ITN 100

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
full-widthPodcast
1
Card Sorting

1/123

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 11:09 PM on 12/15/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

124 Terms

1
New cards

Question 1 – Today, the most expensive part of the network is the hardware.

False

2
New cards

Question 2 – Today, many organizations design networks using the building-block approach.

True

3
New cards

Question 3 – The primary goal of the needs analysis step in network design is to develop a physical network design.

False

4
New cards

Question 4 – Simulation is a tool that can be used in designing networks.

True

5
New cards

Question 5 – Cost assessment is the step in the network design in which many complex factors related to costs are documented.

True

6
New cards

Question 6 – When obtaining the support of senior management for a proposed network, it is important to use as much technical network jargon as possible.

False

7
New cards

Question 7 – The campus backbone is usually faster than the backbones used inside buildings.

True

8
New cards

Question 8 – In the technology design stage of network design:

the decisions for fundamental technology/protocols and circuit capacity are interrelated

9
New cards

Question 9 – refers to the amount of data transmitted on a circuit.

Circuit loading

10
New cards

Question 10 – STP cable is least costly type of cable used in today’s networks and is the most commonly used cable type in connecting computers to switches.

False

11
New cards

For Ethernet example (100Base-T), what are its speed, transmission, and structure?

Speed: 100\text{ Mbps}, Transmission: baseband, Structure: twisted-pair

12
New cards

What are ways to improve LAN performance?

Upgrade switches, segment traffic, increase bandwidth, reduce collisions

13
New cards

What do war-chalking, war-driving, and war-walking refer to?

Methods of discovering wireless networks

14
New cards

Compare Switched vs Wireless Ethernet.

Switched: faster, secure, dedicated; Wireless: mobile, shared, flexible

15
New cards

What are three IEEE 802.11 types?

802.11b (legacy), 802.11g (mixed), 802.11n/ac (high speed)

16
New cards

Question 16 – The Ethernet standard was first developed by the IEEE.

False

17
New cards

Question 17 – Physical topology refers to the geometric layout of the network and describes how the computers are interconnected.

True

18
New cards

Question 18 – A collision on a bus circuit means that two computers on that circuit have transmitted at the same time.

True

19
New cards

Question 19 – The three latest versions of Ethernet run at speeds of 1\text{Gbps}, 10\text{Gbps}, and 50\text{Gbps}.

False

20
New cards

Question 20 – 1000Base-LX is a version of 1000Base-T than runs on four pairs of CAT 5 cable.

False

21
New cards

Question 21 – A switch always broadcasts all the packets it receives to all the computers that are connected to the switch.

False

22
New cards

Question 22 – A backbone network that connects many backbone networks spanning several buildings at a single location is often called an Internet backbone.

False

23
New cards

Question 23 – One basic component of a backbone network is the hardware device that connects other networks to the backbone.

True

24
New cards

Question 24 – Layer-3 switches switch messages based only on their data link layer address.

False

25
New cards

Question 25 – Routed backbones use switches that move packets based on data link layer addresses.

False

26
New cards

Question 26 – A key advantage of a chassis switch is its flexibility.

True

27
New cards

Question 27 – A VLAN network assigns computers to LAN segments by hardware.

False

28
New cards

Question 28 – Switches:

learn addresses by reading the source and destination addresses

29
New cards

Question 29 – Routers:

may also be called TCP/IP gateways

30
New cards

Question 30 – Which of the following would be least effective in improving backbone performance?

adding new keyboards to the client computers

31
New cards

Question 31 – Circuit capacity on a backbone network will not be improved by:

going from 100\text{Base-T} Ethernet to 10\text{Base-T} Ethernet

32
New cards

Question 32 – Which of the following would not be part of an “ideal” backbone design?

coax cabling throughout LANs and BN

33
New cards

Question 33 – The backbone architecture layer that is closest to the users is the:

Access layer

34
New cards

Question 34 – Common carriers sell or lease communication services and facilities to the public.

True

35
New cards

Question 35 – Today, a common carrier that provides long distance services is typically called a local exchange carrier.

False

36
New cards

Question 36 – T carrier circuits can only be used to transmit voice.

False

37
New cards

Question 37 – A T1 circuit provides a data rate of 1.544\text{Mbps}.

True

38
New cards

Question 38 – Frame relay is a reliable packet service.

False

39
New cards

Question 39 – The data rate for a T-3 circuit in North America is:

274.176\text{ Mbps}

40
New cards

Question 40 – Which of the following type of networks permit packets from separate messages to be interleaved?

packet switched network

41
New cards

Question 41 – A is a connectionless method of sending data packets on a packet switched service.

datagram

42
New cards

Question 42 – A ** is a connection-oriented approach to sending packets on a packet switched service.

permanent virtual circuit

43
New cards

Question 43 – **** are sometimes called private line services.

Dedicated-circuit networks

44
New cards

Question 44 – is sometimes called a Layer 2.5 technology.

MPLS

45
New cards

Question 45 – The Internet is one large network.

False

46
New cards

Question 46 – Each of the networks in Internet 2 has a set of access points called terapops.

False

47
New cards

Question 47 – At the top of the Internet structure are tier 1 ***, such as AT&T and Sprint.

Internet service providers

48
New cards

Question 48 – ** has led to the belief that the Internet is “free”.

Peering

49
New cards

Question 49 – refers to the fact that ISPs do not charge one another (at the same level) for transferring messages they exchange across an NAP or MAE.

Peering

50
New cards

Question 50 – A is the place at which the ISP provides services to its customers.

point-of-presence

51
New cards

Question 51 – In general, tier 3 ISPs make money by charging .

Customers

52
New cards

Question 52 – The is the connection from a home or business to the telephone company end office.

Local loop

53
New cards

Question 53 – At the DSL customer premises is a device called a(n)

DSL modem

54
New cards

Question 54 – A cable company headend is also referred to as a:

Distribution hub

55
New cards

Question 55 – Fiber to the Home uses:

wavelength division multiplexing

56
New cards

Question 56 – Confidentiality refers to the protection of the organizational data from unauthorized disclosure of customer and proprietary data.

True

57
New cards

Question 57 – Corrective controls reveal or discover unwanted events.

False

58
New cards

Question 58 – We can calculate the relative , by multiplying the impact score by the likelihood.

risk score

59
New cards

Compare DES vs public key encryption.

DES is symmetric; public key is asymmetric

60
New cards

What is asymmetric encryption?

Uses public/private key pair

61
New cards

What do network-, host-, and application-based IPS protect?

Protect network, device, or specific application

62
New cards

What are three risk frameworks?

NIST, ISO 27001, COBIT

63
New cards

What are four risk control strategies?

Avoid, mitigate, transfer, accept

64
New cards

Question 64 – An uninterruptible power supply utilizes a second redundant disk for every disk on the server.

False

65
New cards

Question 65 – Disk mirroring writes duplicate copies of all data on at least two different disks.

True

66
New cards

Question 66 – Fault-intolerant servers contain many redundant components to prevent failure.

False

67
New cards

Question 67 – Crackers are casual hackers with a limited knowledge of computer security.

False

68
New cards

Question 68 – If managers do not pay enough attention to planning and organizing the network, they are going to end up being proactive vs. reactive in solving network problems.

False

69
New cards

Question 69 – Due to changing communication technologies, most companies have combined voice and data communications functions.

True

70
New cards

Question 70 – Network management software is designed primarily to provide automated support for at least some of the network management functions.

True

71
New cards

Question 71 – Which of the following is not considered a key management task for running a network?

knowledge of frame relay

72
New cards

Question 72 – refers to managing and documenting the network’s hardware and software configuration.

Configuration management

73
New cards

Question 73 – Which of the following is typically not a part of configuration documentation?

sales brochures for new hardware products being considered by the organization

74
New cards

Question 74 – Documentation for network and application software:

is important for monitoring adherence to software license rules

75
New cards

Question 75 – ensures that the network is operating as efficiently as possible.

Performance management

76
New cards

Question 76 – Which of the following would not be included as part of the physical network parameter statistics monitored by a NMS?

stats on user response times

77
New cards

Question 77 – Network devices that are * do only what they are designed to do, such as routing packets, but do not provide any network management information.

dumb

78
New cards

Question 78 – * are network devices that record data on the messages they process as well as performing their “normal” message processing functions.

Managed devices

79
New cards

Question 79 – are reports produced by numerous network software packages for recording fault information.

Trouble tickets

80
New cards

Question 80 – allows the network manager to determine who is responsible for correcting any outstanding problems.

Problem tracking

81
New cards

Question 81 – Network managers manage the configuration management of their networks as one of their key tasks.

True

82
New cards

Question 82 – The term “firefighting” is used to describe a situation where network managers spend all of their time dealing with breakdowns and immediate problems and do not have time to plan and organize properly.

True

83
New cards

Question 83 – To help in negotiating site licenses for software, it is important to document which software packages are installed on each client.

True

84
New cards

Question 84 – User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user.

True

85
New cards

Question 85 – Trouble tickets are reports produced by a software package that records fault information.

True

86
New cards

Question 86 – To ensure that critical problems get priority over less important ones, problem prioritizing is needed in a network.

True

87
New cards

Question 87 – Management reports can be helpful in determining network availability statistics.

True

88
New cards

Question 88 – Network management software is designed primarily to provide automated support for at least some of the network management functions.

True

89
New cards

Question 89 – is when network managers deal with network breakdowns and immediate problems, instead of performing tasks according to a well laid out plan.

Firefighting

90
New cards

Question 90 – Which of the following is not a basic function of a network manager?

web surfing to shop on eBay

91
New cards

Question 91 – is also called automatic software distribution.

Desktop management

92
New cards

Question 92 – Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

True

93
New cards

Question 93 – The rise of the Internet has increased significantly the potential vulnerability of an organization’s assets.

True

94
New cards

Question 94 – is the most commonly used central authentication protocol.

Kerberos

95
New cards

Question 95 – RAID1 writes duplicate copies of all data on at least two different disks; this means that if one disk in the RAID array fails, there is no data loss because there is a second copy of the data stored on a different disk. This is referred to as *

disk mirroring

96
New cards

Question 96 – A * uses an address table to translate the private IP addresses used inside the organization into proxy IP addresses used on the Internet.

NAT proxy server

97
New cards

What are 8 threats & solutions?

Hardware, software, users, physical, etc. + controls

98
New cards

What is a Trojan horse?

Malware disguised as legitimate software

99
New cards

What is symmetric encryption & algorithms?

Same key; DES < 3DES < AES

100
New cards

What is social engineering?

Manipulating people to gain access