Network Data Communications Finals

31 Questions | Total Attempts: 52

Settings
Please wait...
Data Communication Quizzes & Trivia

Questions and Answers
  • 1. 
    Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
    • A. 

      True

    • B. 

      False

  • 2. 
    Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.
    • A. 

      True

    • B. 

      False

  • 3. 
     A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. 
    • A. 

      True

    • B. 

      False

  • 4. 
    Fault-intolerant servers contain many redundant components to prevent failure.
    • A. 

      True

    • B. 

      False

  • 5. 
    Often, incidents of ___________ involve employees of the organization, surprisingly enough.
    • A. 

      Intrusion

    • B. 

      Disruption

    • C. 

      Controlled chaos

    • D. 

      Destruction

    • E. 

      Distaster

  • 6. 
    ________ controls discover unwanted events.
    • A. 

      Preventative

    • B. 

      Corrective

    • C. 

      Detective

    • D. 

      Mitigating

    • E. 

      Backup

  • 7. 
    A(n) ____________, is an information system that is critical to the survival of an organization. 
    • A. 

      Network plan

    • B. 

      Accounting system

    • C. 

      IDS

    • D. 

      Mission critical application

    • E. 

      Firewall

  • 8. 
    A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.
    • A. 

      Asset

    • B. 

      Service level agreement

    • C. 

      Threat

    • D. 

      Security plan

    • E. 

      Network design

  • 9. 
    What are the two main types of security problems?
  • 10. 
    An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.
    • A. 

      True

    • B. 

      False

  • 11. 
    A patch is a software solution to correct a security hole
    • A. 

      True

    • B. 

      False

  • 12. 
    A brute-force attack is a method of trying to guess the correct password by trying every possible key.
    • A. 

      True

    • B. 

      False

  • 13. 
    Social engineering refers to creating a team that solves virus problems.
    • A. 

      True

    • B. 

      False

  • 14. 
    A commodity product or service is one that is widely available and thus offers low profit margins to its providers
    • A. 

      True

    • B. 

      False

  • 15. 
    Disruptive Innovations (as defined by Christensen) involve radically new technologies
    • A. 

      True

    • B. 

      False

  • 16. 
    The traditional network design approach (used before the building block approach) worked very well for rapidly changing networks.
    • A. 

      True

    • B. 

      False

  • 17. 
    Today, the most expensive part of the network is the hardware.
    • A. 

      True

    • B. 

      False

  • 18. 
    Networks requirements can be divided into mandatory, desirable, and wish-list requirements.
    • A. 

      True

    • B. 

      False

  • 19. 
    The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.
    • A. 

      True

    • B. 

      False

  • 20. 
    A sniffer program is a: 
    • A. 

      Type of macro-virus

    • B. 

      Small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location

    • C. 

      Used in a call-back modem

    • D. 

      A program that records all LAN messages received for later (unauthorized) analysis

    • E. 

      Secure hub program

  • 21. 
    __________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
    • A. 

      Translation

    • B. 

      Conversion

    • C. 

      Network address translation

    • D. 

      Proxy translation

    • E. 

      IP conversion

  • 22. 
    IP spoofing means to
    • A. 

      Fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network

    • B. 

      Clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation

    • C. 

      Illegally tape or listen in on telephone conversations

    • D. 

      Detect and prevent denial-of-service attacks

    • E. 

      Act as an intermediate host computer between the Internet and the rest of the organization’s networks

  • 23. 
    A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.
    • A. 

      ANI System

    • B. 

      NAT Proxy Server

    • C. 

      IP Spoofing Bridge

    • D. 

      Packet level firewall

    • E. 

      Smart hub

  • 24. 
    A way to prevent intrusion by disguising information through algorithms is:   
    • A. 

      Spoofing

    • B. 

      Call-back access

    • C. 

      Encryption

    • D. 

      Disk elevatoring

    • E. 

      Disk mirroring

  • 25. 
    The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as:
    • A. 

      Trojan horse

    • B. 

      Sniffing

    • C. 

      Tunneling

    • D. 

      Computer forensics

    • E. 

      Misuse detection

  • 26. 
    Which of the following is not an essential characteristic of cloud computing services:
    • A. 

      They are offered over a web interface

    • B. 

      They are accessible over a network

    • C. 

      Resources can be rapidly scaled in and out

    • D. 

      One can keep precise records of resources consumption

    • E. 

      Resources are used by multiple users at the same time

  • 27. 
    In __________, the network designer considers the relative cost of the technologies.  
    • A. 

      Technology design

    • B. 

      Needs analysis

    • C. 

      Narrow and deep analysis

    • D. 

      Cost assessment

    • E. 

      Distribution layering

  • 28. 
    In designing LAN networks, network designers tend to err on the sid of building too small a network
    • A. 

      True

    • B. 

      False

  • 29. 
    Which of the following are included in the key deliverable for the needs assessment stage, the set of logical network diagrams?
    • A. 

      Applications of the proposed network

    • B. 

      Servers in the proposed network

    • C. 

      Circuits in the proposed network

    • D. 

      Specific routers that have been chosen to implement the proposed network

    • E. 

      Clients in the proposed network

  • 30. 
    Which of the following is not a main item for which network designers estimate costs for the proposed network? 
    • A. 

      Software

    • B. 

      Hardware

    • C. 

      Purchasing and installing circuits

    • D. 

      Users' furniture

    • E. 

      Circuits provided by common carriers

  • 31. 
    RFP stands for: