1/123
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Question 1 – Today, the most expensive part of the network is the hardware.
False
Question 2 – Today, many organizations design networks using the building-block approach.
True
Question 3 – The primary goal of the needs analysis step in network design is to develop a physical network design.
False
Question 4 – Simulation is a tool that can be used in designing networks.
True
Question 5 – Cost assessment is the step in the network design in which many complex factors related to costs are documented.
True
Question 6 – When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible.
False
Question 7 – The campus backbone is usually faster than the backbones used inside buildings.
True
Question 8 – In the technology design stage of network design:
the decisions for fundamental technology/protocols and circuit capacity are interrelated
Question 9 – refers to the amount of data transmitted on a circuit.
Circuit loading
Question 10 – STP cable is least costly type of cable used in today’s networks and is the most commonly used cable type in connecting computers to switches.
False
For Ethernet example (100Base-T), what are its speed, transmission, and structure?
Speed: 100\text{ Mbps}, Transmission: baseband, Structure: twisted-pair
What are ways to improve LAN performance?
Upgrade switches, segment traffic, increase bandwidth, reduce collisions
What do war-chalking, war-driving, and war-walking refer to?
Methods of discovering wireless networks
Compare Switched vs Wireless Ethernet.
Switched: faster, secure, dedicated; Wireless: mobile, shared, flexible
What are three IEEE 802.11 types?
802.11b (legacy), 802.11g (mixed), 802.11n/ac (high speed)
Question 16 – The Ethernet standard was first developed by the IEEE.
False
Question 17 – Physical topology refers to the geometric layout of the network and describes how the computers are interconnected.
True
Question 18 – A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.
True
Question 19 – The three latest versions of Ethernet run at speeds of 1\text{Gbps}, 10\text{Gbps}, and 50\text{Gbps}.
False
Question 20 – 1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable.
False
Question 21 – A switch always broadcasts all the packets it receives to all the computers that are connected to the switch.
False
Question 22 – A backbone network that connects many backbone networks spanning several buildings at a single location is often called an Internet backbone.
False
Question 23 – One basic component of a backbone network is the hardware device that connects other networks to the backbone.
True
Question 24 – Layer-3 switches switch messages based only on their data link layer address.
False
Question 25 – Routed backbones use switches that move packets based on data link layer addresses.
False
Question 26 – A key advantage of a chassis switch is its flexibility.
True
Question 27 – A VLAN network assigns computers to LAN segments by hardware.
False
Question 28 – Switches:
learn addresses by reading the source and destination addresses
Question 29 – Routers:
may also be called TCP/IP gateways
Question 30 – Which of the following would be least effective in improving backbone performance?
adding new keyboards to the client computers
Question 31 – Circuit capacity on a backbone network will not be improved by:
going from 100\text{Base-T} Ethernet to 10\text{Base-T} Ethernet
Question 32 – Which of the following would not be part of an “ideal” backbone design?
coax cabling throughout LANs and BN
Question 33 – The backbone architecture layer that is closest to the users is the:
Access layer
Question 34 – Common carriers sell or lease communication services and facilities to the public.
True
Question 35 – Today, a common carrier that provides long distance services is typically called a local exchange carrier.
False
Question 36 – T carrier circuits can only be used to transmit voice.
False
Question 37 – A T1 circuit provides a data rate of 1.544\text{Mbps}.
True
Question 38 – Frame relay is a reliable packet service.
False
Question 39 – The data rate for a T-3 circuit in North America is:
274.176\text{ Mbps}
Question 40 – Which of the following type of networks permit packets from separate messages to be interleaved?
packet switched network
Question 41 – A is a connectionless method of sending data packets on a packet switched service.
datagram
Question 42 – A ** is a connection-oriented approach to sending packets on a packet switched service.
permanent virtual circuit
Question 43 – **** are sometimes called private line services.
Dedicated-circuit networks
Question 44 – is sometimes called a Layer 2.5 technology.
MPLS
Question 45 – The Internet is one large network.
False
Question 46 – Each of the networks in Internet 2 has a set of access points called terapops.
False
Question 47 – At the top of the Internet structure are tier 1 ***, such as AT&T and Sprint.
Internet service providers
Question 48 – ** has led to the belief that the Internet is “free”.
Peering
Question 49 – refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.
Peering
Question 50 – A is the place at which the ISP provides services to its customers.
point-of-presence
Question 51 – In general, tier 3 ISPs make money by charging .
Customers
Question 52 – The is the connection from a home or business to the telephone company end office.
Local loop
Question 53 – At the DSL customer premises is a device called a(n)
DSL modem
Question 54 – A cable company headend is also referred to as a:
Distribution hub
Question 55 – Fiber to the Home uses:
wavelength division multiplexing
Question 56 – Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.
True
Question 57 – Corrective controls reveal or discover unwanted events.
False
Question 58 – We can calculate the relative , by multiplying the impact score by the likelihood.
risk score
Compare DES vs public key encryption.
DES is symmetric; public key is asymmetric
What is asymmetric encryption?
Uses public/private key pair
What do network-, host-, and application-based IPS protect?
Protect network, device, or specific application
What are three risk frameworks?
NIST, ISO 27001, COBIT
What are four risk control strategies?
Avoid, mitigate, transfer, accept
Question 64 – An uninterruptible power supply utilizes a second redundant disk for every disk on the server.
False
Question 65 – Disk mirroring writes duplicate copies of all data on at least two different disks.
True
Question 66 – Fault-intolerant servers contain many redundant components to prevent failure.
False
Question 67 – Crackers are casual hackers with a limited knowledge of computer security.
False
Question 68 – If managers do not pay enough attention to planning and organizing the network, they are going to end up being proactive vs. reactive in solving network problems.
False
Question 69 – Due to changing communication technologies, most companies have combined voice and data communications functions.
True
Question 70 – Network management software is designed primarily to provide automated support for at least some of the network management functions.
True
Question 71 – Which of the following is not considered a key management task for running a network?
knowledge of frame relay
Question 72 – refers to managing and documenting the network’s hardware and software configuration.
Configuration management
Question 73 – Which of the following is typically not a part of configuration documentation?
sales brochures for new hardware products being considered by the organization
Question 74 – Documentation for network and application software:
is important for monitoring adherence to software license rules
Question 75 – ensures that the network is operating as efficiently as possible.
Performance management
Question 76 – Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS?
stats on user response times
Question 77 – Network devices that are * do only what they are designed to do, such as routing packets, but do not provide any network management information.
dumb
Question 78 – * are network devices that record data on the messages they process as well as performing their “normal” message processing functions.
Managed devices
Question 79 – are reports produced by numerous network software packages for recording fault information.
Trouble tickets
Question 80 – allows the network manager to determine who is responsible for correcting any outstanding problems.
Problem tracking
Question 81 – Network managers manage the configuration management of their networks as one of their key tasks.
True
Question 82 – The term “firefighting” is used to describe a situation where network managers spend all of their time dealing with breakdowns and immediate problems and do not have time to plan and organize properly.
True
Question 83 – To help in negotiating site licenses for software, it is important to document which software packages are installed on each client.
True
Question 84 – User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user.
True
Question 85 – Trouble tickets are reports produced by a software package that records fault information.
True
Question 86 – To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network.
True
Question 87 – Management reports can be helpful in determining network availability statistics.
True
Question 88 – Network management software is designed primarily to provide automated support for at least some of the network management functions.
True
Question 89 – is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan.
Firefighting
Question 90 – Which of the following is not a basic function of a network manager?
web surfing to shop on eBay
Question 91 – is also called automatic software distribution.
Desktop management
Question 92 – Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
True
Question 93 – The rise of the Internet has increased significantly the potential vulnerability of an organization’s assets.
True
Question 94 – is the most commonly used central authentication protocol.
Kerberos
Question 95 – RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as *
disk mirroring
Question 96 – A * uses an address table to translate the private IP addresses used inside the organization into proxy IP addresses used on the Internet.
NAT proxy server
What are 8 threats & solutions?
Hardware, software, users, physical, etc. + controls
What is a Trojan horse?
Malware disguised as legitimate software
What is symmetric encryption & algorithms?
Same key; DES < 3DES < AES
What is social engineering?
Manipulating people to gain access