Term
A network is a system that permits networked applications on different hosts to work together. |
|
Definition
|
|
Term
Which of the following is a host when it is on a network? |
|
Definition
|
|
Term
In terminal-host processing, processing is done on both the terminal and the server. |
|
Definition
|
|
Term
In client/server processing, processing is done on the ________. |
|
Definition
|
|
Term
In P2P applications, most processing is done on the ________. |
|
Definition
|
|
Term
Network speeds usually are measured in ________. |
|
Definition
|
|
Term
|
Definition
|
|
Term
Which of the following uses packet switching? |
|
Definition
Neither Dial-up telephone circuits nor Leased line circuits |
|
|
Term
Which type of circuit typically operates at faster speeds? |
|
Definition
|
|
Term
Using reserved capacity, the data transmission speed for a voice conversation remains constant regardless of how many people are using the system at the same time. |
|
Definition
|
|
Term
Circuits are reasonably efficient for ________ transmission. Answer |
|
Definition
|
|
Term
Which of the following is true? |
|
Definition
All binary signaling is digital signaling. |
|
|
Term
Which of the following has greater resistance to transmission errors? |
|
Definition
|
|
Term
A modem converts original ________ signals to ________ signals that can be transmitted through the telephone system. |
|
Definition
|
|
Term
Breaking down a message into many packets is done on the _______ while the reassembly of packets into a message is done on the |
|
Definition
source host, destination host |
|
|
Term
Multiplexing reduces transmission cost. |
|
Definition
|
|
Term
For bursty data, packet switching is desirable because it ________. |
|
Definition
makes transmission more efficient |
|
|
Term
When a switch receives a packet, the switch selects the ________. |
|
Definition
port to send the packet out |
|
|
Term
A ________ is the path that a frame takes across a single switched network. |
|
Definition
|
|
Term
When a frame passes through seven switches between the source and destination hosts (no routers), the number of physical links is ______; the number of data links is ____. |
|
Definition
|
|
Term
What device connects different networks into an internet? |
|
Definition
|
|
Term
The creation of internetworking required the introduction of two addresses for each host. |
|
Definition
|
|
Term
When two hosts are separated by seven networks, the number of packets along the way when a host transmits a packet to another host is _________, while the number of frames is ________. |
|
Definition
|
|
Term
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches. Answer |
|
Definition
|
|
Term
Which network standard governs the hop-by-hop (a hop is host to router or router to router) transmission of packets across an internet |
|
Definition
|
|
Term
________ are carried inside ________. |
|
Definition
|
|
Term
Which network standard deals with addresses and functionality for routers to move packets across an Internet? |
|
Definition
|
|
Term
Which transport standard places packets that arrive out of order in order? Answe |
|
Definition
|
|
Term
|
Definition
|
|
Term
Different ISPs interconnect at ________. |
|
Definition
Network access points (NAP) |
|
|
Term
Which protocol provides a client PC with its dynamic IP address? Answer |
|
Definition
The Dynamic Host Configuration Protocol (DHCP). |
|
|
Term
When your PC requests an IP address from a DNS (Domain Name System), the DNS responds with a message containing the IP address of __________. Answer |
|
Definition
the host your trying to reach |
|
|
Term
A Home Networking Wireless Access Point contains a DHCP server. Answer |
|
Definition
|
|
Term
Another way of refering to the World Wide Web is: |
|
Definition
The internet, an internet AND a network of networks |
|
|
Term
A network that runs on the customer premises is a ________. Answer |
|
Definition
|
|
Term
Your ISP gives your home a single IP address. What in the access point allows you to have multiple private IP addresses for multiple devices to share the single public IP address? |
|
Definition
|
|
Term
The _____ contains the content to be delivered by a message. |
|
Definition
|
|
Term
In TCP, which process decides whether to retransmit a lost or damaged segment—the original sender or the receiver? Answer |
|
Definition
|
|
Term
Protocols such as TCP have explicit openings and closings. These types of protocols are referred to as |
|
Definition
Connection-oriented protools |
|
|
Term
Dividing a message into a series of smaller messages is called _____. |
|
Definition
|
|
Term
A network _____ is a broad plan that specifies everything necessary for two application programs on different networks on an internet to be able to work together effectively. |
|
Definition
|
|
Term
How many data links will there be if a frame passes from a computer through two switches, then through a router, then through two more switches, and then to the destination computer? |
|
Definition
|
|
Term
Which layer governs end-to-end transmission between two hosts across an internet? |
|
Definition
|
|
Term
The transport layer normally fixes errors that occur at the _____ layer. Answer |
|
Definition
|
|
Term
"Octet" is another name for: Answer |
|
Definition
|
|
Term
Routers make packet forwarding decisions based on a packet’s _____. Answer |
|
Definition
|
|
Term
Which of the following places a heavier burden on the internet? |
|
Definition
|
|
Term
Novell NetWare servers traditionally used _____ standards. |
|
Definition
|
|
Term
The side wishing to close a TCP segment sends a(n) ________ segment. |
|
Definition
|
|
Term
Ethernet or MAC addresses are ________. |
|
Definition
|
|
Term
In an Ethernet frame, the IP packet is carried in the ________ field. |
|
Definition
|
|
Term
|
Definition
Both UDP headers and TCP headers |
|
|
Term
UDP checks messages for errors but does not correct them. UDP is ________. |
|
Definition
|
|
Term
What is the well-known port number for HTTP? |
|
Definition
|
|
Term
At which layer would you find file transfer protocol (FTP) standards for downloading files? |
|
Definition
|
|
Term
Converting application messages into bits is called ________. |
|
Definition
|
|
Term
Character data is represented using binary numeric values converted using the |
|
Definition
|
|
Term
Floating Point Numbers are stored in binary using |
|
Definition
|
|
Term
When two hosts communicate over the network, they sending and receiving |
|
Definition
|
|
Term
Which phase of the plan-protect-respond cycle requires the largest amount of work by organizations? Answer |
|
Definition
|
|
Term
Malware is a generic name for evil software. |
|
Definition
|
|
Term
Users typically can eliminate a vulnerability in one of their programs (such as an operating system) by ________. |
|
Definition
|
|
Term
Firewalls can usually prevent viruses from entering your system or network. Answer |
|
Definition
|
|
Term
Which of the following attach themselves to other programs? |
|
Definition
|
|
Term
Which of the following can thwart directly-propagating worms? |
|
Definition
|
|
Term
Scripts (Mobile Code) may execute software when a webpage is downloaded. Answer |
|
Definition
|
|
Term
Malware programs that masquerade as system files are called ________. |
|
Definition
|
|
Term
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________. |
|
Definition
|
|
Term
An unauthorized program running on a computer that can capture passwords as you type them is ________. |
|
Definition
|
|
Term
A Trojan horse that sorts through files on the victim's computer to look for useable information is called ________. |
|
Definition
|
|
Term
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________. |
|
Definition
|
|
Term
DoS (Denial of Service) attacks attempt to ________. |
|
Definition
reduce the availability of a computer (such as a server) |
|
|
Term
Attack programs that can be remotely controlled by an attacker are ________. |
|
Definition
|
|
Term
Which type of employees must an organization be most concerned about protecting against with regards to securing the organization's networks? |
|
Definition
IT and IT security staff members. |
|
|
Term
What type of attacker is the U.S. Department of Defense most concerned about doing damage to their networks? |
|
Definition
|
|
Term
What type of hacker are most corporations most vulnerable to when it comes to doing damage to their networks? |
|
Definition
|
|
Term
Balancing threats against protection costs is called ________. |
|
Definition
|
|
Term
Suppose that an attack would do $100,000 in damage and has a 15 percent annual probability of success. Spending $8,000 on “Measure A” would cut the annual probability of success by 75 percent. Should the company spend the money? Answer |
|
Definition
|
|
Term
Suppose that an attack would do $100,000 in damage and has a 15 percent annual probability of success. Spending $20,000 on “Measure B” would cut the annual probability of success by 75 percent. Should the company spend the money? |
|
Definition
|
|
Term
The goal of security is to eliminate risk. |
|
Definition
|
|
Term
Attackers only need to find a single weakness to break in. Consequently, companies must ________. |
|
Definition
engineer security in when designing the networks |
|
|
Term
An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. |
|
Definition
|
|
Term
Defining actions that people are allowed to take with regards to specific resources are described under the heading of ________. |
|
Definition
|
|
Term
In general, people who receive access to a resource should be given maximum permissions so that they can do their jobs with the fewest delays or restrictions. |
|
Definition
|
|
Term
Security Oversight activities include ________. |
|
Definition
|
|
Term
Requiring someone requesting to use a resource to prove his or her identity is ________. |
|
Definition
|
|
Term
Passwords are widely used because ________. |
|
Definition
they can be used at no additional cost |
|
|
Term
A password that can be broken by a dictionary attack or a dictionary attack in hybrid mode can be adequately strong if it is very long. |
|
Definition
|
|
Term
A password cracking attack that tries all combinations of keyboard characters is called a ________. |
|
Definition
|
|
Term
Biometrics is the use of body measurements to authenticate you. Answer |
|
Definition
|
|
Term
Which of the following is a criteria by which biometrics can be judged? |
|
Definition
Both cost and susceptibility to deception |
|
|
Term
Fingerprint scanning may be an acceptable access control method for ordinary laptops. Answer |
|
Definition
|
|
Term
Iris scanning is attractive because of its ________. |
|
Definition
low susceptibility to deception |
|
|
Term
In digital certificate authentication, the supplicant does a calculation with ________. |
|
Definition
the supplicant's private key |
|
|
Term
In digital certificate authentication, the verifier uses ________. |
|
Definition
the true party's public key |
|
|
Term
The digital certificate provides the ________. |
|
Definition
public key of the true party |
|
|
Term
Security threats can come from which of the following? |
|
Definition
|
|
Term
Human users of computers and networks are often more vulnerable to manipulations that compromise security than the technological vulnerablilities of the computers and networks. |
|
Definition
|
|
Term
Hackers probe known port numbers on computers during probing scans to |
|
Definition
Search for vulnerable applications |
|
|
Term
Performing an in-depth inventory of the current state of the company's network is called ________. |
|
Definition
|
|
Term
QoS is quantified through ________. |
|
Definition
|
|
Term
Which of the following speeds is written properly? |
|
Definition
|
|
Term
|
Definition
the speed a network actually provides to users |
|
|
Term
Which of the following usually has higher availability? |
|
Definition
The Public Switched Telephone Network. |
|
|
Term
The percentage of packets that are lost or damaged during delivery is called the ________. |
|
Definition
|
|
Term
The amount of time by which packets are delayed when they move through a network is called ________. |
|
Definition
|
|
Term
Jitter is a problem for ________. |
|
Definition
Both voice over IP (VoIP) and streaming media |
|
|
Term
An SLA should specify the worst case. Therefore, an SLA for latency should specify a ________ latency and an SLA for availability should specify a ________ availability.
Hint: Maximum is equivalent to "no higher than" while minimum is equivalent to "no less then." |
|
Definition
|
|
Term
You can can conduct what-if network simulations using ________. |
|
Definition
|
|
Term
________ the physical arrangement of a network's computers, switches, routers, and transmission lines. |
|
Definition
|
|
Term
In the ________ topology, there is only a single possible path between two end nodes. |
|
Definition
|
|
Term
In the ________ topology, there are many possible paths between two end nodes. |
|
Definition
|
|
Term
Broadcasting is used in the ________ topology. |
|
Definition
|
|
Term
Reliability is an advantage of ________ while low cost is an advantage of ________. |
|
Definition
full mesh leased line networks, pure hub-and-spoke networks |
|
|
Term
Most corporate leased line networks are ________. |
|
Definition
A combination of mesh leased line networks and hub-and-spoke networks |
|
|
Term
Overprovisioning means ________. |
|
Definition
adding much more switching and transmission line capacity than will be needed much of the time |
|
|
Term
Priority is assigning high priority to ________ applications while giving low priority to ________ applications. |
|
Definition
latency-intolerant, latency-tolerant |
|
|
Term
Priority is more labor-intensive than overprovisioning. |
|
Definition
|
|
Term
________ restricts traffic entering the network at access points by either limiting some traffic to a certain percentage of total capacity and/or by filtering out unwanted traffic. |
|
Definition
|
|
Term
________ can help reduce the traffic coming into a network. |
|
Definition
Both Traffic shaping and Compression |
|
|
Term
________ enables network managers to envision the impacts of alternative designs. |
|
Definition
Network simulation software |
|
|
Term
A solution fails to be scalable if it ________. |
|
Definition
is either too expensive at higher traffic volumes or it is unable to grow to meet higher traffic volume |
|
|
Term
The cost of a system over its entire life cycle is called the ________. |
|
Definition
|
|
Term
Carrier costs (such as private line lease) occur during the ________. |
|
Definition
|
|
Term
Operations manages the network on a second-by-second basis. |
|
Definition
|
|
Term
Provisioning is setting up service. |
|
Definition
|
|
Term
Deprovisioning may be necessary when ________. |
|
Definition
a user leaves the company entirely |
|
|
Term
In SNMP, the manager communicates directly with a(n) ________. |
|
Definition
|
|
Term
SNMP ________ commands can change how managed devices operate. |
|
Definition
|
|
Term
The SNMP manager stores the information it receives from Get commands ________. |
|
Definition
|
|
Term
SNMP agents can initiate (autonomously) ________. |
|
Definition
|
|