Business Data Comm & Network Chap 10 to 13

Only available on StudyMode
  • Topic: Network management, Simple Network Management Protocol, Network switch
  • Pages : 10 (1020 words )
  • Download(s) : 43
  • Published : June 26, 2011
Open Document
Text Preview
1.

_________ is being pioneered by Yipes.com.
Student ResponseCorrect AnswerFeedback
A.Next Generation Internet
B.Active fibrous networking
C.CA*Net3
D.Ethernet to the home
Difficulty: Moderate
Page: 346

E.The Abilene network
General Feedback:
Difficulty: Moderate
Page: 346
Score: 6/6

2.

The multipoint version of fixed wireless is sometimes known as: Student ResponseCorrect AnswerFeedback
A.DSLAM
B.point-to-multipoint
Difficulty: Moderate
Page: 343

C.point-to-point
D.CA*Net3
E.DOCSIS
General Feedback:
Difficulty: Moderate
Page: 343
Score: 6/6

3.

DSL modem is also known as a:
Student ResponseCorrect AnswerFeedback
A.DSL hub
B.DSL gateway
C.DSL router
Difficulty: Easy
Page: 340

D.DSL brouter
E.DSL bridge
General Feedback:
Difficulty: Easy
Page: 340
Score: 6/6

4.

vBNS was developed by one organization, but is currently being run by another organization, _____________. Student ResponseCorrect AnswerFeedback
A.AT&T
B.Sprint
C.Yipes
D.the Abilene network
Difficulty: Moderate
Page: 348

E.MCI WorldCom
General Feedback:
Difficulty: Moderate
Page: 348
Score: 0/6

5.

CA*Net3 was developed by a Canadian organization known as:
Student ResponseCorrect AnswerFeedback
A.IETF
B.ARDNOC
Difficulty: Moderate
Page: 348

C.ADSL
D.RFC
E.UCAID
General Feedback:
Difficulty: Moderate
Page: 348
Score: 6/6

6.

Disk duplexing uses a redundant disk controller on the server. Student ResponseCorrect AnswerFeedback
A.False
B.True
Difficulty: Moderate
Page: 367

General Feedback:
Difficulty: Moderate
Page: 367
Score: 6/6

7.

Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity. Student ResponseCorrect AnswerFeedback
A.True
B.False
Difficulty: Easy
Page: 359

General Feedback:
Difficulty: Easy
Page: 359
Score: 0/6

8.

An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user. Student ResponseCorrect AnswerFeedback
A.False
Difficulty: Easy
Page: 379

B.True
General Feedback:
Difficulty: Easy
Page: 379
Score: 6/6

9.

Which of the following is not a type of intrusion detection system? Student ResponseCorrect AnswerFeedback
A.data link-based
Difficulty: Easy
Page: 399-400

B.host-based
C.application-based
D.network-based
E.none of the above is an appropriate answer
General Feedback:
Difficulty: Easy
Page: 399-400
Score: 6/6

10.

A control spreadsheet lists threats to the network across the top of the spreadsheet and lists the network components down the side of the sheet. Student ResponseCorrect AnswerFeedback
A.True
Difficulty: Moderate
Page: 361

B.False
General Feedback:
Difficulty: Moderate
Page: 361
Score: 6/6

11.

Capacity planning is used to design circuit capacity.
Student ResponseCorrect AnswerFeedback
A.True
B.False
Difficulty: Easy
Page: 423

General Feedback:
Difficulty: Easy
Page: 423
Score: 0/6

12.

A central database called the _____________, has an agent that collects information about a device and makes this information available to the network management station. Student ResponseCorrect AnswerFeedback

A.simple network management protocol
B.system management software
C.management information base
Difficulty: Moderate
Page: 430

D.common management interface protocol
E.remote monitoring
General Feedback:
Difficulty: Moderate
Page: 430
Score: 6/6

13.

Which of the following is not making the traditional design...
tracking img