Chapter 4 Network and Security Management Flashcards Preview

Networking > Chapter 4 Network and Security Management > Flashcards

Flashcards in Chapter 4 Network and Security Management Deck (64):
1

1) Compared to network demand, network budgets are growing ________.
A) faster
B) as fast as it used to be
C) slower
D) both A and C

Answer: C

2

2) In QoS, the S stands for ________.
A) software
B) security
C) service
D) satisfaction

Answer: C

3

3) QoS is quantified through ________.
A) criteria
B) consensus
C) metrics
D) none of the above

Answer: C

4

4) Transmission speed is normally measured in ________.
A) bits per second
B) bytes per second
C) octet per second
D) none of the above

Answer: A

5

5) Throughput is ________.
A) the speed a network actually provides to users
B) a network's rated speed
C) both A and B
D) neither A nor B

Answer: A

6

6) Users of an access point share the transmission capacity of the access point. The throughput a user gets is called the ________.
A) rated speed
B) aggregate throughput
C) individual throughput
D) all of the above

Answer: C

7

7) In a coffee shop hot spot, the rated speed is 10 Mbps. Throughput is about half of the rated speed. There are ten people using the hot spot. You and three others are transmitting or receiving at a particular moment. What speed should you expect to get?
A) 0.5 Mbps
B) 1 Mbps
C) 1.25 Mbps
D) 2.5 Mbps

Answer: C

8

8) ________ is the percentage of time that a network is available for use.
A) Availability
B) Downtime
C) QoS
D) none of the above

Answer: A

9

9) Which of the following usually has higher availability?
A) data networks
B) Public Switched Telephone Network
C) Both of the above usually have equal availability.
D) neither A nor B

Answer: B

10

10) Error rates can soar when the network traffic level ________.
A) is at a high level
B) is at an average level
C) is at a low level
D) none of the above

Answer: A

11

11) Errors may substantially reduce throughput in ________. (Pick the standard most affected.)
A) IP
B) TCP
C) UDP
D) HTTP

Answer: B

12

12) When a packet travels through a network, the time it takes to get from the sender to the receiver is called ________.
A) latency
B) milliseconds
C) jitter
D) throughput

Answer: A

13

13) Latency is usually measured in ________.
A) bits per second (bps)
B) milliseconds (ms)
C) minutes of downtime
D) none of the above

Answer: B

14

14) Variability in delay is called ________.
A) jitter
B) variance
C) a QoS failure
D) latency

Answer: A

15

15) Jitter is a problem for ________.
A) voice over IP (VoIP)
B) streaming media
C) both A and B
D) neither A nor B

Answer: C

16

16) Jitter is a problem for ________.
A) downloading a file attached to an e-mail
B) e-mail
C) both A and B
D) neither A nor B

Answer: D

17

17) An SLA should specify the ________.
A) best case
B) worst case
C) both A and B
D) neither A nor B

Answer: B

18

18) An SLA for speed should specify a ________.
A) maximum speed
B) minimum speed
C) both A and B
D) neither A nor B

Answer: B

19

19) An SLA for availability should specify a ________.
A) maximum availability
B) minimum availability
C) both A and B
D) neither A nor B

Answer: B

20

20) An SLA for latency should specify a ________.
A) maximum latency
B) minimum latency
C) both A and B
D) neither A nor B

Answer: A

21

21) An SLA for jitter should specify a ________.
A) maximum jitter
B) minimum jitter
C) both A and B
D) neither A nor B

Answer: A

22

22) If throughput falls substantially below a QoS guaranteed speed, the ISP ________.
A) always pays a penalty
B) may pay a penalty
C) does not pay a penalty
D) may renegotiate the QoS guarantee for speed

Answer: B

23

23) ISPs usually offer QoS guarantees to ________.
A) residential customers
B) business customers
C) both A and B
D) neither A nor B

Answer: B

24

24) Momentary traffic peaks can lead to ________.
A) latency
B) packet loss
C) both A and B
D) neither A nor B


Answer: C

25

25) Which of the following is latency intolerant?
A) video
B) e-mail
C) both A and B
D) neither A nor B

Answer: A

26

26) Overprovisioning is ________.
A) wasteful of capacity
B) highly labor-intensive
C) both A and B
D) neither A nor B

Answer: A

27

27) Overprovisioning means ________.
A) assigning high priority to latency-intolerant applications while giving low priority to latency-tolerant applications
B) adding much more switching and transmission line capacity than will be needed most of the time


Answer: B

28

28) Priority is assigning high priority to ________ applications while giving low priority to ________ applications.
A) latency-tolerant, latency-intolerant
B) latency-intolerant, latency-tolerant

Answer: B

29

29) A packet will definitely get through if it has ________.
A) QoS reserved capacity
B) priority
C) both A and B

Answer: A

30

30) Compared to other methods for reducing problems during momentary traffic peaks, overprovisioning ________.
A) increases capital cost
B) increases labor costs
C) both A and B
D) neither A nor B

Answer: A

31

31) Which of the following would receive the highest priority?
A) video packets
B) e-mail packets
C) World Wide Web packets
D) network management packets

Answer: D

32

32) Priority addresses the problem of ________.
A) momentary traffic peaks
B) chronic under-capacity
C) both A and B
D) neither A nor B

Answer: A

33

33) Which phase of the plan-protect-respond cycle takes the largest amount of work?
A) plan
B) protect
C) respond
D) The phases require about equal amounts of effort.

Answer: B

34

34) Which of the following is NOT one of the four major security planning principles?
A) perimeter defense
B) risk analysis
C) comprehensive security
D) defense in depth

Answer: A

35

35) Balancing threats against protection costs is called ________.
A) economic justification
B) risk analysis
C) comprehensive security
D) defense in depth

Answer: B

36

36) Attackers only need to find a single weakness to break in. Consequently, companies must ________.
A) have comprehensive security
B) have insurance
C) do risk analysis
D) only give minimum permissions

Answer: A

37

37) An attacker must break through two firewalls to get to a host. This illustrates the principle called ________. (Select the most specific answer.)
A) comprehensive security
B) risk assurance
C) having a DMZ
D) defense in depth

Answer: D

38

38) Vulnerabilities are occasionally found in even the best security products. Consequently, companies must ________.
A) have comprehensive security
B) have defense in depth
C) do risk analysis
D) only give minimum permissions

Answer: B

39

39) There is a single countermeasure in ________.
A) weakest links
B) defense in depth
C) both A and B
D) neither A nor B

Answer: A

40

40) Companies should ________ single points of takeover.
A) eliminate
B) pay special attention to
C) multiply
D) authorize

Answer: B

41

41) Actions that people are allowed to take on a resource come under the heading of ________.
A) hacks
B) authorizations
C) exploits
D) risks

Answer: B

42

42) Another term for authorization is ________.
A) authentication
B) token
C) establishing the creator of a file
D) permission

Answer: D

43

43) If someone has been properly authenticated, they should receive ________ permissions.
A) all
B) no
C) maximum
D) minimum

Answer: D

44

44) A policy specifies ________.
A) what should be done
B) how to do it
C) both A and B
D) neither A nor B

Answer: A

45

45) Which of the following specifies what should be done?
A) policies
B) implementation
C) both A and B
D) neither A nor B

Answer: A

46

46) Policies are separated by implementation to take advantage of ________.
A) implementer knowledge
B) the delegation of work principle
C) minimum permissions

Answer: A

47

47) Implementation guidance is less specific than ________.
A) policy
B) implementation
C) standards
D) none of the above

Answer: A

48

48) Which of the following must be followed?
A) standards
B) guidelines
C) both A and B
D) neither A nor B

Answer: A

49

49) Which of the following is true?
A) Guidelines must be followed.
B) Guidelines must be considered.
C) both A and B
D) neither A nor B

Answer: B

50

50) Oversight activities include ________.
A) vulnerability testing
B) creating guidelines
C) both A and B
D) neither A nor B

Answer: A

51

51) Attacking your own firm occurs in ________.
A) vulnerability testing
B) auditing
C) both A and B
D) neither A nor B

Answer: A

52

52) Policies should drive ________.
A) implementation
B) oversight
C) both A and B
D) neither A nor B

Answer: A

53

53) To determine if a host is reachable, you would send a(n) ________.
A) SNMP SET command
B) MIB
C) trap
D) ping

Answer: D

54

54) (T/F) In SNMP, the manager communicates directly with the managed device.

Answer: FALSE

55

55) SNMP Set commands can ________.
A) ask agents for information about the managed device
B) reroute traffic
C) both A and B
D) neither A nor B

Answer: B

56

56) SNMP ________ commands can change how managed devices operate.
A) Get
B) Set
C) both A and B
D) neither A nor B

Answer: B

57

57) The SNMP manager stores the information it receives from Get commands ________.
A) in the MIB
B) on the agent
C) on the managed device
D) in the cloud

Answer: A

58

58) SNMP agents can initiate ________.
A) Get commands
B) traps
C) both A and B
D) neither A nor B

Answer: B

59

59) Creating switching tables is an example of ________.
A) forwarding
B) routing complexity
C) hardwiring
D) control

Answer: D

60

60) Control is done on individual switches and routers in ________.
A) traditional operation
B) SDN
C) both A and B
D) neither A nor B

Answer: A

61

61) In SDN, which device manages the control function for individual devices?
A) SNMP manager console
B) forwarding device itself
C) SDN policy server
D) SDN controller

Answer: D

62

62) SDN holds the promise of bringing ________.
A) lower cost
B) lower agility
C) both A and B
D) neither A nor B

Answer: A

63

63) When a firewall policy server is used to manage SPI firewalls, what device creates specific ACL rules?
A) the policy server
B) the SNMP manager
C) individual firewalls
D) none of the above

Answer: A

64

64) Which of the following is the easiest to understand?
A) firewall hardware
B) firewall ACLs
C) firewall policies
D) firewall IDSs

Answer: C