Term
| A network is a system that permits networked applications on different hosts to work together. |
|
Definition
|
|
Term
| Which of the following is a host when it is on a network? |
|
Definition
|
|
Term
| In terminal-host processing, processing is done on both the terminal and the server. |
|
Definition
|
|
Term
| In client/server processing, processing is done on the ________. |
|
Definition
|
|
Term
| In P2P applications, most processing is done on the ________. |
|
Definition
|
|
Term
| Network speeds usually are measured in ________. |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Which of the following uses packet switching? |
|
Definition
| Neither Dial-up telephone circuits nor Leased line circuits |
|
|
Term
| Which type of circuit typically operates at faster speeds? |
|
Definition
|
|
Term
| Using reserved capacity, the data transmission speed for a voice conversation remains constant regardless of how many people are using the system at the same time. |
|
Definition
|
|
Term
Circuits are reasonably efficient for ________ transmission. Answer |
|
Definition
|
|
Term
| Which of the following is true? |
|
Definition
| All binary signaling is digital signaling. |
|
|
Term
| Which of the following has greater resistance to transmission errors? |
|
Definition
|
|
Term
| A modem converts original ________ signals to ________ signals that can be transmitted through the telephone system. |
|
Definition
|
|
Term
| Breaking down a message into many packets is done on the _______ while the reassembly of packets into a message is done on the |
|
Definition
| source host, destination host |
|
|
Term
| Multiplexing reduces transmission cost. |
|
Definition
|
|
Term
| For bursty data, packet switching is desirable because it ________. |
|
Definition
| makes transmission more efficient |
|
|
Term
| When a switch receives a packet, the switch selects the ________. |
|
Definition
| port to send the packet out |
|
|
Term
| A ________ is the path that a frame takes across a single switched network. |
|
Definition
|
|
Term
| When a frame passes through seven switches between the source and destination hosts (no routers), the number of physical links is ______; the number of data links is ____. |
|
Definition
|
|
Term
| What device connects different networks into an internet? |
|
Definition
|
|
Term
| The creation of internetworking required the introduction of two addresses for each host. |
|
Definition
|
|
Term
| When two hosts are separated by seven networks, the number of packets along the way when a host transmits a packet to another host is _________, while the number of frames is ________. |
|
Definition
|
|
Term
A route is the path a frame takes across a single network, from the source host to the destination host, across multiple switches. Answer |
|
Definition
|
|
Term
| Which network standard governs the hop-by-hop (a hop is host to router or router to router) transmission of packets across an internet |
|
Definition
|
|
Term
| ________ are carried inside ________. |
|
Definition
|
|
Term
| Which network standard deals with addresses and functionality for routers to move packets across an Internet? |
|
Definition
|
|
Term
Which transport standard places packets that arrive out of order in order? Answe |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Different ISPs interconnect at ________. |
|
Definition
| Network access points (NAP) |
|
|
Term
Which protocol provides a client PC with its dynamic IP address? Answer |
|
Definition
| The Dynamic Host Configuration Protocol (DHCP). |
|
|
Term
When your PC requests an IP address from a DNS (Domain Name System), the DNS responds with a message containing the IP address of __________. Answer |
|
Definition
| the host your trying to reach |
|
|
Term
A Home Networking Wireless Access Point contains a DHCP server. Answer |
|
Definition
|
|
Term
| Another way of refering to the World Wide Web is: |
|
Definition
| The internet, an internet AND a network of networks |
|
|
Term
A network that runs on the customer premises is a ________. Answer |
|
Definition
|
|
Term
| Your ISP gives your home a single IP address. What in the access point allows you to have multiple private IP addresses for multiple devices to share the single public IP address? |
|
Definition
|
|
Term
| The _____ contains the content to be delivered by a message. |
|
Definition
|
|
Term
In TCP, which process decides whether to retransmit a lost or damaged segment—the original sender or the receiver? Answer |
|
Definition
|
|
Term
| Protocols such as TCP have explicit openings and closings. These types of protocols are referred to as |
|
Definition
| Connection-oriented protools |
|
|
Term
| Dividing a message into a series of smaller messages is called _____. |
|
Definition
|
|
Term
| A network _____ is a broad plan that specifies everything necessary for two application programs on different networks on an internet to be able to work together effectively. |
|
Definition
|
|
Term
| How many data links will there be if a frame passes from a computer through two switches, then through a router, then through two more switches, and then to the destination computer? |
|
Definition
|
|
Term
| Which layer governs end-to-end transmission between two hosts across an internet? |
|
Definition
|
|
Term
The transport layer normally fixes errors that occur at the _____ layer. Answer |
|
Definition
|
|
Term
"Octet" is another name for: Answer |
|
Definition
|
|
Term
Routers make packet forwarding decisions based on a packet’s _____. Answer |
|
Definition
|
|
Term
| Which of the following places a heavier burden on the internet? |
|
Definition
|
|
Term
| Novell NetWare servers traditionally used _____ standards. |
|
Definition
|
|
Term
| The side wishing to close a TCP segment sends a(n) ________ segment. |
|
Definition
|
|
Term
| Ethernet or MAC addresses are ________. |
|
Definition
|
|
Term
| In an Ethernet frame, the IP packet is carried in the ________ field. |
|
Definition
|
|
Term
|
Definition
| Both UDP headers and TCP headers |
|
|
Term
| UDP checks messages for errors but does not correct them. UDP is ________. |
|
Definition
|
|
Term
| What is the well-known port number for HTTP? |
|
Definition
|
|
Term
| At which layer would you find file transfer protocol (FTP) standards for downloading files? |
|
Definition
|
|
Term
| Converting application messages into bits is called ________. |
|
Definition
|
|
Term
| Character data is represented using binary numeric values converted using the |
|
Definition
|
|
Term
| Floating Point Numbers are stored in binary using |
|
Definition
|
|
Term
| When two hosts communicate over the network, they sending and receiving |
|
Definition
|
|
Term
Which phase of the plan-protect-respond cycle requires the largest amount of work by organizations? Answer |
|
Definition
|
|
Term
| Malware is a generic name for evil software. |
|
Definition
|
|
Term
| Users typically can eliminate a vulnerability in one of their programs (such as an operating system) by ________. |
|
Definition
|
|
Term
Firewalls can usually prevent viruses from entering your system or network. Answer |
|
Definition
|
|
Term
| Which of the following attach themselves to other programs? |
|
Definition
|
|
Term
| Which of the following can thwart directly-propagating worms? |
|
Definition
|
|
Term
Scripts (Mobile Code) may execute software when a webpage is downloaded. Answer |
|
Definition
|
|
Term
| Malware programs that masquerade as system files are called ________. |
|
Definition
|
|
Term
| The general name for malware on a user's PC that collects sensitive information and sends this information to an attacker is ________. |
|
Definition
|
|
Term
| An unauthorized program running on a computer that can capture passwords as you type them is ________. |
|
Definition
|
|
Term
| A Trojan horse that sorts through files on the victim's computer to look for useable information is called ________. |
|
Definition
|
|
Term
| An attack in which an authentic-looking e-mail or website entices a user to enter his or her username, password, or other sensitive information is called ________. |
|
Definition
|
|
Term
| DoS (Denial of Service) attacks attempt to ________. |
|
Definition
| reduce the availability of a computer (such as a server) |
|
|
Term
| Attack programs that can be remotely controlled by an attacker are ________. |
|
Definition
|
|
Term
| Which type of employees must an organization be most concerned about protecting against with regards to securing the organization's networks? |
|
Definition
| IT and IT security staff members. |
|
|
Term
| What type of attacker is the U.S. Department of Defense most concerned about doing damage to their networks? |
|
Definition
|
|
Term
| What type of hacker are most corporations most vulnerable to when it comes to doing damage to their networks? |
|
Definition
|
|
Term
| Balancing threats against protection costs is called ________. |
|
Definition
|
|
Term
Suppose that an attack would do $100,000 in damage and has a 15 percent annual probability of success. Spending $8,000 on “Measure A” would cut the annual probability of success by 75 percent. Should the company spend the money? Answer |
|
Definition
|
|
Term
| Suppose that an attack would do $100,000 in damage and has a 15 percent annual probability of success. Spending $20,000 on “Measure B” would cut the annual probability of success by 75 percent. Should the company spend the money? |
|
Definition
|
|
Term
| The goal of security is to eliminate risk. |
|
Definition
|
|
Term
| Attackers only need to find a single weakness to break in. Consequently, companies must ________. |
|
Definition
| engineer security in when designing the networks |
|
|
Term
| An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. |
|
Definition
|
|
Term
| Defining actions that people are allowed to take with regards to specific resources are described under the heading of ________. |
|
Definition
|
|
Term
| In general, people who receive access to a resource should be given maximum permissions so that they can do their jobs with the fewest delays or restrictions. |
|
Definition
|
|
Term
| Security Oversight activities include ________. |
|
Definition
|
|
Term
| Requiring someone requesting to use a resource to prove his or her identity is ________. |
|
Definition
|
|
Term
| Passwords are widely used because ________. |
|
Definition
| they can be used at no additional cost |
|
|
Term
| A password that can be broken by a dictionary attack or a dictionary attack in hybrid mode can be adequately strong if it is very long. |
|
Definition
|
|
Term
| A password cracking attack that tries all combinations of keyboard characters is called a ________. |
|
Definition
|
|
Term
Biometrics is the use of body measurements to authenticate you. Answer |
|
Definition
|
|
Term
| Which of the following is a criteria by which biometrics can be judged? |
|
Definition
| Both cost and susceptibility to deception |
|
|
Term
Fingerprint scanning may be an acceptable access control method for ordinary laptops. Answer |
|
Definition
|
|
Term
| Iris scanning is attractive because of its ________. |
|
Definition
| low susceptibility to deception |
|
|
Term
| In digital certificate authentication, the supplicant does a calculation with ________. |
|
Definition
| the supplicant's private key |
|
|
Term
| In digital certificate authentication, the verifier uses ________. |
|
Definition
| the true party's public key |
|
|
Term
| The digital certificate provides the ________. |
|
Definition
| public key of the true party |
|
|
Term
| Security threats can come from which of the following? |
|
Definition
|
|
Term
| Human users of computers and networks are often more vulnerable to manipulations that compromise security than the technological vulnerablilities of the computers and networks. |
|
Definition
|
|
Term
| Hackers probe known port numbers on computers during probing scans to |
|
Definition
| Search for vulnerable applications |
|
|
Term
| Performing an in-depth inventory of the current state of the company's network is called ________. |
|
Definition
|
|
Term
| QoS is quantified through ________. |
|
Definition
|
|
Term
| Which of the following speeds is written properly? |
|
Definition
|
|
Term
|
Definition
| the speed a network actually provides to users |
|
|
Term
| Which of the following usually has higher availability? |
|
Definition
| The Public Switched Telephone Network. |
|
|
Term
| The percentage of packets that are lost or damaged during delivery is called the ________. |
|
Definition
|
|
Term
| The amount of time by which packets are delayed when they move through a network is called ________. |
|
Definition
|
|
Term
| Jitter is a problem for ________. |
|
Definition
| Both voice over IP (VoIP) and streaming media |
|
|
Term
An SLA should specify the worst case. Therefore, an SLA for latency should specify a ________ latency and an SLA for availability should specify a ________ availability.
Hint: Maximum is equivalent to "no higher than" while minimum is equivalent to "no less then." |
|
Definition
|
|
Term
| You can can conduct what-if network simulations using ________. |
|
Definition
|
|
Term
| ________ the physical arrangement of a network's computers, switches, routers, and transmission lines. |
|
Definition
|
|
Term
| In the ________ topology, there is only a single possible path between two end nodes. |
|
Definition
|
|
Term
| In the ________ topology, there are many possible paths between two end nodes. |
|
Definition
|
|
Term
| Broadcasting is used in the ________ topology. |
|
Definition
|
|
Term
| Reliability is an advantage of ________ while low cost is an advantage of ________. |
|
Definition
| full mesh leased line networks, pure hub-and-spoke networks |
|
|
Term
| Most corporate leased line networks are ________. |
|
Definition
| A combination of mesh leased line networks and hub-and-spoke networks |
|
|
Term
| Overprovisioning means ________. |
|
Definition
| adding much more switching and transmission line capacity than will be needed much of the time |
|
|
Term
| Priority is assigning high priority to ________ applications while giving low priority to ________ applications. |
|
Definition
| latency-intolerant, latency-tolerant |
|
|
Term
| Priority is more labor-intensive than overprovisioning. |
|
Definition
|
|
Term
| ________ restricts traffic entering the network at access points by either limiting some traffic to a certain percentage of total capacity and/or by filtering out unwanted traffic. |
|
Definition
|
|
Term
| ________ can help reduce the traffic coming into a network. |
|
Definition
| Both Traffic shaping and Compression |
|
|
Term
| ________ enables network managers to envision the impacts of alternative designs. |
|
Definition
| Network simulation software |
|
|
Term
| A solution fails to be scalable if it ________. |
|
Definition
| is either too expensive at higher traffic volumes or it is unable to grow to meet higher traffic volume |
|
|
Term
| The cost of a system over its entire life cycle is called the ________. |
|
Definition
|
|
Term
| Carrier costs (such as private line lease) occur during the ________. |
|
Definition
|
|
Term
| Operations manages the network on a second-by-second basis. |
|
Definition
|
|
Term
| Provisioning is setting up service. |
|
Definition
|
|
Term
| Deprovisioning may be necessary when ________. |
|
Definition
| a user leaves the company entirely |
|
|
Term
| In SNMP, the manager communicates directly with a(n) ________. |
|
Definition
|
|
Term
| SNMP ________ commands can change how managed devices operate. |
|
Definition
|
|
Term
| The SNMP manager stores the information it receives from Get commands ________. |
|
Definition
|
|
Term
| SNMP agents can initiate (autonomously) ________. |
|
Definition
|
|