Answered You can hire a professional tutor to get the answer.
A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN...
Q1. A _____________ type of BN is a new type of LAN/BN architecture made possible by intelligent, high speed switches that assign computers to LAN segments via software, rather than by hardware.
a. Bridged backbone
b. Virtual LAN
c. Hubbed backbone
d. Collapsed backbone
e. Routed backbone
Q2. Routers operate at the application layer.
a. true
b. false
Q3. Routers can only connect the same type of cable.
a. true
b. false
Q4. Which of the following devices is the most complex?
a. Gateway
b. Router
c. Layer 3 switches
d. Switch
e. Multiprotocol router
Q5. The backbone architecture layer that is closest to the users is the:
a. Access layer
b. Distribution layer
c. Core layer
d. Privacy layer
e. Switched layer
Q6. A backbone network that connects many backbone networks spanning several buildings at a single location is often called an Internet backbone.
a. true
b. false
Q7. A subnetted or hierarchical backbone can also be called:
a. Bridged backbone
b. Virtual LAN
c. Hubbed backbone
d. Collapsed backbone
e. Routed backbone
Q8. One advantage of a router is that it can choose the "best" route between networks when there is a choice.
a. true
b. false
Q9. Ethernet/IP packet networks are not provided by common carriers such as AT&T.
a. true
b. false
Q10. MANs usually span 3 to 30 miles and connect BNs and LANs.
a. true
b. false
Q11. A ________ geometric layout connects all computers in a closed loop, with each computer linked to the next usually with a series of point-to-point dedicated circuits.
a. bus design
b. star design
c. full mesh design
d. ring design
e. partial mesh design
Q12. Cloud (as in cloud architecture) means that the design for the common carrier's network comes from satellite networks above the clouds.
a. true
b. false
Q13. A WAN with a ring topology can use full or half duplex circuits.
a. true
b. false
Q14. In North America, a T1 circuit has ______ 64Kbps channels.
a. 2
b. 30
c. 24
d. 12
e. 36
Q15. Another way to refer to dialed services is by the term, plain vanilla telephone service (PVTS).
a. true
b. false
Q16. Which of the following is a primary advantage of a VPN?
a. low cost
b. inflexibility
c. unpredictable traffic congestion
d. security
e. complexity to the user
Q17. The original Integrated Services Digital Network (ISDN) is also known as mediumband ISDN.
a. true
b. false
Q18. Very-high-data-rate DSL uses multiplexing to provide _________ channels.
a. two
b. three
c. four
d. five
e. six
Q19. A(n) ___________ contains a series of cable modems/multiplexers and converts the data from cable modem protocols into protocols needed for Internet traffic, before passing them to a router connected to an ISP POP.
a. Internet steering system
b. optical-electrical converter
c. WAP proxy
d. cable modem termination system
e. fixed wireless system
Q20. A ____________ translates a wireless application request to HTTP and sends it over the Internet to the desired Web server.
a. passive optical scanner
b. local loop
c. cable modem
d. peer
e. WAP proxy
Q21. Network access points were originally designed to connect only local ISPs.
a. true
b. false
Q22. A DSL modem is also known as a:
a. DSL bridge
b. DSL brouter
c. DSL router
d. DSL gateway
e. DSL hub
Q23. Another term for cable networks that use both fiber-optic and coaxial cable is __________.
a. fixed wireless
b. mobile wireless
c. distribution hub
d. hybrid fiber coax
e. fibrax
Q24. Data traffic from the customers premises is sent to a __________ which is located at the local carrier's end office.
a. modem
b. codec
c. DSLAM
d. NIC
e. ATM
Q25. Fiber-to-the-home is another term for satellite fixed wireless technology.
a. true
b. false
Q26. A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.
a. ANI system
b. NAT proxy server
c. IP spoofing bridge
d. packet level firewall
e. smart hub
Q27. With the passage of HIPAA and the Sarbanes-Oxley Act, more and more regulations are addressing security.
a. true
b. false
Q28. A __________ is a router or special purpose computer that examines packets flowing into and out of a network and restricts access to the organization's network.
a. firewall
b. token system
c. ANI
d. call-back modem
e. firefighter
Q29. Intrusion refers to confidentiality and integrity of data.
a. true
b. false
Q30. Threat of intrusion comes from ____________.
a. the government
b. crackers
c. outside of the organization
d. both inside and outside of the organization
e. inside of the organization
Q31. Which of the following is usually the first choice for eavesdropping?
a. unshielded twisted pair
b. shielded twisted pair
c. local cables owned by the organization
d. infrared
e. fiber optics
Q32. A(n) ___________ is one of the most common examples of redundancy built into a network to help reduce the impact of disruption.
a. network cloaking device
b. backup punch card reader
c. uninterruptible power supply
d. service level agreement
e. help desk
Q33. The most common authentication protocol used today is Kerberos.
a. true
b. false
Q34. A(n) _________ is something of value and can be either hardware or software.
a. asset
b. service level agreement
c. threat
d. security plan
e. network design
Q35. Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.
a. application
b. baseline
c. technology design
d. turnpike design
e. backplane design
Q36. The traditional network design approach works very well for rapidly changing networks.
a. true
b. false
Q37. ________ is used to model the behavior of the planned communication network once the proposed network map is complete.
a. Implementation
b. Post-implementation review
c. Documentation
d. Simulation
e. Training users
Q38. Networks requirements can be divided into mandatory, desirable, and wish-list requirements.
a. true
b. false
Q39. The core layer of the network is usually the busiest.
a. true
b. false
Q40. Gaining an understanding of the current application system and messages provides a _________ against which future design requirements can be gauged.
a. backplane
b. baseline
c. turnpike document
d. wish list
e. RFP
Q41. To establish circuit loading, the designer usually starts with the:
a. total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met
b. individual user training
c. bus diameter, disk cache that is used at the server station
d. channel bandwidth and baud rate used at each client
e. local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node
Q42. RFP stands for:
a. Request for Proposal
b. Ring Fault Path
c. Routing File Protocol
d. Record Facsimile Program
e. Redundant File Protocol
Q43. Management reports can be helpful in determining network availability statistics.
a. true
b. false
Q44. User profiles should enable the network manager to identify the access rights (to particular files and directories) for each user.
a. true
b. false
Q45. ____________ are reports produced by numerous network software packages for recording fault information.
a. Wish list documentation
b. Trouble tickets
c. Smart hub lists
d. Bursty router printouts
e. Roger systems checks
Q46. _______ are network devices that record data on the messages they process as well as performing their "normal" message processing functions.
a. Faulty
b. Bursty
c. Trouble tickets
d. Voice-activated
e. Managed devices
Q47. ___________ refers to managing and documenting the network's hardware and software configuration.
a. Visioning
b. Troubleshooting
c. Firefighting
d. Configuration management
e. Implementation
Q48. _____________ is the percentage of time the network is usable by users.
a. Retransmission rate
b. Availability
c. MTTDiagnose
d. Downtime
e. MTBF
Q49. Load balancing is a special software package that permits the network manager to set priority policies for network traffic that take effect when the network becomes busy.
a. true
b. false
Q50. Electronic Software Distribution requires managers to install software on client computers manually.
a. true
b. false
1. b2. b3. b4. a5. a6. b7. e8. a9. a10. a11. d12. b13. a14. c15. b16. a17. b18. b19. d20. e21. b22. c23. d24. c25. b26. b27. a28. a29. b30. d31. d32. c33. a34. a...