheets C. anti-virus software D. blissful ignorance E. lowest bid equipment

A. redundancy

___________ are reports describing network problems, often produced by automated network fault management software such as Remedy. A. trouble tickets B. network operations centers C. mean time between failures D. managed devices E. risk assessments

A. trouble tickets

______________ are reports describing network problems, often produced by automated network fault management software such as Remedy. A. trouble tickets B. network operations centers C. mean time between failures D. managed devices E. risk assessments

A. trouble tickets

What is the relationship between the distance and the speed with your service sin terms of ADSL?

ADSL (Asymmetric DSL) uses frequency division multiplexing to create 3 separate channels over the one local loop circuit *The shorter the distance, the higher the speed; with a short distance, the circuit suffers less attenuation and higher frequency signals can be used, providing a greater bandwidth for modulation

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT firewall c. IP spoofing bridge d. packet level firewall e. smart hub

ANI system

Configuration Management

Adding and deleting user accounts Documenting Configuration

What does the basic architecture for a dedicated-circuit network consists of?

All connections are point to point, from one building in one city to another building int he same or a different city. The user leases circuits from the common carrier for his/her exclusive use - its like having your own private network, but it is managed by the common carrier Used ring, star, and mesh

Integrity

Assurance that data not altered no destroyed

Distributed DoS (DDoS)

Attack uses multiple devices to perform the attack; p erformed using a network of compromised devices (called agents, bots, or zombies)

What is denial-of-service (DoS)?

Attacker attempts to disrupt the network by flooding it with messages so that the network cannot process messages from normal users

Denial of Service (DoS)

Attacks flood a network with messages that prevent normal access

Which of the following types of security threats ensure business continuity?

Availability

A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus

B

A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server

B

A _______________ is particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

B

A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster

B

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

B

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT proxy server c. IP spoofing bridge d. packet level firewall e. smart hub

B

Adoption of narrowband ISDN in North America has been: a. fast b. slow c. rapid d. non existent, since it is not offered in North America e. none of the above

B

At the top of the Internet structure are national ___________, such as BBN Planet. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines

B

Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only

B

CA*Net3 was developed by a Canadian organization known as: a. IETF b. ARDNOC c. ADSL d. RFC e. UCAID

B

Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements

B

Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged. a. backplane b. baseline c. turnpike document d. wish list e. RFP

B

In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

B

In needs analysis: a. a great deal of the work has probably never been done b. the goal is to understand what users and applications the network will support c. the geographic scope is not an important consideration d. a baseline of current operations is not important e. the rate of growth of network traffic is not an issue

B

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

B

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities

B

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

B

The building block design approach is sometimes called: a. wide and shallow b. narrow and deep c. wide and deep d. narrow and shallow e. narrow and flat

B

The traditional network design approach does not work well for _________ networks. a. slowly evolving b. rapidly growing c. static d. modestly growing e. not growing

B

Very-high-data-rate DSL uses multiplexing to provide _________ channels. a. two b. three c. four d. five e. six

B

When devices operate as fast as the circuits they connect and add virtually no delays, we say that the device operates at _______________. a. network speed b. wire speed c. content speed d. balancing speed e. none of the above

B

Which of the following groups developed the Canadian next generation Internet? a. MCI WorldCom b. ARDNOC c. UCAID d. Yipes e. NSF

B

Which of the following is not a basic level of the geographic scope of the network? a. local area network b. focused area network c. backbone network d. metropolitan area network e. wide area network

B

Which of the following is not a conceptual part, or layer, of the geographic scope of the network? a. core layer b. application layer c. access layer d. distribution layer e. the layer that connects the different distribution layers to each other

B

Which of the following is not a difference between ATM and X.25? a. ATM networks do not perform error control at each node, or computer, in the network. b. ATM provides packet switched service. c. ATM is scalable. d. ATM provides quality of service information used for setting different priorities for packet transmission e. ATM has cells that are 53 bytes long.

B

Which of the following is not a key deliverable for the cost assessment step? a. RFP b. list of wish list requirements c. revised physical network diagram d. business case, defined in business objectives and business language, that supports the network design e. none of the above is an appropriate choice

B

Which of the following is not a step under the traditional network design approach? a. An analyst develops cost estimates of the circuits needed to support the network. b. An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network. c. An analyst meets with users to identify user needs. d. An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network. e. An analyst designs the circuits to support the estimated traffic, allowing for modest growth.

B

Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above is an appropriate answer

B

Which of the following is not one of the large interexchange carriers operating in North America today? a. Sprint b. DSU c. MCI Worldcom d. AT&T e. none of the above is an IEC

B

Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards

B

Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity? a. 1000 Mbps b. Ethernet c. 10 Mbps d. 100 Mbps e. 1 Gbps

B

Which of the following would not be a type of protocol that needs to be considered in technology design? a. Ethernet b. 10 Mbps c. TCP/IP d. ATM e. SNA

B

Wireless DSL requires __________ to be effective. a. Abilene networks b. tall buildings or towers c. cable modems d. fiber nodes e. hybrid fiber coax

B

________ is a type of WAN connection that uses the normal voice telephone network. a. ATM b. Dial-up service c. T-Carrier services d. Digital Subscriber Line e. X.25

B

_________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it. a. Unmanaged devices b. Managed devices c. MIB d. Application hardware e. SNMP

B

__________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

B

__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay

B

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking

B

____________________technologies such as cable modem and DSL provide high-speed communications. A. Wireless B. Broadband C. Duplex D. Big Band E. 8-bit

B. Broadband

_____________ attacks flood a network with messages, preventing normal access. A. IETF B. DOS C. AOL D. ROFL E. RAID

B. DOS

_______________governs the internet. A. The IETF B. No single organization C. ICANN D. ISOC E. The ITU

B. No single organization

TCO is a measure of and cost per year to operate a device. A. physical; logical B. direct; indirect C. measured; unmeasured D. real; imaginary E. software; hardware

B. direct; indirect

Risk scores quantify and of an event occurring. A. availability; confidentiality B. impact; likelihood C. importance; significance D. reason; version E. height; weight

B. impact; likelihood

Traffic shaping

Blocking similar quality of service or limiting bandwidth for some users

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. 9000 b. 8.4 c. 1.5 d. 650 e. 6.1

C

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

C

A _________ results when a network is used to a greater extent than was originally anticipated by the network designer. a. leading edge data flow b. circuit load c. turnpike effect d. protocol volume e. capacity plan

C

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM

C

A ____________ identifies each device connected to an ISDN network terminator. a. NIC b. MAC address c. SPID d. PRI e. BRI

C

A central database called the _____________, has an agent that collects information about a device and makes this information available to the network management station. a. remote monitoring b. simple network management protocol c. management information base d. system management software e. common management interface protocol

C

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

C

A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring

C

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design

C

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk

C

According to one rule of thumb, ______ percent of circuit loading information is easy to gather. a. 50 b. 25 c. 80 d. 19 e. 20

C

Correlating the individual error messages into a pattern to find the true cause of the problem is referred to as_______ a. network-based analysis b. application cause analysis c. root cause analysis d. alarm storm e. none of the above is an appropriate answer

C

DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm

C

DSL modem is also known as a: a. DSL bridge b. DSL brouter c. DSL router d. DSL gateway e. DSL hub

C

Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM

C

For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point

C

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36

C

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design

C

Once the needs have been defined in the logical network design, the next step is to develop a(n) __________. a. application b. baseline c. physical network design d. turnpike design e. backplane design

C

One type of Broadband ISDN service is intended to be used for digital broadcast television: a. analog service b. asymmetrical service with two simplex channels c. one full duplex channel operating at 155.52 Mbps d. packet-switched service e. one full duplex channel operating at 622.08 Mbps

C

Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches

C

Storing other people's Web data closer to your users is referred to as a. SNMP b. web storing c. content caching d. load balancing e. traffic analysis

C

The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

C

The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN b. FCC c. CRTC d. CSU e. POTS

C

The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

C

The physical network diagram is done: a. before the vendors are selected b. before the RFP is sent out c. after the RFP is sent out, but before the vendors are selected d. after the vendors are selected e. after the network has been implemented

C

To balance the trade-off between speed and distance in ADSL, most ADSL service providers have chosen a T1 level of ADSL, and offer it under the trademarked name of _________ ADSL. a. CA*net 3 b. DOCSIS c. G.Lite d. OE e. UCAID

C

Which of the following groups developed Internet 2? a. MCI WorldCom b. ARDNOC c. UCAID d. Yipes e. ISOC

C

Which of the following is a difference between ATM and frame relay? a. Frame relay encapsulates packets. b. Frame relay is an unreliable packet service. c. Frame relay has a maximum CIR speed of up to 45 Mbps. d. Frame relay does not perform error control at each node in the network. e. Frame relay provides packet switched service.

C

Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter

C

Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. fully interconnected mesh

C

Which of the following is not a step that is used in newer type of network design process? a. cost assessment b. technology design c. implementation d. needs analysis e. none of the above is a correct answer

C

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

C

With ANI security control, the network manager: a. uses the Authorization Notation Investigation protocol to trace only authorized user passwords b. allows the Asynchronous NetWare Interface to act as a firewall c. can define several remote telephone numbers authorized to access each account d. assigns selected Access Network Invitations to users cleared for various levels of network access e. can only define one remote telephone number authorized to access each account

C

With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds

C

__________ is an estimate of the highest data volume on a link. a. Data mode b. Backplane load c. Peak circuit traffic d. Leading edge data flow e. Circuit transfer

C

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion.

C

___________ controls are in place to remedy unwanted network security events. A. Preventive B. Detective C. Corrective D. Elusive E. Submissive

C. Corrective

________________ controls are in place to remedy unwanted network security events. A. Preventive B. Detective C. Corrective D. Elusive E. Submissive

C. Corrective

____________ is a network security best practice involving strong security policies, physical security, and multipoint, correlated network intrusion prevention systems. A. Confidence mitigation B. Internal wall building C. Defense in depth D. Computer forensics E. Interval relationing

C. Defense in depth

Which packet-switched network type, sometimes referred to as a "layer 2.5" protocol, applies a label which enables generally faster WAN transmission? A. frame relay B. Ethernet C. MPLS D. SONET E. mesh

C. MPLS

_________________forward messages using data link addresses. A. Wireless APs B. Routed BNs C. Switched BNs D. FedEx drivers E. Cat 5e twisted pair cables

C. Switched BNs

SNMP is: A. a basic web server protocol B. an advance mail delivery protocol C. a common protocol to manage network devices D. a small network management plan E. a symmetric encryption algorithm

C. a common protocol to manage network devices

In a WAN there is a connection between each node pair. A. ring architecture B. bus architecture C. full mesh architecture D. star architecture E. partial mesh architecture

C. full mesh architecture

In a WAN there is a connection between each node pair. A. ring architecture B. bus architecture C. full mesh architecture D. star architecture E. partial mesh architecture

C. full mesh architecture

ISPs often interconnect at: A. top end node taps (TENTs) B. internet bridge sites (IBSs) C. internet exchange points (IXPs) D. points of presence (POPs) E. customer premises equipment (CPEs)

C. internet exchange points (IXPs)

Network managers should avoid firefighting: spending too much time on day-to-day problems and tasks, neglecting network planning and other tasks. A. physical; logical B. hardware; software C. operational; strategic D. authentication; provisioning E. encrypted; unencrypted

C. operational; strategic

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM

CSU/DSU

Cable Modem

Cable Networks are multipoint (shared); shared bandwidth, potential issues with security

Network Operating Center (NOC) are responsible for monitoring and fixing problems using what capabilities EXCEPT for:

Capabilities used are : performance management, fault management and network monitoring

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users. a. Charge-back b. Web spinning c. Internet access fees d. Support staff billing e. ESD

Charge-back

Layer 3 Switches

Combine features of layer-2 switches and routers, primarily for virtual LANs

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs

Common Carriers

CIA Triad

Confidentiality, Integrity, Availability

Network address translation (NAT) Firewall

Converts/obscures internal private IP addresses Outbound converts to external public, routable IP address

Leased Lines/Private Lines

Create a point-to-point links between organizational locations

Reputation of risk measurement criteria is involved in ... ?

Customer perception

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design

D

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design

D

A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange

D

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board

D

A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device

D

A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet

D

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster

D

A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node

D

A sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program

D

A transceiver at the WAP gateway passes requests to a __________ server from a handheld device. a. main distribution b. Internet Society c. local loop d. wireless telephony application e. line splitter

D

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system

D

A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall

D

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster

D

Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax

D

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch

D

Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT

D

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

D

Estimating the size and type of the "standard" and "advanced" network circuits is called _________. a. needs categorization b. turnpike design c. cost assessment d. capacity planning e. soliciting RFPs

D

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode

D

In 1996, The National Science foundation provided $100 Million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 2 e. WAP proxy

D

In __________, the network designer considers the relative cost of the technologies. a. technology design b. needs analysis c. narrow and deep analysis d. cost assessment e. distribution layering

D

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications

D

In the technology design stage of network design, a. the fundamental technology/protocols to be chosen have no relationship with the circuit capacity b. the decision for fundamental technology/protocols can be made without considering circuit capacity c. the decision for circuit capacity can be made without considering fundamental technology/protocols d. the decisions for fundamental technology/protocols and circuit capacity are interrelated e. the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage

D

Internet 2 is also known as: a. CA*Net3 b. IETF c. Next Generation Internet d. the Abilene network e. passive optical networking

D

One advantage of _____________ is that no conversations between LAN and WAN protocols are needed. a. active fibrous networking b. The Abilene network c. CA*Net3 d. ethernet to the home e. Next Generation Internet

D

Special rate services that allow dialed circuit calls for both voice communications and data transmission to be purchased in large quantities are known as __________ a. DSL b. RBOC c. ATM d. WATS e. X.25

D

The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3

D

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection

D

Threat of intrusion comes more from ____________. a. government b. crackers c. outside the of organization d. both inside and outside of the organization e. inside of the organization

D

Which of the following is a way to sell the network proposal to management? a. talk about upgrades from 10Mbps to 100Mbps b. give many details about using routers vs. gateways for a particular connection c. concentrate on a discussion about token ring vs. Ethernet protocol d. focus on network reliability e. discuss SNA architecture

D

Which of the following is not a main item for which network designers estimate costs for the proposed network? a. software b. hardware c. purchasing and installing circuits d. ergonomic chairs for users e. circuits provided by common carriers

D

Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location

D

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times

D

Which of the following is not contributing to the dramatic increase in network traffic today? a. Video applications on networks are becoming common. b. Electronic mail is now used by most people who work in organizations. c. Web searches are now commonly performed by network users. d. Client computers today can have 512 RAM, a 60 Gb hard drive, and 1.86 Ghz processors. e. Multimedia applications on networks are becoming common.

D

Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams? a. applications of the proposed network b. servers in the proposed network c. circuits in the proposed network d. specific routers that have been chosen to implement the proposed network e. clients in the proposed network

D

Which of the following is not true about X.25? a. It is the oldest type of packet switched service. b. It offers datagram, switched virtual circuit, and permanent virtual circuit services. c. It uses the LAPB data link layer protocol. d. It is a type of circuit switched service. e. It is not used widely in North America, except by multinational companies.

D

Which of the following is not true about network design? a. In designing LAN networks, network designers tend to err on the side of building too big a network b. In designing BN networks, network designers tend to err on the side of building too big a network c. In designing WAN networks, network designers tend to err on the side of building too small a network d. In designing LAN networks, network designers tend to err on the side of building too small a network e. In designing MAN networks, network designers tend to err on the side of building too small a network

D

Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. UCAID

D

Which of the following type of media is most susceptible to eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. coaxial cable d. infrared e. fiber optics

D

Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network

D

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN

D

________ is used to model the behavior of the planned communication network once the proposed network map is complete. a. Implementation b. Post-implementation review c. Documentation d. Simulation e. Training users

D

_________ are smaller versions of NAPs that link a set of regional ISPs. a. mini Network Access Points b. cable modem termination system endpoints c. distribution hubs d. metropolitan area exchanges e. points-of-presence

D

_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup

D

_________ is being pioneered by Yipes.com. a. Active fibrous networking b. The Abilene network c. CA*Net3 d. Ethernet to the home e. Next Generation Internet

D

___________ is designed to enable the use of normal Web applications on computers and devices with small display screen operating over low speed wireless connections. a. CA*Net3 b. The Abilene network c. Internet 2 d. Wireless Application Protocol e. X.25 protocol

D

vBNS was developed by one organization, but is currently being run by another organization, _____________. a. AT&T b. Sprint c. Yipes d. MCI WorldCom e. the Abilene network

D

___________ helps reduce network traffic by storing external web data locally. A. Load balancing B. Traffic shaping C. Social engineering D. Content caching E. Data scraping

D. Content caching

Using asymmetric encryption, a message from Tom encrypted using Henry's public key can be decrypted using: A. Tom's public key only B. Tom's private key only C. either Henry's public or private key D. Henry's private key only E. Henry's public key only

D. Henry's private key only

______________ is a network security goal of assurance that data are not altered or destroyed. A. Confidentiality B. Inscrutability C. Availability D. Integrity E. Invincibility

D. Integrity

________________is a network security goal of assurance that data are not altered or destroyed. A. Confidentiality B. Inscrutability c D. Integrity E. Invincibility

D. Integrity

____________and ________________ are common network equipment performance statistics. A. SNMP; SMTP B. DOS; DDOS C. RFP; SLA D. MTBF; MTTR E. OSPF; BGP

D. MTBF; MTTR

______________ is a general term for malicious code including viruses, worms and ransomware. A. Firmware B. Spoofware C. Latentware D. Malware E. Underware

D. Malware

In a WAN with a Star Architecture: A. There is a connection between each node pair B. Messages may take multiple alternate paths between the same two nodes C. Each node has exactly two WAN circuit connections D. Messages between any two nodes require either one or two hops E. Failure of the central site does not deteriorate overall WAN performance

D. Messages between any two nodes require either one or two hops

Which statement is NOT true regarding routed backbone networks. A. They are sometimes called subnetted or hierarchical backbones B. They tend to be slower than switched backbones C. They tend to be more expensive than switched backbones D. They are not well suited to providing LAN segmentation E. They are typically used at the Core layer (Campus Backbones)

D. They are not well suited to providing LAN segmentation

Which of the following is NOT an advantage of VLANs? A. VLANs allow more flexible subnetting B. VLANs are very simple, making them ideal for small networks C. VLANs allow traffic prioritization, since they can include quality of service data in a tag D. VLANs generally enable faster performance E. VLANs allow LAN segmentation based on logical rather than physical design considerations

D. VLANs generally enable faster performance

Application-level firewalls often use to monitor the status of TCP connections, countering threats such as SYN floods. A. RAID devices B. particle beams C. flood monitoring D. stateful inspection E. proxy servers

D. stateful inspection

A VPN creates a through the internet to transfer encapsulated packets, which are usually encrypted. A. security hole B. viaduct C. T-1 circuit D. tunnel E. ring architecture

D. tunnel

Difference between a DSL and cable modem

DSL is a point to point technology, whereas cable modems used shared multipoint circuits

At the DSL customer premises is a device called a(n) a. cable modem b. DSL router c. DSL modem d. Internet router e. DSL bridge

DSL modem

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD

DSLAM

Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM

DSLAM

Operational Taks

Day to day operations of the network. Provide support to network users. may overwhelm, preventing strategic planning.

______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks

Dedicated-circuit networks

Availability

Degree to which information and systems are accessible

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees

Delphi team member

____________ is also called automatic software distribution. a. Electronic Data Interchange b. Software architecture c. Desktop management d. Automatic configuration management e. Email Software Uploading

Desktop management

___________ provides information about configuration management on a network. a. Circuit management software b. Device management software c. System management software d. Application management software e. Desktop management software

Desktop management software

Strategic Tasks

Develop long-range network plans to met organization's policies and goals

Managed devices

Device, system, and application management software Switches, routers, APs, etc.

Broadband Technologies

Digital Subscriber Line (DSL), Cable, Satellite, Fiber to the Home, Wireless

__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids

Digital signatures

Detective Controls

Discover unwanted events, documenting events for potential evidence

Encryption

Disguising information using mathematical rules, providing confidentiality Strength based on: algorithm and key(s)

A ____________ translates a wireless application request to HTTP and sends it over the Internet to the desired Web server. a. passive optical scanner b. local loop c. cable modem d. peer e. WAP proxy

E

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter

E

Asymmetric DSL uses ___________ multiplexing to create three separate channels over one local loop circuit. a. inverse b. time division c. statistical time division d. wave division e. frequency division

E

If you have a low volume of message traffic on a small WAN or MAN, _________ service is recommended, but if you have a high traffic, large WAN or MAN, __________ service would be more cost effective. a. dedicated, dial-up b. packet, dial-up c. inward, outward d. outward, inward e. dial-up, packet

E

In passive optical networking, the optical signal has a maximum length of about __________. a. 500 meters b. 1000 meters c. 1 mile d. 5 miles e. 10 miles

E

Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband

E

The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

E

The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society

E

The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization. a. building block b. access layer c. core layer d. cost assessment e. logical network design

E

To estimate costs for large network purchases, organizations often: a. purchase all network purchases 'off the shelf' b. obtain 'book value' information for the existing network from the accounting department c. ask other users what they paid for their network bought in the past d. multiply old network costs by a factor of 3 e. issue an RFP to vendors

E

Which of the following is false about staff costs for a network? a. The most expensive part of the network today is the staff who design, operate, and maintain it b. The emphasis is on network designs that reduce staff time needed to operate them c. Network staff are often required to learn to operate a variety of devices d. Network staff are often required to maintain a variety of devices e. When a variety of devices are used in a network, it takes less time to perform network management activities

E

Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time e. performing social engineering

E

Which of the following is not a problem with dialed circuits? a. Data transmission rates on dialed circuits are relatively low. b. Dialed circuits may vary in quality. c. Transmission rates for dialed circuits can vary with each call. d. It is hard to predict if a given connection will be clear or noisy. e. Use of these circuits is very simple.

E

Which of the following is not an ISP in either the United States or Canada? a. CAIS b. iSTAR c. CompuServe d. Sprint e. ISOC

E

Which of the following is not an example of a building block used in technology design? a. typical application b. typical user c. high traffic application d. standard network circuit e. specifications for a particular lighting fixture in the network operating center

E

Which of the following is not making the traditional design approach less appropriate for today's networks? a. The underlying technology of networking devices is changing very rapidly b. The underlying technology of client and server devices is changing very rapidly c. The underlying technology of circuits is changing very rapidly d. Growth in network traffic is very high e. The most expensive part of any network is the hardware

E

Which of the following is not true about one-time passwords? a. Users' pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system.

E

Which of the following would not be collected by a designer, working in the needs analysis phase, who was documenting general information and characteristics of the environment in which the network must operate? a. local laws that could affect the network b. international laws that could affect the network c. federal laws that could affect the network d. building codes that could affect the network e. traffic laws that could affect the network

E

_____________offers point-to-point communications over traditional telephone wires: A. Cable modem B. Fiber to the home (FTTH) C. Wireless interoperability for microwave access (WiMax) D. Point of presence (POP) E. Digital subscriber line (DSL)

E. Digital subscriber line (DSL)

_______________refers to ISPs (at the same level not charging each other for message transfers). A. Skimming B. Arbitration C. Retribution D. Stratifying E. Peering

E. Peering

The strength of an encryption method is based on the strength of its and the strength of its . A. formula; alphabet B. hardware; software C. circuits; throughput D. authentication; provisioning E. algorithm; key(s)

E. algorithm; key(s)

What was Simple Network Management Protocol (SNMP), originally developed for?

Each SNMP device has an agent that collects information about itself and the messages it processes and stores that information in a database is called management information base (MIB) The network manager's management station that runs the network management software has access to the MIB

Virtual Private Networks

Emulates private packet-switched network over public internet. Virtual Circuit - Tunnel May use dedicated hardware (VPN Gateway) Pros: inexpensive and flexible Cons: internet traffic unpredictable

What is implemented in a VPN message that is different from TCP/IP transmission scheme?

Encapsulating Security Payload (ESP)

WiMax was designed to easily connect into existing ___________. a. wide area networks b. backbone networks c. Ethernet LANs d. ATM backbones e. FTTH

Ethernet LANs

Internet Engineering Task Force (IETF) is concern with?

Evolution of the Internet architecture and the smooth operation of the Internet

Application-level firewalls

Examine traffic thru layer 5 for anomalous behavior Often include stateful inspection (stateful firewalls

Malware

Executable code, scrips, active content, macros, etc.

Unauthorized Access/Intrusion

External attackers gaining access; most unauthorized access incidents involve employees

(T/F) A Delphi team that helps the network manager assess the security risks to the organization should always have at least 20 members.

F

(T/F) A dedicated circuit is usually not available late at nights or on weekends.

F

(T/F) A disadvantage of a star architecture is that the failure of one circuit will disrupt the entire network.

F

(T/F) ADSL is called asymmetric because its two data channels have exactly the same speed.

F

(T/F) An ISDN BRI circuit provides more bandwidth than an ISDN PRI circuit.

F

(T/F) An OC-1 circuit provides a data rate of 155 Mbps.

F

(T/F) An intranet VPN connects different organizations over the Internet.

F

(T/F) An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

F

(T/F) An uninterruptible power supply utilizes a second redundant disk for every disk on the server.

F

(T/F) Another term for a DSL modem is a DSL brouter.

F

(T/F) Another way to refer to dialed services is by the term, plain vanilla telephone service (PVTS).

F

(T/F) Application management software monitors devices such as routers, hubs and switches.

F

(T/F) Asymmetric encryption uses the same key to encrypt and decrypt an message.

F

(T/F) Broadband ISDN (B-ISDN) uses X.25 to move packets through the network.

F

(T/F) Cloud (as in cloud architecture) means that the design for the common carrier's network comes from satellite networks above the clouds.

F

(T/F) Confidentiality is not a threat to business continuity.

F

(T/F) Content caching is designed to store your own web material closer to your servers.

F

(T/F) Corrective controls reveal or discover unwanted events.

F

(T/F) Crackers are casual hackers with a limited knowledge of computer security.

F

(T/F) DES is a commonly used symmetric encryption algorithm developed in the mid-1990s by the American government in conjunction with IBM.

F

(T/F) Datagrams are connection-oriented.

F

(T/F) Decryption is the process of converting plaintext into ciphertext.

F

(T/F) Device management software can analyze the device information to provide proactive network management.

F

(T/F) Digital Subscriber Line is a family of multipoint technologies.

F

(T/F) Each of the networks in Internet 2 has a set of access points called terapops.

F

(T/F) Fault-intolerant servers contain many redundant components to prevent failure.

F

(T/F) Fiber-to-the-home is another term for satellite fixed wireless technology.

F

(T/F) Frame relay is a reliable packet service.

F

(T/F) Full mesh design networks are more common than partial mesh design networks.

F

(T/F) Full mesh networks are inexpensive.

F

(T/F) In transport mode, IPSec encrypts the entire IP packet.

F

(T/F) Integrity is not a primary goal of security.

F

(T/F) Microsoft's Windows operating system meets A1 level security.

F

(T/F) Needs analysis is the final step in the building block approach to network design.

F

(T/F) Network access points were originally designed to connect only local ISPs.

F

(T/F) One type of ISDN is BRI (basic rate interface) that is mainly used by commercial customers.

F

(T/F) POTS always uses the came circuit paths each time a number is dialed so that quality and maximum data rate is always the same.

F

(T/F) Physical security of an organization's IT resources is not an important element in preventing intrusion to an internal LAN.

F

(T/F) Researchers estimate that only one or two new viruses are developed every week.

F

(T/F) SNMP cannot monitor the status of devices that are using the IPX/SPX protocol suite.

F

(T/F) Social engineering refers to creating a team that solves virus problems.

F

(T/F) T carrier circuits can only be used to transmit voice.

F

(T/F) Technologies such as DSL and cable modem are called narrowband technologies.

F

(T/F) The CERT at Carnegie Mellon University was established by the U.S. Department of Agriculture in 1988.

F

(T/F) The Internet Engineering Steering Group provides strategic architectural oversight for the Internet.

F

(T/F) The Internet is flat in structure.

F

(T/F) The Internet is one large network.

F

(T/F) The committed information rate (CIR) in a permanent virtual circuit is the maximum allowable rate that the network will attempt to provide.

F

(T/F) The goal of the needs analysis step in network design is to develop a physical network design.

F

(T/F) The goals in the needs analysis step of network design are exactly the same when designing LANs vs. when designing WANs.

F

(T/F) The least common type of DSL in use today is Asymmetric DSL.

F

(T/F) The most common access point used by attackers to gain access to an organization's network is the dial-up access via a modem.

F

(T/F) The original Integrated Services Digital Network (ISDN) is also known as mediumband ISDN.

F

(T/F) The technology that is closest to a user in a network design is the core layer.

F

(T/F) The traditional network design approach works very well for rapidly changing networks.

F

(T/F) The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.

F

(T/F) To connect into a packet switched network, a network terminator is generally used.

F

(T/F) To use DSL, a customer needs a DSL Access Multiplexer installed at his or her location.

F

(T/F) Today, a common carrier that provides long distance services is typically called a local exchange carrier.

F

(T/F) Today, all network traffic is due to traffic from internal application systems.

F

(T/F) Today, the most expensive part of the network is the hardware.

F

(T/F) VPNs offer high security because they operate through the Internet.

F

(T/F) VPNs operate at layer 4.

F

(T/F) Very-high-data-rate Digital Subscriber Line is designed for use over long local loops.

F

(T/F) When a user connects to the Internet using a dialup connection, the users pays more for this call compared to making a regular voice call.

F

(T/F) When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible.

F

(T/F) With application level firewalls, any access that has not been disabled is permitted.

F

(T/F) X.25 is the newest packet switched standard.

F

(True/False) Load balancing consists only of sending income data sets to storage areas with the highest priority

False

(True/False) VLAN require that all computers on the LAN be physical co-located

False

Improving WAN performance requires that we increase the latency of network devices.

False

Ethernet

Faster than others; no conversion b/w LAN/BN/WAN protocols

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan. a. Panicking b. Multiplexing c. Multitasking d. Firefighting e. Fireflying

Firefighting

Packet-Switched Networks

Fixed price for a connection to the carrier and then a fee for the data transmitted. Packets from separated messages interleaved to maximize efficiency

Frame Relay

Flexible layer 2 standard for encapsulation, packet-switching

Layer-2 Switches

Forward packets using data link layer (MAC) address Physical ports (16-24); logical star topology for point-to-point circuits

Public key infrastructure (PKI)

Hardware, software, organizations and policies to associate keys with individual or organization

Internet Exchange Points

Interconnection between ISPs

The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

Internet Engineering Steering Committee

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

Internet Engineering Task Force

The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

Internet Research Task Force

The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society

Internet Society

Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. Internet2

Internet2

Redundancy

Key principle in mitigating disruption, destruction and disaster

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP

L2TP

MPLS

Label applied between layer 2 and layer 3 headers (layer 2.5 protocol)

__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay

Latency

Defense in depth

Layered security practices Patching security holes mitigate zero-day attacks

Most IP services use _______ as the data link layer protocol. a. Ethernet b. TCP c. MPLS d. IRoute e. T1

MPLS

_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP

MPLS

_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails. a. MTTDiagnose b. MTTRespond c. MTTRepair d. MTTFix e. MTBF

MTBF

_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. a. MTBF b. Availability c. MTTRespond d. MTTDiagnose e. MTTRate

MTTDiagnose

______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. a. MTTDiagnose b. MTTRespond c. MTBF d. MTTFix e. MTTRate

MTTFix

Business Continuity

Making certain that organization's data and applications will continue to operate even in the face of disruption, destruction, or disaster

Wimax has more features in common with WI-Fi except

Many devices use the same Access Point, so WiMax is a shared multipoint service in which all computers must take turns transmitting. WiMax uses cell towers so its reach is much farther than the reach of a typical WiFi connection.

Total Cost of Ownership (TCO)

Measure of direct & indirect cost per year to operate device

Mean time between failures (MTBF)

Measures of equipment reliability

Preventive Controls

Mitigate or stop person from acting or event from occurring; act as a deterrent by discouraging or restraining

Switched BN

Most common BN used in distribution layer, layer 2 switches Pro: Simultaneous access among LANs; simple easy to manage Cons: More broadcast traffic

The Internet Services Providers (ISPs) created by?

National ISPs(Tier 1), Regional ISPs(Tier 2), Local ISPs(Tier 3)

Backbone Network Components

Network Cables, Switches, Routers

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion.

Network address translation

Documenting the network configuration consists of all the following except?

Network hardware, network software, and user/application profiles

Routers

Network layer devices; use IP addresses, strip off data link layer frames Provides clear segmentation of connected sub-netted LANs

Internet

Network of networks Few controls over content and applications

In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 3 e. WAP proxy

Next Generation Internet

Internet Governance

No single organization governs the internet.

What item might Total Cost of Ownership (TCO) not capture?

Omit soft indirect costs such as wasted time

Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.

On a circuit, the shorter the distance, the higher the speed.

Which of the following is a new technology for Fiber to the Home(FTTH)?

Optical Network Unit

With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. a. PAD b. gateway c. switch d. router e. WAN

PAD

__________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

Peering

Availability is a big part of performance, what does it mean?

Percentage of time the network is available to users

___________ ensures that the network is operating as efficiently as possible. a. Firefighting b. Fault tolerance c. Fault management d. Performance management e. Troubleshooting

Performance management

___________ allows the network manager to determine who is responsible for correcting any outstanding problems. a. Load balancing b. MTBF c. Availability d. Reliability e. Problem tracking

Problem tracking

Network Management

Process of operating, monitoring, and controlling a network to ensure it works as intended and provides value to users

Confidentiality

Protection of data from unauthorized disclosure

A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. a. Quality control chart b. Quality of service c. Service leveling chart d. Desktop management e. Alarm cloud

Quality control chart

Corrective Controls

Remedy an unwanted event or intrusion

Physical Topologies (architectures)

Ring, Star, and Mesh

Network Controls

Safeguards to mitigate network threats

What is a firewall?

Secure the organization's Internet connection

Content delivery

Serve content from servers closest to request

Wide Area Networks (WANs)

Services: Dedicated-circuit networks, packet-switched networks, Virtual Private Networks (VPNs)

Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety

Social

User authentication

Something you know - passwords/passphrases, PINs Something you have - access cards, tokens, phones Something you are - Biometrics: fingerprints, retina scan

Service Level Agreements (SLAs)

Specify availability, fault correction (MTBF/response time)

Load balancing

Spreads traffic to devices in server farm (or cluster)

What are managed devices?

Standard devices that have small onboard computers to monitor the traffic that flows through the devices as well as the status of the device and other devices connected to it

Virtual Local Area Network (VLANs)

Subnetting based on logical instead of physical design; VLAN ID mapped to traditional IP subnet. Pros: faster and traffic pioritization Cons: complex to manage; typically only used in large networks

(T/F) A NAT proxy server uses an address table to translate private data link layer addresses used inside the organization into proxy data link layer addressed used on the Internet.

T

(T/F) A SLA specifies the exact type of performance that the common carrier will provide and the penalties if this performance is not provided.

T

(T/F) A T1 circuit provides a data rate of 1.544Mbps.

T

(T/F) A Trojan horse allows a user to access a computer from a remote location.

T

(T/F) A WAN with a ring topology can use full or half duplex circuits

T

(T/F) A brute-force attack is a method of trying to guess the correct password by trying every possible key.

T

(T/F) A certificate authority is a trusted organization that can vouch for the authenticity of a person or organization.

T

(T/F) A control spreadsheet lists threats to the network across the top of the spreadsheet and lists the network components down the side of the sheet.

T

(T/F) A denial-of-service attack occurs when someone external blocks access to your network.

T

(T/F) A distribution hub is also known as a headend.

T

(T/F) A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.

T

(T/F) A key problem when designing data communications networks is how to adapt to new technologies while organizations change

T

(T/F) A packet-level firewall examines the source and destination address io every network packet that passes though the firewall

T

(T/F) A point-of-presence is the place at which the ISP provides services to its customers.

T

(T/F) A security hole is a bug that permits intrusion to a computer.

T

(T/F) A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.

T

(T/F) A traditional network design approach follows a structured systems analysis and design process similar to that used in building applications.

T

(T/F) ATM can be scaled into faster ATM circuits

T

(T/F) An alarm is a message sent to the manager's network management station indicating a critical situation with a managed network device.

T

(T/F) As the number of ISPs has grown, a new form of network access point called a metropolitan area exchange has emerged.

T

(T/F) Automatic number identification accepts a login from a user if that user's incoming phone call comes from a pre-authorized list of phone numbers.

T

(T/F) Biometric systems scan the user to ensure that the user is the sole individual authorized to access the network account.

T

(T/F) Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

T

(T/F) Capacity planning is used to design circuit capacity.

T

(T/F) Circuit switched networks run over the public switched telephone networks operated by the common carriers

T

(T/F) Common carriers sell or lease communication services and facilities to the public.

T

(T/F) Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.

T

(T/F) Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

T

(T/F) Controls are mechanisms that reduce or eliminate threats to network security.

T

(T/F) Cost assessment is the step in the network design in which user requirements are documented.

T

(T/F) Cost assessment is used to look at the relative cost of technologies used in a network design.

T

(T/F) DOS attackers generally use fake source IP addresses, making it harder to identify the DoS messages.

T

(T/F) Desirable requirements are those that have the highest priority.

T

(T/F) Disk duplexing uses a redundant disk controller on the server.

T

(T/F) Ethernet/IP packet networks are not provided by common carriers such as AT&T.

T

(T/F) In 2005, the Computer Crime and Security Survey report stated that the average loss suffered by businesses because of computer security breaches was approximately $200,000.

T

(T/F) In building Wide Area Networks, many organizations do not build their own long distance communication circuits

T

(T/F) In technology design, a network designer looks at available technologies to see which options will satisfy users' needs.

T

(T/F) Internet 2 is the common name for the Abilene network.

T

(T/F) Intrusion refers to confidentiality and integrity of data

T

(T/F) MANs usually span 3 to 30 miles and connect BNs and LANs.

T

(T/F) Macro viruses can spread when an infected file is opened.

T

(T/F) Managed devices are the single most important element that contributes to the performance of a network.

T

(T/F) National Internet service providers connect together and exchange data at Network Access Points.

T

(T/F) Network cables are the easiest target for eavesdropping.

T

(T/F) One of the most commonly used network management protocols is Common Management Interface Protocol.

T

(T/F) Packet switched networks enable packets from separate messages or separate organizations to be interleaved for transmission.

T

(T/F) Peering means that a national ISP does not charge another national ISP to transmit its messages.

T

(T/F) Policy-based management allows the network manager to utilize special software to set priority policies for network traffic that take effect when the network becomes busy.

T

(T/F) Preventive controls mitigate or stop a person from acting or an event from occurring.

T

(T/F) Secure Sockets Layer is an encryption standard designed for use on the Web

T

(T/F) Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

T

(T/F) Simulation is a tool that can be used in designing networks.

T

(T/F) Switched Multimegabit Data Service encapsulates incoming packets.

T

(T/F) The SONET is made up of very high speed dedicated circuits that incorporate inverse multiplexing (IMUX) for all levels above the OC-1 level.

T

(T/F) The best solution for planning for disaster recovery is to have a fully redundant backup network placed in a different location that would not be threatened by the same natural or man-made disaster that would destroy the original network.

T

(T/F) The core layer of the network is usually the busiest.

T

(T/F) The denial-of-service attack disrupts the network by flooding the network with messages so that regular messages cannot be processed.

T

(T/F) The dominant standard for a cable modem is Data over Cable System Interface Specification.

T

(T/F) The most common authentication protocol used today is Kerberos.

T

(T/F) The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.

T

(T/F) The step of understanding current traffic on a network provides a baseline against which future network requirements can be compared.

T

(T/F) Today, many organizations design networks using the building-block approach.

T

(T/F) Today, most network designers use a three to five year planning horizon.

T

(T/F) Traffic analysis involves determining why some circuits are heavily used.

T

(T/F) Virtual private networks permit users to create permanent virtual circuits, or tunnels, through the Internet.

T

(T/F) WANs connect BNs and MANs across distances that can span up to thousands of miles.

T

(T/F) When using a digital signature, the sender encrypts the message with their private key and the recipient decrypts the message with the sender's public key.

T

(T/F) Wireless Application Environment supports mobile wireless Internet applications on devices with small display screens operating over low speed wireless connections.

T

(T/F) Wireless DSL is a line-of-sight technology

T

(T/F) With the passage of HIPPA and the Sarbanes Oxley Act, more and more regulations are addressing security.

T

(T/F) patch is a software solution to correct a security hole

T

Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location

T-1 VPN

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN

T-carrier services

Some of the new applications being developed for a high-speed Internet include a. Tele-immersion b. Tele-conferencing c. QoS d. Broadband e. Tele-phoning

Tele-immersion

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.

The data transmission rates tend to be lower than dial-up or dedicated circuits.

Point of Presence (POP)

The location where an ISP provides service to its customers; authentication is performed at the POP

Which of the following is NOT a network controls?

The network controls: preventive, detective, and corrective

Why can't outsiders use NAT firewall protection scheme?

The organization uses internal IP addresses; this way systems outside the organization never see the actual internal IP addresses and thus they think there is only one CPU on the internal network

What does the packet switched network consist of?

The user pays a fixed fee for the connection into the network (depending on the type and capacity of the services) and is charged for the number of packets transmitted The user's connection into the network is a packet assembly/disassembly devices (PAD)

Which of the following is not true about one-time passwords? a. Users' pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system.

They create a packet level firewall on the system.

IP packet-switched services offered by phone companies are unusual in that... ?

They strip off the header and the trailer from the frame and simply transmitted the IP packet

A network threat is anything EXCEPT the following?

Threat includes: do harm, interrupt the systems during the network and cause of monetary loss to the organization

_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks

Threat scenarios

Individuals get their Internet services from?

Tier 3

Mean time to repair (MTTR)

Total Time for Repairs / # of repairs performed

_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering

Triple DES

Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches

Trojans

____________ are reports produced by numerous network software packages for recording fault information. a. Wish list documentation b. Trouble tickets c. Smart hub lists d. Bursty router printouts e. Roger systems checks

Trouble tickets

(True/False) Coaxial or fiber cable passes a house may share bandwidth with other houses in your area

True

(True/False) Desktop management provides application level and lower levels of support to servers and cloud computers

True

(True/False) Even though it is the most commonly used services in the United States, frame relay service is considered an unreliable packet services

True

(True/False) Governance of the Internet and the bodies are open to students, instructors, and companies of all sizes

True

(True/False) Service-level agreements (SLAs) are agreements between organizations and their carriers used to establish specific types of performance and all conditions that are acceptable to the organization including the customers

True

(True/False) The Ethernet service used in packet-switched network has a different layer 2 protocol than frame relay

True

(True/False) The first step of increasing circuit capacity to analyzing the message traffic to determine which circuit is beyond their capacity.

True

Certificate authorities (CAs)

Trusted organizations that issue digital certificates proving individual/organization owns public key

Asymmetric (public-key) encryption

Two different keys; Private key & Public Key; Message encrypted with one key must be decrypted with the other

Simple network management protocol (SNMP)

Used to communicate with software agents on managed devices. Data stored in management information base (MIB)

Symmetric encryption

Uses a single key for encrypting and decrypting. Challenge in agreeing upon shared key (Key Management)

Packet-level firewalls (Basic)

Using access control list (ACL) rules, decide which packets are allowed or denied

Multiswitch VLANs

VLAN trunks: cuircuits connecting 2 VLANS switches, enabling traffic flow from one switch to another

What is the VPN tunnel used for?

VPN gateways enable you to create PVCs through the Internet. It starts at the VPN gateway (router) and travel through the Internet to the other VPN gateway (destination)

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. WLANs b. intranet c. extranet d. WAN e. none of the above

WLANs

What is the RAID 1 architecture?

Writes duplicate copies of all data on at least two different disks

sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program

a program that records all LAN messages received for later (unauthorized) analysis

Most WiMAX providers in the US are using an effective data range of a. 0.5 to 1.5 miles b. 3-10 miles c. 1-3 miles d. 0.5-50 miles e. 1-5 miles

a. 0.5 to 1.5 miles

The data rate for a T-1 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

a. 1.544 Mbps

OC-3072 has a data rate of a. 159.25 Gbps b. 39.813 Gbps c. 1.544 Mbps d. 100 Mbps e. 1.244 Gbps

a. 159.25 Gbps

__________ policies attempt to allocate costs associated with a WAN or a mainframe to specific users. a. Charge-back b. Web spinning c. Internet access fees d. Support staff billing e. ESD

a. Charge-back

____________ are companies that build a data and telecommunications infrastructure from which other companies can lease services for WANs and MANs. a. Common carriers b. Router manufacturers c. Standards organizations d. CSUs e. PUCs

a. Common carriers

At the DSL local carrier's office, the __________ demultiplexes the data streams and converts them into ATM data. a. DSLAM b. GrandSlam c. WAP d. line splitter e. X.25 PAD

a. DSLAM

Which of the following is not a type of intruder who attempts to gain intrusion to computer networks? a. Delphi team member b. script kiddies c. crackers d. professional hackers e. organization employees

a. Delphi team member

__________ provide authentication which can legally prove who sent a message over a network. a. Digital signatures b. DES keys c. Directory keys d. Screen names e. User Ids

a. Digital signatures

__________ refers to preventing, detecting, and correcting faults in the network circuits, hardware, and software. a. Fault management b. Fault tolerance c. Firefighting d. Performance management e. Troubleshooting

a. Fault management

Tier 1 ISPs connect together and exchange data at ___________. a. IXPs b. cable modem termination system endpoints c. distribution hubs d. the Internet engineering task force headquarters e. the Internet Society network center

a. IXPs

_____________ is a common standard for use by layer 2 access VPNs for encapsulation. a. L2TP b. VPN2 c. Encapsule2 d. TCP/IP e. PPP

a. L2TP

_____________ are used by many large and small organizations to monitor and control their networks today. a. Network management software packages b. Firefighter packages c. Fault creating packages d. Fault toleraters e. NICs

a. Network management software packages

____________ refers to keeping track of the operation of network circuits to make sure they are working properly. a. Network monitoring b. Fault tolerance c. Fault management d. Firefighting e. Downtime

a. Network monitoring

Which of the following statements is true? a. On a circuit, the shorter the distance, the higher the speed. b. On a circuit, the longer the distance, the higher the speed. c. On a circuit, the longer the distance, less attenuation occurs. d. On a circuit, the shorter the distance, more attenuation occurs. e. When more attenuation occurs, higher frequency signals can be used effectively.

a. On a circuit, the shorter the distance, the higher the speed.

With IP services, the ________ at the sending site takes the outgoing message (which usually is an Ethernet frame containing an IP packet), strips off the Ethernet frame and uses the IP address in the IP packet to route the packet though the carrier's packet‐switched network to its final destination. a. PAD b. gateway c. switch d. router e. WAN

a. PAD

A(n) _____________ is a simple tool that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates. a. Quality control chart b. Quality of service c. Service leveling chart d. Desktop management e. Alarm cloud

a. Quality control chart

___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept. a. Service level agreements b. Trouble tickets c. Smart hub lists d. Bursty router printouts e. Wish list documentation

a. Service level agreements

Some of the new applications being developed for a high-speed Internet include a. Tele-immersion b. Tele-conferencing c. QoS d. Broadband e. Tele-phoning

a. Tele-immersion

Which of the following is not a benefit of packet switched services? a. The data transmission rates tend to be lower than dial-up or dedicated circuits. b. You don't have to set up dedicated circuits between each end point from and to which you wish to transmit data and/or voice. c. You have the flexibility to send data through a temporary circuit between two connections that will be disconnected as soon as the digital transmission is completed. d. All circuits are less susceptible to a great deal of noise because they are digital. e. You don't have to specify all the interconnecting services you need for your WAN when you buy the service.

a. The data transmission rates tend to be lower than dial-up or dedicated circuits.

_______________ describes how an asset can be compromised by one specific threat. a. Threat scenarios b. Threat plans c. Threat hacks d. Threat contingencies e. Threat attacks

a. Threat scenarios

_______________ is an encryption standard that uses a total of 168 bits as the key. a. Triple DES b. Dial-back c. WEP d. EAP e. Ciphering

a. Triple DES

The three basic network access points into most organizational networks are from the Internet, from LANs inside of the organization and ________________. a. WLANs b. intranet c. extranet d. WAN e. none of the above

a. WLANs

Which of the following is not a basic function of a network manager? a. Web surfing to shop on eBay b. cost management c. performance and fault management d. configuration management e. end user support

a. Web surfing to shop on eBay

A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits

a. algorithm

A fundamental technique to determine if an intrusion is in progress in a stable network is: a. anomaly detection b. armoring cable c. RSA algorithm d. patching e. scanning a user's fingerprint

a. anomaly detection

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall

a. application level firewall

Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps

a. are supported with gigabit fiber optic networks in large cities

A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design

a. asset

________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup

a. corrective

In general, tier 3 ISPs make money by charging ________. a. customers b. ICANN c. UCAID d. the DSLAM e. CSUs/DSUs

a. customers

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming

a. denial-of-service attack

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion

a. disaster

To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES

a. entrapment

In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic

a. failure in one circuit means that the network can most likely continue to function

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable

a. fiber optics

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. a. firewall b. token system c. ANI d. call-back modem e. firefighter

a. firewall

IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization's networks

a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design

a. full mesh design

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit

a. giga, gigabit

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs

a. imposes an overhead cost by increasing network traffic

Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

a. intrusion

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only

a. is typically offered only to commercial customers

Which of the following is not considered a key management task for running a network? a. knowledge of frame relay b. planning c. organizing activities d. directing activities e. controlling activities

a. knowledge of frame relay

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point

a. line splitter

Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user

a. low cost

A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system

a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

a. messages can take a long time to travel from the sender to the receiver

Which of the following is not an important step in reducing network costs? a. moving to fat client architectures b. automating as much of the network management process as possible c. developing standards for computers on the network d. reducing the time spent manually installing new software e. centralizing help desks

a. moving to fat client architectures

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth

a. often have weaker security.

A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall

a. packet level firewall

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network

a. permanent virtual circuit

To help reduce firefighting in network management, a network manager should spend time on ____________ to prevent problems. a. planning and organizing the network and networking staff b. LAN manual c. fault log d. trouble ticket e. troubleshooting log

a. planning and organizing the network and networking staff

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability

a. prestige value of using a particular common carrier

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup

a. preventive

The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls

a. redundancy

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan

a. risk assessment

For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming

a. secure

A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard

a. tries to gain access by trying every possible key

The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic

a. upgrading the circuits between the computers

Which of the following is not one of the three major sources of a user's equipment problem that can be solved by network support? a. use of the CD-ROM as a cup holder b. failed hardware device c. lack of user knowledge d. incompatibility between user software and network hardware and software e. none of the above is an appropriate answer

a. use of the CD-ROM as a cup holder

A symmetric encryption system has two parts: the key and the ____________. a. algorithm b. spamming method c. IP spoofer d. clearance code e. smart card bits

algorithm

A fundamental technique to determine if an intrusion is in progress in a stable network is: a. anomaly detection b. armoring cable c. RSA algorithm d. patching e. scanning a user's fingerprint

anomaly detection

A(n) ____________ acts an intermediate host computer or gateway between the Internet and the rest of the organization's networks. a. application level firewall b. bullion server c. ANI system d. IP spoofing systems e. packet level firewall

application level firewall

Ethernet/IP packet networks: a. are supported with gigabit fiber optic networks in large cities b. are offered only by the common carriers c. use token ring layer 2 media access control d. use IPX/SPX protocols e. provide CIR up to a maximum of 1.544 Mbps

are supported with gigabit fiber optic networks in large cities

A(n) _________ is something of value and can be either hardware or software. a. asset b. service level agreement c. threat d. security plan e. network design

asset

Desktop management: a. increases the cost of configuration management over the long term b. requires managers to install software manually on client computers c. automatically produces documentation of software installed on each client computer d. can not maintain documentation of software installed on each client computer e. decreases costs in the short term

automatically produces documentation of software installed on each client computer

_____________ is the percentage of time the network is usable by users. a. Retransmission rate b. Availability c. MTTDiagnose d. Downtime e. MTBF

b. Availability

The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet. a. Internet Society b. Internet Engineering Task Force c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

b. Internet Engineering Task Force

At the top of the Internet structure are tier 1 ___________, such as AT&T and Sprint. a. Network Access Points b. Internet service providers c. bridges d. LATAs e. digital subscriber lines

b. Internet service providers

__________ is a term that refers to the speed in converting input packets to output packets. a. Transfer mode b. Latency c. Burstiness d. Cell relay e. Frame relay

b. Latency

_____________ is sometimes called a Layer 2.5 technology. a. ATM b. MPLS c. Ethernet d. TCP e. IP

b. MPLS

A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network. a. ANI system b. NAT firewall c. IP spoofing bridge d. packet level firewall e. smart hub

b. NAT firewall

__________ has led to the belief that the Internet is "free". a. Encrypting b. Peering c. Bridging d. Tolling e. Polling

b. Peering

___________ refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE. a. Popping b. Peering c. Yiping d. Napping e. Chargebacking

b. Peering

_____________ helps ensure that critical problems get priority over less important ones. a. Protocol analyzing b. Problem prioritizing c. Uptime d. Availability e. Reliability

b. Problem prioritizing

____________ are reports produced by numerous network software packages for recording fault information. a. Wish list documentation b. Trouble tickets c. Smart hub lists d. Bursty router printouts e. Roger systems checks

b. Trouble tickets

Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards

b. connecting optical-electrical converters

Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements

b. controls

Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above is an appropriate answer

b. data link-based

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

b. dependent upon the capacity of the central computer for its performance

A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster

b. disruptive

Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only

b. provides a communications circuit with two 64 Kbps B channels, plus one D channel

A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server

b. remote-access server.

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

b. require more processing by each computer in the network than in star or ring networks

Which of the following is typically not a part of configuration documentation? a. hardware documentation b. sales brochures for new hardware products being considered by the organization c. user profiles d. network software documentation e. software documentation

b. sales brochures for new hardware products being considered by the organization

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

b. virtual private network

Fiber to the Home uses a. frequency division multiplexing b. wavelength division multiplexing c. time division multiplexing d. statistical time division multiplexing e. all of the above

b. wavelength division multiplexing

A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus

b. worm

Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization

both inside and outside of the organization

Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh

bus

A T1 level of ADSL has a maximum downstream rate of about _________ Mbps. a. 9000 b. 8.4 c. 1.5 d. 650 e. 6.1

c. 1.5

WiMAX was designed to use the _______ frequencies. a. 2.3 GHz and 3.1 GHz b. 2.4 GHz and 5 GHz c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ d. 1.44 GHz, 2.4 GHz, and 5 GHz e. any frequency between 2.3 GHz and 3.5 GHz

c. 2.3 GHz, 2.5 GHz, and 3.5 GHZ

In-class training for end users should focus on a. security exclusively b. all network topics c. 20% of the network functions that the user will use 80% of the time d. proper data entry e. the half of the applications that this particular uses most of the time

c. 20% of the network functions that the user will use 80% of the time

In North America, a T1 circuit has ______ 64Kbps channels. a. 2 b. 30 c. 24 d. 12 e. 36

c. 24

Internet2® is an organization of about _____ universities, corporations, government agencies, and organizations. a. 100 b. 250 c. 400 d. 750

c. 400

The data rate for a T-3 circuit in North America is: a. 1.544 Mbps b. 6.312 Mbps c. 44.376 Mbps d. 274.176 Mbps e. 1.544 Gbps

c. 44.376 Mbps

The _________________ is a Canadian government agency that regulates voice and data communication. a. PSTN a. FCC b. CRTC c. CSU d. POTS

c. CSU

A ___________ is/are devices that permit a user to connect to a digital T-carrier service. a. modem b. codec c. CSU/DSU d. NIC e. ATM

c. CSU/DSU

At the DSL customer premises is a device called a(n) a. cable modem b. DSL router c. DSL modem d. Internet router e. DSL bridge

c. DSL modem

A DSL modem is also known as a: a. DSL bridge b. DSL brouter c. DSL router d. DSL gateway e. DSL hub

c. DSL router

Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office. a. modem b. codec c. DSLAM d. NIC e. ATM

c. DSLAM

____________ is also called automatic software distribution. a. Electronic Data Interchange b. Software architecture c. Desktop management d. Automatic configuration management e. Email Software Uploading

c. Desktop management

WiMax was designed to easily connect into existing ___________. a. wide area networks b. backbone networks c. Ethernet LANs d. ATM backbones e. FTTH

c. Ethernet LANs

The ___________ is responsible for technical management of IETF and the Internet standards process. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

c. Internet Engineering Steering Committee

Most IP services use _______ as the data link layer protocol. a. Ethernet b. TCP c. MPLS d. IRoute e. T1

c. MPLS

__________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network. a. Translation b. Conversion c. Network address translation d. Proxy translation e. IP conversion.

c. Network address translation

In 1996, The National Science foundation provided $100 million to start the ___________ program to develop the very-high-performance Backbone Network Service. a. CA*Net3 b. UCAID c. Next Generation Internet d. Internet 3 e. WAP proxy

c. Next Generation Internet

Spyware, adware and DDOS agents are three types of: a. IP spoofing attacks b. Denial-of-service attacks c. Trojans d. Physical security threats e. Intrusion prevention detection approaches

c. Trojans

Desktop management: a. increases the cost of configuration management over the long term b. requires managers to install software manually on client computers c. automatically produces documentation of software installed on each client computer d. can not maintain documentation of software installed on each client computer e. decreases costs in the short term

c. automatically produces documentation of software installed on each client computer

Which of the following is not a basic architecture for dedicated circuit networks? a. ring b. partial mesh c. bus d. star e. full mesh

c. bus

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design

c. cloud-based mesh design

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

c. connects all computers to one central computer that routes messages to the appropriate computer

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

c. controlled chaos

For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point

c. customer premises

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

c. datagram

A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring

c. encryption

When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution. a. firefought b. spun c. escalated d. burst e. delimited

c. escalated

The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. hacking b. ethical politics c. hacktivism d. social engineering e. brute force attacks

c. hacktivism

DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm

c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

A __________ is an organizational department that is responsible for monitoring and fixing overall network problems. a. mission critical area b. fault tolerance department c. network operations center d. mullion delimiter agency e. Web surfing guru headquarters

c. network operations center

We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event

c. risk score

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design

c. threat

A costing method that examines only the direct costs of operating the computers, omitting softer indirect costs such as "wasted" time is referred to as a. total cost of ownership b. network cost of ownership c. transactions costs d. ownership privileges e. total direct costs

c. transactions costs

Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter

c. tunnel

With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds

c. tunnels

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk

c. uninterruptible power supply

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities

c. uses inverse multiplexing above the OC-1 level

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system

cable modem termination system

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board

certificate authority

In a packet switched network, permanent virtual circuits that look very similar to a _____________ (for hardware-based dedicated circuits) move packets through the network. a. cloud-based ring design b. cloak-based mesh design c. cloud-based mesh design d. common carrier ring design e. common carrier bus design

cloud-based mesh design

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. a. modem b. router c. bridge d. combiner e. CMTS

combiner

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection

computer forensics

Internet Service Provider (ISPs)

connect the networks of their customers to the internet ISPs at the same tier typically don't charge each other - peering

Which of the following is not part of the work of the Internet Society? a. public policy b. connecting optical-electrical converters c. education d. development of Internet standards e. maintenance of Internet standards

connecting optical-electrical converters

Permanent Virtual Circuits (PVCs)

connections between different locations in the packet network

A star architecture: a. connects all computers in a closed loop b. connects all computers off a backbone circuit c. connects all computers to one central computer that routes messages to the appropriate computer d. all of the above e. none of the above

connects all computers to one central computer that routes messages to the appropriate computer

Which of the following is not one of the major categories (or sub-categories) into which network security threats can be placed? a. disruption b. destruction c. controlled chaos d. intrusion e. disaster

controlled chaos

Developing _______ helps develop a secure network. a. rules b. controls c. network maps d. vendor documentation e. service level agreements

controls

________ controls fix a trespass into the network. a. corrective b. detective c. preventive d. mitigating e. backup

corrective

For access to DSL, __________ equipment is installed at the customer location. a. point-of-presence b. satellite dish c. customer premises d. metropolitan area exchange e. network access point

customer premises

Most organizations strive to resolve between _______ of requests at the first level of support in less than an hour. a. 10% and 15% b. 20% and 30% c. 50% and 55% d. 75% and 85% e. 95% and 99%

d. 75% and 85%

___________ refers to managing and documenting the network's hardware and software configuration. a. Visioning b. Troubleshooting c. Firefighting d. Configuration management e. Implementation

d. Configuration management

______________ are sometimes called private line services. a. WANs b. LANs c. Circuit-switched networks d. Dedicated-circuit networks e. Routed-backbone networks

d. Dedicated-circuit networks

___________ is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan. a. Panicking b. Multiplexing c. Multitasking d. Firefighting e. Fireflying

d. Firefighting

Peering has led to the emergence of a new organization type called the _______, which permits any ISP to connect to its network. a. gigapop b. autonomous system c. ISP d. IXP e. Service provider

d. IXP

_______ is an indicator of the efficiency of problem management personnel in correctly finding the root cause of the failure. a. MTBF b. Availability c. MTTRespond d. MTTDiagnose e. MTTRate

d. MTTDiagnose

______ is a statistic that measures how quickly the staff corrected a network problem after they arrived at the problem site. a. MTTDiagnose b. MTTRespond c. MTBF d. MTTFix e. MTTRate

d. MTTFix

___________ ensures that the network is operating as efficiently as possible. a. Firefighting b. Fault tolerance c. Fault management d. Performance management e. Troubleshooting

d. Performance management

Which of the following is not considered one of the five most common business impacts? a. Financial b. Productivity c. Reputation d. Social e. Safety

d. Social

Which of the following is one of the tier 1 ISPs in North America? a. IETF b. IEEE c. IAB d. Sprint e. ISOC

d. Sprint

Digital _________ Line is a family of point-to-point technologies designed to provide high-speed data transmission over traditional telephone lines. a. System b. Satisfaction c. Speedy d. Subscriber e. Switch

d. Subscriber

Which of the following is not a type of VPN? a. intranet VPN b. extranet VPN c. access VPN d. T-1 VPN e. a VPN that enables employees to access an organization's network from a remote location

d. T-1 VPN

_____ are dedicated digital circuits that are the most commonly used form of dedicated circuit services in North America today. a. Wideband analog services b. SMDS c. ATM d. T-carrier services e. ISDN

d. T-carrier services

________ is a measure of how much it costs per year to keep one computer operating. a. Web gardening b. Software installation cost c. Hardware upgrade cost d. Total cost of ownership e. Support staff cost

d. Total cost of ownership

A sniffer program is a: a. type of macro-virus b. small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location c. used in a call-back modem d. a program that records all LAN messages received for later (unauthorized) analysis e. secure hub program

d. a program that records all LAN messages received for later (unauthorized) analysis

Threat of intrusion comes from ____________. a. the government b. crackers c. outside of the organization d. both inside and outside of the organization e. inside of the organization

d. both inside and outside of the organization

A digital service offered by cable companies is the _________. a. Abilene network b. WAP proxy c. G.Lite ADSL d. cable modem e. Next Generation Internet

d. cable modem

A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP. a. Internet steering system b. optical-electrical converter c. WAP proxy d. cable modem termination system e. fixed wireless system

d. cable modem termination system

A __________ is a trusted organization that can vouch for the authenticity of the person or the organization using the authentication. a. disaster recovery firm b. DES company c. directory company d. certificate authority e. fingerprint advisory board

d. certificate authority

In a cable modem environment, a _______ is used to combine Internet data traffic with ordinary TV video traffic and then send it back to the fiber node for distribution. a. modem b. router c. bridge d. combiner e. CMTS

d. combiner

The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as: a. Trojan horse b. sniffing c. tunneling d. computer forensics e. misuse detection

d. computer forensics

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster

d. destruction

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

d. disguising information by the use of mathematical rules, known as algorithms

A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node

d. distribution hub

Network devices that are ________ do only what they are designed to do, such as routing packets, but do not provide any network management information. a. voice-activated b. bursty c. faulty d. dumb e. intelligent

d. dumb

Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax

d. hybrid fiber coax

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications

d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster

d. intrusion

The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3

d. local loop

In a DSL environment, local loops from many customers enter and are connected to the a. central office b. computer center c. main central office d. main distribution center e. rack

d. main distribution center

A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall

d. mission critical application

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times

d. moving data further from the applications and people who use them

A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device

d. packet assembly/disassembly device

Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network

d. packet switched network

A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange

d. point-of-presence

_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup

d. preventive

Each state or Canadian province has its own ___________ to regulate communications within its borders. a. CRTC b. Federal Communications Commission c. common carriers d. public utilities commission e. PTT

d. public utilities commission

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design

d. ring design

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode

d. sits between IP at the network layer and TCP/UDP at the transport layer

Which of the following is not a main function within end user support? a. resolving network faults b. training c. resolving user problems d. spin control e. none of these answers are appropriate

d. spin control

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design

d. star design

Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS? a. stats on multiplexers b. stats on modems c. stats on circuits in the network d. stats on user response times e. stats on malfunctioning devices

d. stats on user response times

Which of the following are usually the first choice for eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. local cables owned by the organization d. wireless LANs e. fiber optics

d. wireless LANs

Which of the following is not a type of intrusion prevention system? a. network-based b. data link-based c. application-based d. host-based e. none of the above is an appropriate answer

data link-based

A _______ is a connectionless method of sending data packets on a packet switched service. a. bursty packet b. virtual circuit c. datagram d. histogram e. permanent virtual circuit

datagram

A ____________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users' messages from being processed. a. denial-of-service attack b. service level agreement c. virus d. spamming e. scamming

denial-of-service attack

A star topology is: a. difficult to manage because the central computer receives and routes all messages in the network b. dependent upon the capacity of the central computer for its performance c. always slower than a ring network d. less susceptible to traffic problems than other architectures e. not affected if the central computer fails

dependent upon the capacity of the central computer for its performance

An example of _____ of data would be if a computer virus eliminated files on that computer. a. disruption b. controlled chaos c. intrusion d. destruction e. disaster

destruction

________ controls discover unwanted events. a. preventive b. corrective c. detective d. mitigating e. backup

detective

A tornado that eliminates a network control center would be an example of a natural __________ a. disaster b. disruption c. controlled chaos d. destruction e. intrusion

disaster

Encryption is the process of: a. transmission of information over secure lines in analog form to prevent illegal access b. detecting errors in messages by means of mathematical rules c. correcting errors in message by means of mathematical rules d. disguising information by the use of mathematical rules, known as algorithms e. preventing errors in messages by means of logical rules

disguising information by the use of mathematical rules, known as algorithms

A network switch failure is an example of a(n) ________ threat. a. internal b. disruptive c. causal d. intrusion e. disaster

disruptive

A headend is also referred to as a: a. Abilene network b. WAP proxy c. cable modem d. distribution hub e. fiber node

distribution hub

The maximum download data rate for cable modem systems is currently a. 1 Mbps b. 1.44 Mbps c. 5 Mbps d. 100 Mbps e. 150 Mbps

e. 150 Mbps

___________ provides information about configuration management on a network. a. Circuit management software b. Device management software c. System management software d. Application management software e. Desktop management software

e. Desktop management software

The _________operates like the IETF through small research groups focused on specific issues. a. Internet Society b. University Corporation for Advanced Internet Development c. Internet Engineering Steering Committee d. Internet Architecture Board e. Internet Research Task Force

e. Internet Research Task Force

The closest the Internet has to an "owning" organization is the ___________. a. Internet Service Provider b. Abilene network c. CA*Net3 d. University Corporation for Advanced Internet Development e. Internet Society

e. Internet Society

Which of the following new Internet efforts was started by 34 universities? a. CA*net 3 b. ARDNOC c. vBNS d. NGI e. Internet2

e. Internet2

_____ is a criterion that keeps track of the number of hours or days of continuous operation before a component fails. a. MTTDiagnose b. MTTRespond c. MTTRepair d. MTTFix e. MTBF

e. MTBF

_______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions. a. Faulty b. Bursty c. Trouble tickets d. Voice-activated e. Managed devices

e. Managed devices

___________ allows the network manager to determine who is responsible for correcting any outstanding problems. a. Load balancing b. MTBF c. Availability d. Reliability e. Problem tracking

e. Problem tracking

Which of the following is not true about one-time passwords? a. Users' pagers can receive them. b. They can be used in conjunction with a token system. c. The user must enter the one-time password to gain access or the connection is terminated. d. This is a good security solution for users who travel frequently and who must have secure dial-in access. e. They create a packet level firewall on the system.

e. They create a packet level firewall on the system.

Technologies that provide higher-speed communications than traditional modems (e.g., DSL) are known as ______________ technologies. a. middleband b. narrowband c. rubberband d. metalband e. broadband

e. broadband

Documentation for network and application software: a. usually does not include information about the network operating system b. usually does not include information about any special purpose network software c. includes information about which data files each user can access d. is not generally needed since networks are comprised of hardware only e. is important for monitoring adherence to software license rules

e. is important for monitoring adherence to software license rules

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter

e. optical-electrical converter

Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time e. performing social engineering

e. performing social engineering

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices

e. unlocked wiring closet for network devices

A way to prevent intrusion by disguising information through algorithms is: a. spoofing b. call-back access c. encryption d. disk elevatoring e. disk mirroring

encryption

To snare intruders, many organizations now use _________ techniques. a. entrapment b. hacker c. Trojan horse d. cracker e. DES

entrapment

In a ring design WAN, a. failure in one circuit means that the network can most likely continue to function b. failure in one circuit always means that the network will cease to function c. failure in one computer always means that the network will cease to function d. failure in one circuit means that there will not be any increased traffic delays in the network e. failure in one computer always means that messages will stop at that computer since it would be impossible to re-route traffic

failure in one circuit means that the network can most likely continue to function

Which of the following type of media is least susceptible to eavesdropping? a. fiber optics b. twisted pair c. microwave d. infrared e. coaxial cable

fiber optics

A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network. a. firewall b. token system c. ANI d. call-back modem e. firefighter

firewall

IP spoofing means to: a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation c. illegally tape or listen in on telephone conversations d. detect and prevent denial-of-service attacks e. act as an intermediate host computer between the Internet and the rest of the organization's networks

fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network

In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits. a. full mesh design b. ring design c. star design d. bus design e. partial mesh design

full mesh design

A high-speed Internet has a set of access points called ____pops that provide point-of-presence at ________ speeds. a. giga, gigabit b. mega, megabit c. multi, multibit d. giga, megabit e. multi, gigabit

giga, gigabit

The use of hacking techniques to bring attention to a larger political or social goal is referred to as a. hacking b. ethical politics c. hacktivism d. social engineering e. brute force attacks

hacktivism

DSL get _____ from traditional phone line

high-speed data transmission

Another term for cable networks that use both fiber-optic and coaxial cable is __________. a. fixed wireless b. mobile wireless c. distribution hub d. hybrid fiber coax e. fibrax

hybrid fiber coax

Dynamic routing: a. imposes an overhead cost by increasing network traffic b. decreases performance in networks which have many possible routes c. decreases performance in networks with "bursty" traffic d. should be used in 80 to 90 percent of total networks' capacity e. is another term for static routing in WANs

imposes an overhead cost by increasing network traffic

In recent years, management's concern about the adequacy of current control and security mechanisms used in a data communications environment has: a. decreased because the new sophisticated technology is far more secure than the old manual methods b. remained the same because management was always deeply interest in control and security c. decreased because of the change in moral and ethical codes in the U.S. to a kinder and gentler society d. increased because this commitment to data communications has changed the potential vulnerability of the organization's assets e. remained the same because there are very few threats to data communications

increased because this commitment to data communications has changed the potential vulnerability of the organization's assets

A hacker gaining access to organizational data files and resources is an example of a(n) ____________ threat. a. disruptive b. controlled chaos c. disruptive d. intrusion e. disaster

intrusion

Often, incidents of ___________ involve employees of the organization, surprisingly enough. a. intrusion b. disruption c. controlled chaos d. destruction e. disaster

intrusion

DES: a. is maintained by ISO b. refers to Date Electronic Security c. is a commonly used symmetric encryption algorithm that was developed in the mid-1970s d. was developed by a joint effort that included Microsoft e. is an asymmetric algorithm

is a commonly used symmetric encryption algorithm that was developed in the mid-1970s

Primary rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 128Kbps e. is comprised of analog circuits only

is typically offered only to commercial customers

A __________ separates traditional voice telephone transmission from the data transmissions in the equipment located at the customer site for DSL. a. line splitter b. V.32bis modem c. line analyzer d. main distribution frame e. network access point

line splitter

The _________ is the connection from a home or business to the telephone company end office. a. distribution hub b. RFC c. UCAID d. local loop e. CA*net 3

local loop

Which of the following is a primary advantage of a VPN? a. low cost b. inflexibility c. unpredictable traffic congestion d. security e. complexity to the user

low cost

In a DSL environment, local loops from many customers enter and are connected to the a. central office b. computer center c. main central office d. main distribution center e. rack

main distribution center

A security hole is a(n): a. malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users b. small peep-hole in a door or wall to allow a security guard to examine an individual before allowing that individual access to a secure area or location c. packet-level firewall d. missing or absent protected mode addressing restrictions on user programs during multitasking or multithreaded program execution e. ANI system

malfunction or bug in an application program that allows data to be seen or accessed by unauthorized users

In a ring design WAN, a. messages can take a long time to travel from the sender to the receiver b. a message arrives at all computers on the network simultaneously c. messages always arrive faster than in other types of layouts d. messages are delivered directly from sender to receiver because there is a point-to-point connection directly between each sender and each receiver e. messages always take one second to travel between sender and receiver

messages can take a long time to travel from the sender to the receiver

A(n) ____________, is an information system that is critical to the survival of an organization. a. network plan b. accounting system c. IDS d. mission critical application e. firewall

mission critical application

Which of the following is not a way to reduce network demand? a. shifting network usage from high cost times to lower cost times b. using data compression techniques for all data in the network c. requiring a network impact statement for all application software developed by the organization d. moving data further from the applications and people who use them e. shifting network usage from peak to lower demand times

moving data further from the applications and people who use them

According to Symantec, more than 50% of all targeted companies had fewer than 2,500 employees because they a. often have weaker security. b. have more assets. c. are more likely to have credit card numbers available. d. are likely off-shore. e. have lower bandwidth

often have weaker security.

A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side. a. CA*net 3 b. RFC c. WAP proxy d. fixed wireless connection e. optical-electrical converter

optical-electrical converter

A _____________ is a user's connection into a packet switched service. a. packet analog/digital device b. packet asynchronous/discrete device c. packet asymmetric/data transmission device d. packet assembly/disassembly device e. packet analyzer/decoder device

packet assembly/disassembly device

A(n) ____________ examines the source and destination address of every network packet that passes through it. a. packet level firewall b. mullion server c. ANI system d. IP spoofing system e. application level firewall

packet level firewall

Which of the following type of networks permit packets from separate messages to be interleaved? a. circuit switched network b. dedicated circuit network c. dial up circuit network d. packet switched network e. Fractional T-1 network

packet switched network

Which of the following is not a method for deterring intrusion? a. training end users not to divulge passwords b. using a smart card in conjunction with a password to gain access to a computer system c. using biometric devices to gain access to a computer system d. using a security software package that logs out users if that user is 'idle' for a certain amount of time e. performing social engineering

performing social engineering

A _________ is a connection-oriented approach to sending packets on a packet switched service. a. permanent virtual circuit b. datagram c. histogram d. bursty packet e. fractional T-1 network

permanent virtual circuit

A _________ is the place at which the ISP provides services to its customers. a. remote access point b. network access point c. cable modem termination system endpoint d. point-of-presence e. metropolitan area exchange

point-of-presence

Which of the following is not a key issue to be considered when selecting a WAN service? a. prestige value of using a particular common carrier b. flexibility c. capacity d. control e. reliability

prestige value of using a particular common carrier

_________ controls stop a person from acting. a. detective b. corrective c. mitigating d. preventive e. backup

preventive

Basic rate interface: a. is typically offered only to commercial customers b. provides a communications circuit with two 64 Kbps B channels, plus one D channel c. is defined exactly the same way in Europe d. has an upper capacity of 1.544 Mbps e. is comprised of analog circuits only

provides a communications circuit with two 64 Kbps B channels, plus one D channel

The key principle in preventing disruption, destruction and disaster is ___________. a. redundancy b. control spreadsheet c. IDS d. anti-virus software e. prevention controls

redundancy

A ___________ is used by ISPs to authenticate its customers. a. password server b. remote-access server. c. file server d. WAP server. e. Web server

remote-access server.

Mesh networks: a. usually provide relatively long routes through the network (compared to ring networks) b. require more processing by each computer in the network than in star or ring networks c. do not use decentralized routing d. do not have much capacity wasted by network status information e. do not have many possible routes through the network to prevent one circuit from becoming overloaded

require more processing by each computer in the network than in star or ring networks

Firewalls

restrict access to the network also function as routers, or vice-versa

A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits. a. bus design b. star design c. full mesh design d. ring design e. partial mesh design

ring design

A ___________ assigns levels of risk to various threats to network security by comparing the nature of the threats to the controls designed to reduce them. a. risk assessment b. backplane c. mitigating control factor analysis d. control verification worksheet e. control test plan

risk assessment

We can calculate the relative ___________, by multiplying the impact score by the likelihood. a. rootkit b. authentication c. risk score d. risk assessment e. risk event

risk score

For Ethernet networks, a _______ switch can make eavesdropping more difficult. a. secure b. Trojan horse c. proxy d. spoofing e. spamming

secure

Once the perimeter and interior of a network have been secured - we must .....

secure the user authentication

IP Security Protocol: a. is focused on Web applications b. is primarily used to encrypt e-mail c. is a policy which makes public key encryption work on the Internet d. sits between IP at the network layer and TCP/UDP at the transport layer e. operates in entrapment mode

sits between IP at the network layer and TCP/UDP at the transport layer

A _______ geometric layout for a WAN connects all computers to one central computer that routes messages to the appropriate computer, usually via a series of point-to-point dedicated circuits. a. ring design b. mesh design c. bus design d. star design e. mesh design

star design

Content Caching

storing external web data locally

A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization. a. asset b. service level agreement c. threat d. security plan e. network design

threat

A brute force attack against an encryption system: a. tries to gain access by trying every possible key b. is called RC4 c. is also known as 3DES d. always uses the Rijndael algorithm e. is part of the Advanced Encyrption Standard

tries to gain access by trying every possible key

Which of the following is a mode that is used by IPSec? a. exchange b. sniffer c. tunnel d. creeper e. firefighter

tunnel

With a virtual private network, users create permanent virtual circuits through the Internet called: a. bursts b. cells c. tunnels d. rings e. clouds

tunnels

A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption. a. network cloaking device b. backup punch card reader c. uninterruptible power supply d. service level agreement e. help desk

uninterruptible power supply

Which of the following is not a method for deterring outside intruders from gaining access to the organization's office or network equipment facilities? a. locks on network circuits after working hours b. passwords that disable the screen and keyboard of a computer c. secured network cabling behind walls and above ceilings d. use of armored cable e. unlocked wiring closet for network devices

unlocked wiring closet for network devices

The performance of WANs can be improved by: a. upgrading the circuits between the computers b. increasing the demand placed on the network c. downgrading the circuits between the computers d. downgrading the devices that provide access to the circuits e. increasing network traffic

upgrading the circuits between the computers

SONET: a. is a standard for optical transmission that currently operates at Terabit per second speeds b. is very similar to the ITU-T standard, synchronous digital hierarchy c. uses inverse multiplexing above the OC-1 level d. refers to Sprint Overall Network e. is not currently available, even in large cities

uses inverse multiplexing above the OC-1 level

A _______________ is a particular type of network that uses circuits that run over the Internet but that appears to the user to be a private network. a. local carrier network b. virtual private network c. integrated service digital network d. software defined network e. SONET network

virtual private network

Which of the following are usually the first choice for eavesdropping? a. unshielded twisted pair b. shielded twisted pair c. local cables owned by the organization d. wireless LANs e. fiber optics

wireless LANs

A (n) ______ is a special type of virus that spreads itself without human intervention. a. snake b. worm c. Trojan horse d. boot sector virus e. stealth virus

worm


Related study sets

Test Mathematics 800 Fundamentals Unit 5 MORE WITH FUNCTIONS

View Set

Special Topics: Human Resources test 1 (ch 1-5)

View Set

HIM 403 Healthcare Stats & Research Unit 9

View Set