Deck 4: Network and Security Management

Full screen (f)
exit full mode
Question
________ is the percentage of time that a network is available for use.

A)Availability
B)Downtime
C)QoS
D)none of the above
Use Space or
up arrow
down arrow
to flip the card.
Question
Latency is usually measured in ________.

A)bits per second (bps)
B)milliseconds (ms)
C)minutes of downtime
D)none of the above
Question
Compared to network demand,network budgets are growing ________.

A)faster
B)as fast as it used to be
C)slower
D)both A and C
Question
When a packet travels through a network,the time it takes to get from the sender to the receiver is called ________.

A)latency
B)milliseconds
C)jitter
D)throughput
Question
In QoS,the S stands for ________.

A)software
B)security
C)service
D)satisfaction
Question
An SLA for latency should specify a ________.

A)maximum latency
B)minimum latency
C)both A and B
D)neither A nor B
Question
Jitter is a problem for ________.

A)downloading a file attached to an e-mail
B)e-mail
C)both A and B
D)neither A nor B
Question
An SLA for speed should specify a ________.

A)maximum speed
B)minimum speed
C)both A and B
D)neither A nor B
Question
An SLA should specify the ________.

A)best case
B)worst case
C)both A and B
D)neither A nor B
Question
In a coffee shop hot spot,the rated speed is 10 Mbps.Throughput is about half of the rated speed.There are ten people using the hot spot.You and three others are transmitting or receiving at a particular moment.What speed should you expect to get?

A)0)5 Mbps
B)1 Mbps
C)1)25 Mbps
D)2)5 Mbps
Question
Transmission speed is normally measured in ________.

A)bits per second
B)bytes per second
C)octet per second
D)none of the above
Question
QoS is quantified through ________.

A)criteria
B)consensus
C)metrics
D)none of the above
Question
Which of the following usually has higher availability?

A)data networks
B)Public Switched Telephone Network
C)Both of the above usually have equal availability.
D)neither A nor B
Question
Error rates can soar when the network traffic level ________.

A)is at a high level
B)is at an average level
C)is at a low level
D)none of the above
Question
An SLA for availability should specify a ________.

A)maximum availability
B)minimum availability
C)both A and B
D)neither A nor B
Question
Jitter is a problem for ________.

A)voice over IP (VoIP)
B)streaming media
C)both A and B
D)neither A nor B
Question
Users of an access point share the transmission capacity of the access point.The throughput a user gets is called the ________.

A)rated speed
B)aggregate throughput
C)individual throughput
D)all of the above
Question
Variability in delay is called ________.

A)jitter
B)variance
C)a QoS failure
D)latency
Question
Errors may substantially reduce throughput in ________.(Pick the standard most affected.)

A)IP
B)TCP
C)UDP
D)HTTP
Question
Throughput is ________.

A)the speed a network actually provides to users
B)a network's rated speed
C)both A and B
D)neither A nor B
Question
Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.

A)have comprehensive security
B)have defense in depth
C)do risk analysis
D)only give minimum permissions
Question
Which of the following would receive the highest priority?

A)video packets
B)e-mail packets
C)World Wide Web packets
D)network management packets
Question
An SLA for jitter should specify a ________.

A)maximum jitter
B)minimum jitter
C)both A and B
D)neither A nor B
Question
Overprovisioning is ________.

A)wasteful of capacity
B)highly labor-intensive
C)both A and B
D)neither A nor B
Question
Companies should ________ single points of takeover.

A)eliminate
B)pay special attention to
C)multiply
D)authorize
Question
There is a single countermeasure in ________.

A)weakest links
B)defense in depth
C)both A and B
D)neither A nor B
Question
ISPs usually offer QoS guarantees to ________.

A)residential customers
B)business customers
C)both A and B
D)neither A nor B
Question
Priority is assigning high priority to ________ applications while giving low priority to ________ applications.

A)latency-tolerant, latency-intolerant
B)latency-intolerant, latency-tolerant
Question
Balancing threats against protection costs is called ________.

A)economic justification
B)risk analysis
C)comprehensive security
D)defense in depth
Question
A packet will definitely get through if it has ________.

A)QoS reserved capacity
B)priority
C)both A and B
Question
If throughput falls substantially below a QoS guaranteed speed,the ISP ________.

A)always pays a penalty
B)may pay a penalty
C)does not pay a penalty
D)may renegotiate the QoS guarantee for speed
Question
Which of the following is latency intolerant?

A)video
B)e-mail
C)both A and B
D)neither A nor B
Question
Overprovisioning means ________.

A)assigning high priority to latency-intolerant applications while giving low priority to latency-tolerant applications
B)adding much more switching and transmission line capacity than will be needed most of the time
Question
Priority addresses the problem of ________.

A)momentary traffic peaks
B)chronic under-capacity
C)both A and B
D)neither A nor B
Question
Which of the following is NOT one of the four major security planning principles?

A)perimeter defense
B)risk analysis
C)comprehensive security
D)defense in depth
Question
Momentary traffic peaks can lead to ________.

A)latency
B)packet loss
C)both A and B
D)neither A nor B
Question
Compared to other methods for reducing problems during momentary traffic peaks,overprovisioning ________.

A)increases capital cost
B)increases labor costs
C)both A and B
D)neither A nor B
Question
An attacker must break through two firewalls to get to a host.This illustrates the principle called ________.(Select the most specific answer.)

A)comprehensive security
B)risk assurance
C)having a DMZ
D)defense in depth
Question
Attackers only need to find a single weakness to break in.Consequently,companies must ________.

A)have comprehensive security
B)have insurance
C)do risk analysis
D)only give minimum permissions
Question
Which phase of the plan-protect-respond cycle takes the largest amount of work?

A)plan
B)protect
C)respond
D)The phases require about equal amounts of effort.
Question
SNMP agents can initiate ________.

A)Get commands
B)traps
C)both A and B
D)neither A nor B
Question
SNMP Set commands can ________.

A)ask agents for information about the managed device
B)reroute traffic
C)both A and B
D)neither A nor B
Question
Attacking your own firm occurs in ________.

A)vulnerability testing
B)auditing
C)both A and B
D)neither A nor B
Question
Which of the following is true?

A)Guidelines must be followed.
B)Guidelines must be considered.
C)both A and B
D)neither A nor B
Question
Creating switching tables is an example of ________.

A)forwarding
B)routing complexity
C)hardwiring
D)control
Question
To determine if a host is reachable,you would send a(n)________.

A)SNMP SET command
B)MIB
C)trap
D)ping
Question
A policy specifies ________.

A)what should be done
B)how to do it
C)both A and B
D)neither A nor B
Question
Oversight activities include ________.

A)vulnerability testing
B)creating guidelines
C)both A and B
D)neither A nor B
Question
SNMP ________ commands can change how managed devices operate.

A)Get
B)Set
C)both A and B
D)neither A nor B
Question
Policies should drive ________.

A)implementation
B)oversight
C)both A and B
D)neither A nor B
Question
Actions that people are allowed to take on a resource come under the heading of ________.

A)hacks
B)authorizations
C)exploits
D)risks
Question
In SNMP,the manager communicates directly with the managed device.
Question
Control is done on individual switches and routers in ________.

A)traditional operation
B)SDN
C)both A and B
D)neither A nor B
Question
Policies are separated by implementation to take advantage of ________.

A)implementer knowledge
B)the delegation of work principle
C)minimum permissions
Question
Implementation guidance is less specific than ________.

A)policy
B)implementation
C)standards
D)none of the above
Question
Another term for authorization is ________.

A)authentication
B)token
C)establishing the creator of a file
D)permission
Question
If someone has been properly authenticated,they should receive ________ permissions.

A)all
B)no
C)maximum
D)minimum
Question
Which of the following must be followed?

A)standards
B)guidelines
C)both A and B
D)neither A nor B
Question
The SNMP manager stores the information it receives from Get commands ________.

A)in the MIB
B)on the agent
C)on the managed device
D)in the cloud
Question
Which of the following specifies what should be done?

A)policies
B)implementation
C)both A and B
D)neither A nor B
Question
In SDN,which device manages the control function for individual devices?

A)SNMP manager console
B)forwarding device itself
C)SDN policy server
D)SDN controller
Question
Which of the following is the easiest to understand?

A)firewall hardware
B)firewall ACLs
C)firewall policies
D)firewall IDSs
Question
When a firewall policy server is used to manage SPI firewalls,what device creates specific ACL rules?

A)the policy server
B)the SNMP manager
C)individual firewalls
D)none of the above
Question
SDN holds the promise of bringing ________.

A)lower cost
B)lower agility
C)both A and B
D)neither A nor B
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/64
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 4: Network and Security Management
1
________ is the percentage of time that a network is available for use.

A)Availability
B)Downtime
C)QoS
D)none of the above
A
2
Latency is usually measured in ________.

A)bits per second (bps)
B)milliseconds (ms)
C)minutes of downtime
D)none of the above
B
3
Compared to network demand,network budgets are growing ________.

A)faster
B)as fast as it used to be
C)slower
D)both A and C
C
4
When a packet travels through a network,the time it takes to get from the sender to the receiver is called ________.

A)latency
B)milliseconds
C)jitter
D)throughput
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
5
In QoS,the S stands for ________.

A)software
B)security
C)service
D)satisfaction
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
6
An SLA for latency should specify a ________.

A)maximum latency
B)minimum latency
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
7
Jitter is a problem for ________.

A)downloading a file attached to an e-mail
B)e-mail
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
8
An SLA for speed should specify a ________.

A)maximum speed
B)minimum speed
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
9
An SLA should specify the ________.

A)best case
B)worst case
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
10
In a coffee shop hot spot,the rated speed is 10 Mbps.Throughput is about half of the rated speed.There are ten people using the hot spot.You and three others are transmitting or receiving at a particular moment.What speed should you expect to get?

A)0)5 Mbps
B)1 Mbps
C)1)25 Mbps
D)2)5 Mbps
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
11
Transmission speed is normally measured in ________.

A)bits per second
B)bytes per second
C)octet per second
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
12
QoS is quantified through ________.

A)criteria
B)consensus
C)metrics
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following usually has higher availability?

A)data networks
B)Public Switched Telephone Network
C)Both of the above usually have equal availability.
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
14
Error rates can soar when the network traffic level ________.

A)is at a high level
B)is at an average level
C)is at a low level
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
15
An SLA for availability should specify a ________.

A)maximum availability
B)minimum availability
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
16
Jitter is a problem for ________.

A)voice over IP (VoIP)
B)streaming media
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
17
Users of an access point share the transmission capacity of the access point.The throughput a user gets is called the ________.

A)rated speed
B)aggregate throughput
C)individual throughput
D)all of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
18
Variability in delay is called ________.

A)jitter
B)variance
C)a QoS failure
D)latency
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
19
Errors may substantially reduce throughput in ________.(Pick the standard most affected.)

A)IP
B)TCP
C)UDP
D)HTTP
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
20
Throughput is ________.

A)the speed a network actually provides to users
B)a network's rated speed
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
21
Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.

A)have comprehensive security
B)have defense in depth
C)do risk analysis
D)only give minimum permissions
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following would receive the highest priority?

A)video packets
B)e-mail packets
C)World Wide Web packets
D)network management packets
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
23
An SLA for jitter should specify a ________.

A)maximum jitter
B)minimum jitter
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
24
Overprovisioning is ________.

A)wasteful of capacity
B)highly labor-intensive
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
25
Companies should ________ single points of takeover.

A)eliminate
B)pay special attention to
C)multiply
D)authorize
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
26
There is a single countermeasure in ________.

A)weakest links
B)defense in depth
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
27
ISPs usually offer QoS guarantees to ________.

A)residential customers
B)business customers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
28
Priority is assigning high priority to ________ applications while giving low priority to ________ applications.

A)latency-tolerant, latency-intolerant
B)latency-intolerant, latency-tolerant
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
29
Balancing threats against protection costs is called ________.

A)economic justification
B)risk analysis
C)comprehensive security
D)defense in depth
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
30
A packet will definitely get through if it has ________.

A)QoS reserved capacity
B)priority
C)both A and B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
31
If throughput falls substantially below a QoS guaranteed speed,the ISP ________.

A)always pays a penalty
B)may pay a penalty
C)does not pay a penalty
D)may renegotiate the QoS guarantee for speed
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is latency intolerant?

A)video
B)e-mail
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
33
Overprovisioning means ________.

A)assigning high priority to latency-intolerant applications while giving low priority to latency-tolerant applications
B)adding much more switching and transmission line capacity than will be needed most of the time
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
34
Priority addresses the problem of ________.

A)momentary traffic peaks
B)chronic under-capacity
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is NOT one of the four major security planning principles?

A)perimeter defense
B)risk analysis
C)comprehensive security
D)defense in depth
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
36
Momentary traffic peaks can lead to ________.

A)latency
B)packet loss
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
37
Compared to other methods for reducing problems during momentary traffic peaks,overprovisioning ________.

A)increases capital cost
B)increases labor costs
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
38
An attacker must break through two firewalls to get to a host.This illustrates the principle called ________.(Select the most specific answer.)

A)comprehensive security
B)risk assurance
C)having a DMZ
D)defense in depth
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
39
Attackers only need to find a single weakness to break in.Consequently,companies must ________.

A)have comprehensive security
B)have insurance
C)do risk analysis
D)only give minimum permissions
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
40
Which phase of the plan-protect-respond cycle takes the largest amount of work?

A)plan
B)protect
C)respond
D)The phases require about equal amounts of effort.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
41
SNMP agents can initiate ________.

A)Get commands
B)traps
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
42
SNMP Set commands can ________.

A)ask agents for information about the managed device
B)reroute traffic
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
43
Attacking your own firm occurs in ________.

A)vulnerability testing
B)auditing
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is true?

A)Guidelines must be followed.
B)Guidelines must be considered.
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
45
Creating switching tables is an example of ________.

A)forwarding
B)routing complexity
C)hardwiring
D)control
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
46
To determine if a host is reachable,you would send a(n)________.

A)SNMP SET command
B)MIB
C)trap
D)ping
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
47
A policy specifies ________.

A)what should be done
B)how to do it
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
48
Oversight activities include ________.

A)vulnerability testing
B)creating guidelines
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
49
SNMP ________ commands can change how managed devices operate.

A)Get
B)Set
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
50
Policies should drive ________.

A)implementation
B)oversight
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
51
Actions that people are allowed to take on a resource come under the heading of ________.

A)hacks
B)authorizations
C)exploits
D)risks
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
52
In SNMP,the manager communicates directly with the managed device.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
53
Control is done on individual switches and routers in ________.

A)traditional operation
B)SDN
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
54
Policies are separated by implementation to take advantage of ________.

A)implementer knowledge
B)the delegation of work principle
C)minimum permissions
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
55
Implementation guidance is less specific than ________.

A)policy
B)implementation
C)standards
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
56
Another term for authorization is ________.

A)authentication
B)token
C)establishing the creator of a file
D)permission
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
57
If someone has been properly authenticated,they should receive ________ permissions.

A)all
B)no
C)maximum
D)minimum
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following must be followed?

A)standards
B)guidelines
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
59
The SNMP manager stores the information it receives from Get commands ________.

A)in the MIB
B)on the agent
C)on the managed device
D)in the cloud
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following specifies what should be done?

A)policies
B)implementation
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
61
In SDN,which device manages the control function for individual devices?

A)SNMP manager console
B)forwarding device itself
C)SDN policy server
D)SDN controller
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is the easiest to understand?

A)firewall hardware
B)firewall ACLs
C)firewall policies
D)firewall IDSs
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
63
When a firewall policy server is used to manage SPI firewalls,what device creates specific ACL rules?

A)the policy server
B)the SNMP manager
C)individual firewalls
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
64
SDN holds the promise of bringing ________.

A)lower cost
B)lower agility
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 64 flashcards in this deck.