Shared Flashcard Set

Details

TEST 1
NA
131
Computer Networking
Undergraduate 4
10/01/2012

Additional Computer Networking Flashcards

 


 

Cards

Term
A network is a system that permits networked applications on different hosts to work together.
Definition
True
Term
Which of the following is a host when it is on a network?
Definition
All of these
Term
In terminal-host processing, processing is done on both the terminal and the server.
Definition
False
Term
In client/server processing, processing is done on the ________.
Definition
Bot client and server
Term
In P2P applications, most processing is done on the ________.
Definition
Client
Term
Network speeds usually are measured in ________.
Definition
Bits per second
Term
47,000,000 bps is
Definition
47 mbps
Term
Which of the following uses packet switching?
Definition
Neither Dial-up telephone circuits nor Leased line circuits
Term
Which type of circuit typically operates at faster speeds?
Definition
Leased circuit lines
Term
Using reserved capacity, the data transmission speed for a voice conversation remains constant regardless of how many people are using the system at the same time.
Definition
True
Term
Circuits are reasonably efficient for ________ transmission.
Answer
Definition
Voice
Term
Which of the following is true?
Definition
All binary signaling is digital signaling.
Term
Which of the following has greater resistance to transmission errors?
Definition
Binary Signaling
Term
A modem converts original ________ signals to ________ signals that can be transmitted through the telephone system.
Definition
Digital, Analog
Term
Breaking down a message into many packets is done on the _______ while the reassembly of packets into a message is done on the
Definition
source host, destination host
Term
Multiplexing reduces transmission cost.
Definition
True
Term
For bursty data, packet switching is desirable because it ________.
Definition
makes transmission more efficient
Term
When a switch receives a packet, the switch selects the ________.
Definition
port to send the packet out
Term
A ________ is the path that a frame takes across a single switched network.
Definition
Data Link
Term
When a frame passes through seven switches between the source and destination hosts (no routers), the number of physical links is ______; the number of data links is ____.
Definition
Eight, one
Term
What device connects different networks into an internet?
Definition
Router
Term
The creation of internetworking required the introduction of two addresses for each host.
Definition
True
Term
When two hosts are separated by seven networks, the number of packets along the way when a host transmits a packet to another host is _________, while the number of frames is ________.
Definition
1 , 7
Term
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches.
Answer
Definition
False
Term
Which network standard governs the hop-by-hop (a hop is host to router or router to router) transmission of packets across an internet
Definition
IP
Term
________ are carried inside ________.
Definition
Packets, frames
Term
Which network standard deals with addresses and functionality for routers to move packets across an Internet?
Definition
IP
Term
Which transport standard places packets that arrive out of order in order?
Answe
Definition
TCP
Term
Internet is paid for by
Definition
user payments to ISPs
Term
Different ISPs interconnect at ________.
Definition
Network access points (NAP)
Term
Which protocol provides a client PC with its dynamic IP address?
Answer
Definition
The Dynamic Host Configuration Protocol (DHCP).
Term
When your PC requests an IP address from a DNS (Domain Name System), the DNS responds with a message containing the IP address of __________.
Answer
Definition
the host your trying to reach
Term
A Home Networking Wireless Access Point contains a DHCP server.
Answer
Definition
True
Term
Another way of refering to the World Wide Web is:
Definition
The internet, an internet AND a network of networks
Term
A network that runs on the customer premises is a ________.
Answer
Definition
LAN
Term
Your ISP gives your home a single IP address. What in the access point allows you to have multiple private IP addresses for multiple devices to share the single public IP address?
Definition
NAT
Term
The _____ contains the content to be delivered by a message.
Definition
data field
Term
In TCP, which process decides whether to retransmit a lost or damaged segment—the original sender or the receiver?
Answer
Definition
the original sender
Term
Protocols such as TCP have explicit openings and closings. These types of protocols are referred to as
Definition
Connection-oriented protools
Term
Dividing a message into a series of smaller messages is called _____.
Definition
fragmentation
Term
A network _____ is a broad plan that specifies everything necessary for two application programs on different networks on an internet to be able to work together effectively.
Definition
architecture
Term
How many data links will there be if a frame passes from a computer through two switches, then through a router, then through two more switches, and then to the destination computer?
Definition
Two
Term
Which layer governs end-to-end transmission between two hosts across an internet?
Definition
The transport layer
Term
The transport layer normally fixes errors that occur at the _____ layer.
Answer
Definition
All the above
Term
"Octet" is another name for:
Answer
Definition
Byte
Term
Routers make packet forwarding decisions based on a packet’s _____.
Answer
Definition
Destination IP address
Term
Which of the following places a heavier burden on the internet?
Definition
TCP
Term
Novell NetWare servers traditionally used _____ standards.
Definition
IPX/SPX
Term
The side wishing to close a TCP segment sends a(n) ________ segment.
Definition
FIN
Term
Ethernet or MAC addresses are ________.
Definition
48 Bits long
Term
In an Ethernet frame, the IP packet is carried in the ________ field.
Definition
Data Field
Term
Port fields are found in
Definition
Both UDP headers and TCP headers
Term
UDP checks messages for errors but does not correct them. UDP is ________.
Definition
Unreliable
Term
What is the well-known port number for HTTP?
Definition
80
Term
At which layer would you find file transfer protocol (FTP) standards for downloading files?
Definition
Application
Term
Converting application messages into bits is called ________.
Definition
encoding
Term
Character data is represented using binary numeric values converted using the
Definition
Unicode Table
Term
Floating Point Numbers are stored in binary using
Definition
IEEE 754
Term
When two hosts communicate over the network, they sending and receiving
Definition
Messages
Term
Which phase of the plan-protect-respond cycle requires the largest amount of work by organizations?
Answer
Definition
Protect
Term
Malware is a generic name for evil software.
Definition
True
Term
Users typically can eliminate a vulnerability in one of their programs (such as an operating system) by ________.
Definition
Installing a patch
Term
Firewalls can usually prevent viruses from entering your system or network.
Answer
Definition
False
Term
Which of the following attach themselves to other programs?
Definition
Viruses
Term
Which of the following can thwart directly-propagating worms?
Definition
Firewalls
Term
Scripts (Mobile Code) may execute software when a webpage is downloaded.
Answer
Definition
True
Term
Malware programs that masquerade as system files are called ________.
Definition
Trojan Horses
Term
The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________.
Definition
Spyware
Term
An unauthorized program running on a computer that can capture passwords as you type them is ________.
Definition
a keystroke logger
Term
A Trojan horse that sorts through files on the victim's computer to look for useable information is called ________.
Definition
data mining software
Term
An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________.
Definition
phishing
Term
DoS (Denial of Service) attacks attempt to ________.
Definition
reduce the availability of a computer (such as a server)
Term
Attack programs that can be remotely controlled by an attacker are ________.
Definition
bots
Term
Which type of employees must an organization be most concerned about protecting against with regards to securing the organization's networks?
Definition
IT and IT security staff members.
Term
What type of attacker is the U.S. Department of Defense most concerned about doing damage to their networks?
Definition
National Governments
Term
What type of hacker are most corporations most vulnerable to when it comes to doing damage to their networks?
Definition
Former employees
Term
Balancing threats against protection costs is called ________.
Definition
risk analysis
Term
Suppose that an attack would do $100,000 in damage and has a 15 percent annual probability of success. Spending $8,000 on “Measure A” would cut the annual probability of success by 75 percent. Should the company spend the money?
Answer
Definition
YES
Term
Suppose that an attack would do $100,000 in damage and has a 15 percent annual probability of success. Spending $20,000 on “Measure B” would cut the annual probability of success by 75 percent. Should the company spend the money?
Definition
NO
Term
The goal of security is to eliminate risk.
Definition
False
Term
Attackers only need to find a single weakness to break in. Consequently, companies must ________.
Definition
engineer security in when designing the networks
Term
An attacker must break through two firewalls to get to a host. This illustrates the principle called ________.
Definition
defense in depth
Term
Defining actions that people are allowed to take with regards to specific resources are described under the heading of ________.
Definition
permissions
Term
In general, people who receive access to a resource should be given maximum permissions so that they can do their jobs with the fewest delays or restrictions.
Definition
False
Term
Security Oversight activities include ________.
Definition
vulnerability testing
Term
Requiring someone requesting to use a resource to prove his or her identity is ________.
Definition
Authentication
Term
Passwords are widely used because ________.
Definition
they can be used at no additional cost
Term
A password that can be broken by a dictionary attack or a dictionary attack in hybrid mode can be adequately strong if it is very long.
Definition
False
Term
A password cracking attack that tries all combinations of keyboard characters is called a ________.
Definition
brute-force attack
Term
Biometrics is the use of body measurements to authenticate you.
Answer
Definition
True
Term
Which of the following is a criteria by which biometrics can be judged?
Definition
Both cost and susceptibility to deception
Term
Fingerprint scanning may be an acceptable access control method for ordinary laptops.
Answer
Definition
True
Term
Iris scanning is attractive because of its ________.
Definition
low susceptibility to deception
Term
In digital certificate authentication, the supplicant does a calculation with ________.
Definition
the supplicant's private key
Term
In digital certificate authentication, the verifier uses ________.
Definition
the true party's public key
Term
The digital certificate provides the ________.
Definition
public key of the true party
Term
Security threats can come from which of the following?
Definition
all of the above
Term
Human users of computers and networks are often more vulnerable to manipulations that compromise security than the technological vulnerablilities of the computers and networks.
Definition
true
Term
Hackers probe known port numbers on computers during probing scans to
Definition
Search for vulnerable applications
Term
Performing an in-depth inventory of the current state of the company's network is called ________.
Definition
what-is analysis
Term
QoS is quantified through ________.
Definition
metrics
Term
Which of the following speeds is written properly?
Definition
87.62 kbps.
Term
Throughput is ________.
Definition
the speed a network actually provides to users
Term
Which of the following usually has higher availability?
Definition
The Public Switched Telephone Network.
Term
The percentage of packets that are lost or damaged during delivery is called the ________.
Definition
packet error rate
Term
The amount of time by which packets are delayed when they move through a network is called ________.
Definition
latency
Term
Jitter is a problem for ________.
Definition
Both voice over IP (VoIP) and streaming media
Term
An SLA should specify the worst case. Therefore, an SLA for latency should specify a ________ latency and an SLA for availability should specify a ________ availability.

Hint: Maximum is equivalent to "no higher than" while minimum is equivalent to "no less then."
Definition
maximum, minimum
Term
You can can conduct what-if network simulations using ________.
Definition
OPNET's IT Guru
Term
________ the physical arrangement of a network's computers, switches, routers, and transmission lines.
Definition
Network topology is
Term
In the ________ topology, there is only a single possible path between two end nodes.
Definition
hierarchical
Term
In the ________ topology, there are many possible paths between two end nodes.
Definition
mesh
Term
Broadcasting is used in the ________ topology.
Definition
bus
Term
Reliability is an advantage of ________ while low cost is an advantage of ________.
Definition
full mesh leased line networks, pure hub-and-spoke networks
Term
Most corporate leased line networks are ________.
Definition
A combination of mesh leased line networks and hub-and-spoke networks
Term
Overprovisioning means ________.
Definition
adding much more switching and transmission line capacity than will be needed much of the time
Term
Priority is assigning high priority to ________ applications while giving low priority to ________ applications.
Definition
latency-intolerant, latency-tolerant
Term
Priority is more labor-intensive than overprovisioning.
Definition
True
Term
________ restricts traffic entering the network at access points by either limiting some traffic to a certain percentage of total capacity and/or by filtering out unwanted traffic.
Definition
Traffic shaping
Term
________ can help reduce the traffic coming into a network.
Definition
Both Traffic shaping and Compression
Term
________ enables network managers to envision the impacts of alternative designs.
Definition
Network simulation software
Term
A solution fails to be scalable if it ________.
Definition
is either too expensive at higher traffic volumes or it is unable to grow to meet higher traffic volume
Term
The cost of a system over its entire life cycle is called the ________.
Definition
total cost of ownership
Term
Carrier costs (such as private line lease) occur during the ________.
Definition
SLC
Term
Operations manages the network on a second-by-second basis.
Definition
True
Term
Provisioning is setting up service.
Definition
TRUE
Term
Deprovisioning may be necessary when ________.
Definition
a user leaves the company entirely
Term
In SNMP, the manager communicates directly with a(n) ________.
Definition
agent
Term
SNMP ________ commands can change how managed devices operate.
Definition
Set
Term
The SNMP manager stores the information it receives from Get commands ________.
Definition
In the MIB
Term
SNMP agents can initiate (autonomously) ________.
Definition
trap commands
Supporting users have an ad free experience!