A host based intrusion prevention system ips monitors


Q1. A subnetted or hierarchical backbone can also be called:
a. Bridged backbone
b. Virtual LAN
c. Hubbed backbone
d. Collapsed backbone
e. Routed backbone

Q2. A backbone network that connects many backbone networks spanning several buildings at a single location is often called an Internet backbone.
a. true
b. false

Q3. A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware.
a. Bridged backbone
b. Virtual LAN
c. Hubbed backbone
d. Collapsed backbone
e. Routed backbone

Q4. Which of the following would be least effective in improving backbone performance?
a. improving the computers in the network
b. changing the demand placed on the network
c. adding new keyboards to the client computers
d. upgrading the circuits between computers
e. improving devices in the network
Answer: C

Q5. Associated with a switched backbone, MDF is an acronym for:
a. multi-station device foundation
b. main distribution facility
c. manual data frequency
d. multiplexer downstream flow
e. maximum data facility

Q6. A _____connects all networks within a company, regardless of whether it crosses state, national, or international boundaries.
a. LAN
b. MAN
c. enterprise network
d. campus network
e. core network

Q7. Which of the following is a way that a router is similar to a switch?
a. routers can connect two or more networks that use the same data link protocol
b. routers only process messages that are specifically addressed to it
c. routers operate at the network layer
d. routers perform more processing on each message than switch
e. routers can choose the "best" route between networks for forwarding a packet

Q8. Devices in a rack are connected together using ___________.
a. patch cables
b. string
c. servers
d. modules
e. chassis switches

Q9. Cloud (as in cloud architecture) means that the design for the common carrier's network comes from satellite networks above the clouds.
a. true
b. false

Q10. In ______ geometric layout for a network, every computer is connected to every other computer often by point-to-point dedicated circuits.
a. full mesh design
b. ring design
c. star design
d. bus design
e. partial mesh design

Q11. Dynamic routing:
a. imposes an overhead cost by increasing network traffic
b. decreases performance in networks which have many possible routes
c. decreases performance in networks with "bursty" traffic
d. should be used in 80 to 90 percent of total networks' capacity
e. is another term for static routing in WANs

Q12. Special rate services that allow dialed circuit calls for both voice communications and data transmission to be purchased in large quantities are known as __________.
a. DSL
b. RBOC
c. ATM
d. WATS
e. X.25

Q13. T carrier circuits can only be used to transmit voice.
a. true
b. false

Q14. A disadvantage of a star architecture is that the failure of one circuit will disrupt the entire network.
a. true
b. false


Q15. A ____________ identifies each device connected to an ISDN network terminator.
a. NIC
b. MAC address
c. SPID
d. PRI
e. BRI

Q16. When a person uses a regular modem to make a connection to an Internet service provider through POTS, the data travels over a:
a. dedicated circuit
b. dialed circuit
c. ISDN circuit
d. VPN circuit
e. T-1 carrier circuit

Q17. One type of Broadband ISDN service is intended to be used for digital broadcast television:
a. analog service
b. asymmetrical service with two simplex channels
c. one simplex upstream channel operating at 155.52 Mbps, one downstream at 622.08 Mbps
d. packet-switched service
e. one full duplex channel operating at 622.08 Mbps

Q18. A(n) __________ is used to connect a fiber optic cable from the cable TV company side to a coaxial cable on the customer side.
a. CA*net 3
b. RFC
c. WAP proxy
d. fixed wireless connection
e. optical-electrical converter


Q19. Internet 2 is the common name for the Abilene network.
a. true
b. false

Q20. Which of the following statements is true?
a. On a circuit, the shorter the distance, the higher the speed.
b. On a circuit, the longer the distance, the higher the speed.
c. On a circuit, the longer the distance, less attenuation occurs.
d. On a circuit, the shorter the distance, more attenuation occurs.
e. When more attenuation occurs, higher frequency signals can be used effectively.

Q21. Another term for cable networks that use both fiber-optic and coaxial cable is __________.
a. fixed wireless
b. mobile wireless
c. distribution hub
d. hybrid fiber coax
e. fibrax

Q22. A distribution hub includes a combiner and a Cable modem termination system.
a. true
b. false

Q23. The ________ is a large open international community of network designers, operators, vendors, and researchers concerned with the evolution of the Internet architecture and smooth operation of the Internet.
a. Internet Society
b. Internet Engineering Task Force
c. Internet Engineering Steering Committee
d. Internet Architecture Board
e. Internet Research Task Force


Q24. Some of the new applications being developed for a high-speed Internet include:
a. Tele-immersion
b. Tele-conferencing
c. QoS
d. Broadband
e. Tele-phoning

Q25. The _________ is the connection from a home or business to the telephone company end office.
a. distribution hub
b. RFC
c. UCAID
d. local loop
e. CA*net 3

Q26. A patch is a software solution to correct a security hole.
a. true
b. false

Q27. A brute-force attack is a method of trying to guess the correct password by trying every possible key.
a. true
b. false

Q28. IP spoofing means to:
a. fool the target computer and any intervening firewall into believing that messages from the intruder's computer are actually coming from an authorized user inside the organization's network
b. clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation
c. illegally tape or listen in on telephone conversations
d. detect and prevent denial-of-service attacks
e. act as an intermediate host computer between the Internet and the rest of the organization's networks

Q29. Which of the following is a mode that is used by IPSec?
a. exchange
b. sniffer
c. tunnel
d. creeper
e. firefighter

Q30. With ANI security control, the network manager:
a. uses the Authorization Notation Investigation protocol to trace only authorized user passwords
b. allows the Asynchronous NetWare Interface to act as a firewall
c. can define several remote telephone numbers authorized to access each account
d. assigns selected Access Network Invitations to users cleared for various levels of network access
e. can only define one remote telephone number authorized to access each account
Answer: C

Q31. A Trojan horse allows a user to access a computer from a remote location.
a. true
b. false

Q32. __________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.
a. Translation
b. Conversion
c. Network address translation
d. Proxy translation
e. IP conversion.


Q33. Disk mirroring writes duplicate copies of all data on at least two different disks.
a. true
b. false

Q34. A host based intrusion prevention system (IPS) monitors activity on the server and reports intrusions to the IPS management console.
a. true
b. false

Q35. To establish circuit loading, the designer usually starts with the:
a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
b. individual user training
c. bus diameter, disk cache that is used at the server station
d. channel bandwidth and baud rate used at each client
e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node

Q36. Today, many organizations design networks using the building-block approach.
a. true
b. false

Q37. Today, all network traffic is due to traffic from internal application systems.
a. true
b. false

Q38. Nowadays, most organizations use a simpler approach to network design called the ___________ approach.
a. building-block
b. frame definition
c. prototype
d. systems development life cycle
e. guided network


Q39. Needs analysis is the final step in the building block approach to network design.
a. true
b. false

Q40. ________ is used to model the behavior of the planned communication network once the proposed network map is complete.
a. Implementation
b. Post-implementation review
c. Documentation
d. Simulation
e. Training users

Q41. The traditional network design approach does not work well for _________ networks.
a. slowly evolving
b. rapidly growing
c. static
d. modestly growing
e. not growing

Q42. Storing other people's Web data closer to your users is referred to as:

a. SNMP
b. web storing
c. content caching
d. load balancing
e. traffic analysis


Q43. ___________ that are negotiated with providers, such as common carriers, specify the exact type of performance and fault conditions that an organization will accept.
a. Service level agreements
b. Trouble tickets
c. Smart hub lists
d. Bursty router printouts
e. Wish list documentation

Q44. Due to the shift from host-based networks to microcomputer based networks, more than _____ percent of most organizations' total computer processing power now resides on microcomputer-based LANs.
a. 40
b. 50
c. 60
d. 80
e. 90

Q45. Network management software is used by most large organization to monitor and control their networks.
a. true
b. false

Q46. When a user problem cannot be solved by the help desk at the first level of resolution, the problem is ___________ to the second level of problem resolution.
a. firefought
b. spun
c. escalated
d. burst
e. delimited

Q47. Performance management means ensuring the network is operating as efficiently as possible.
a. true
b. false

Q48. When users receive training about fundamentals of network use, they become confident about what they need to do when working on a network.
a. true
b. false

Q49. _____________ are used by many large and small organizations to monitor and control their networks today.
a. Network management software packages
b. Firefighter packages
c. Fault creating packages
d. Fault toleraters
e. NICs

Q50. ____________ are reports produced by numerous network software packages for recording fault information.
a. Wish list documentation
b. Trouble tickets
c. Smart hub lists
d. Bursty router printouts
e. Roger systems checks

Solution Preview :

Prepared by a verified Expert
Computer Networking: A host based intrusion prevention system ips monitors
Reference No:- TGS01728139

Now Priced at $35 (50% Discount)

Recommended (97%)

Rated (4.9/5)