Deck 4: Network and Security Management
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/64
Play
Full screen (f)
Deck 4: Network and Security Management
1
________ is the percentage of time that a network is available for use.
A)Availability
B)Downtime
C)QoS
D)none of the above
A)Availability
B)Downtime
C)QoS
D)none of the above
A
2
Latency is usually measured in ________.
A)bits per second (bps)
B)milliseconds (ms)
C)minutes of downtime
D)none of the above
A)bits per second (bps)
B)milliseconds (ms)
C)minutes of downtime
D)none of the above
B
3
Compared to network demand,network budgets are growing ________.
A)faster
B)as fast as it used to be
C)slower
D)both A and C
A)faster
B)as fast as it used to be
C)slower
D)both A and C
C
4
When a packet travels through a network,the time it takes to get from the sender to the receiver is called ________.
A)latency
B)milliseconds
C)jitter
D)throughput
A)latency
B)milliseconds
C)jitter
D)throughput
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
5
In QoS,the S stands for ________.
A)software
B)security
C)service
D)satisfaction
A)software
B)security
C)service
D)satisfaction
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
6
An SLA for latency should specify a ________.
A)maximum latency
B)minimum latency
C)both A and B
D)neither A nor B
A)maximum latency
B)minimum latency
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
7
Jitter is a problem for ________.
A)downloading a file attached to an e-mail
B)e-mail
C)both A and B
D)neither A nor B
A)downloading a file attached to an e-mail
B)e-mail
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
8
An SLA for speed should specify a ________.
A)maximum speed
B)minimum speed
C)both A and B
D)neither A nor B
A)maximum speed
B)minimum speed
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
9
An SLA should specify the ________.
A)best case
B)worst case
C)both A and B
D)neither A nor B
A)best case
B)worst case
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
10
In a coffee shop hot spot,the rated speed is 10 Mbps.Throughput is about half of the rated speed.There are ten people using the hot spot.You and three others are transmitting or receiving at a particular moment.What speed should you expect to get?
A)0)5 Mbps
B)1 Mbps
C)1)25 Mbps
D)2)5 Mbps
A)0)5 Mbps
B)1 Mbps
C)1)25 Mbps
D)2)5 Mbps
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
11
Transmission speed is normally measured in ________.
A)bits per second
B)bytes per second
C)octet per second
D)none of the above
A)bits per second
B)bytes per second
C)octet per second
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
12
QoS is quantified through ________.
A)criteria
B)consensus
C)metrics
D)none of the above
A)criteria
B)consensus
C)metrics
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following usually has higher availability?
A)data networks
B)Public Switched Telephone Network
C)Both of the above usually have equal availability.
D)neither A nor B
A)data networks
B)Public Switched Telephone Network
C)Both of the above usually have equal availability.
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
14
Error rates can soar when the network traffic level ________.
A)is at a high level
B)is at an average level
C)is at a low level
D)none of the above
A)is at a high level
B)is at an average level
C)is at a low level
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
15
An SLA for availability should specify a ________.
A)maximum availability
B)minimum availability
C)both A and B
D)neither A nor B
A)maximum availability
B)minimum availability
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
16
Jitter is a problem for ________.
A)voice over IP (VoIP)
B)streaming media
C)both A and B
D)neither A nor B
A)voice over IP (VoIP)
B)streaming media
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
17
Users of an access point share the transmission capacity of the access point.The throughput a user gets is called the ________.
A)rated speed
B)aggregate throughput
C)individual throughput
D)all of the above
A)rated speed
B)aggregate throughput
C)individual throughput
D)all of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
18
Variability in delay is called ________.
A)jitter
B)variance
C)a QoS failure
D)latency
A)jitter
B)variance
C)a QoS failure
D)latency
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
19
Errors may substantially reduce throughput in ________.(Pick the standard most affected.)
A)IP
B)TCP
C)UDP
D)HTTP
A)IP
B)TCP
C)UDP
D)HTTP
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
20
Throughput is ________.
A)the speed a network actually provides to users
B)a network's rated speed
C)both A and B
D)neither A nor B
A)the speed a network actually provides to users
B)a network's rated speed
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
21
Vulnerabilities are occasionally found in even the best security products.Consequently,companies must ________.
A)have comprehensive security
B)have defense in depth
C)do risk analysis
D)only give minimum permissions
A)have comprehensive security
B)have defense in depth
C)do risk analysis
D)only give minimum permissions
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following would receive the highest priority?
A)video packets
B)e-mail packets
C)World Wide Web packets
D)network management packets
A)video packets
B)e-mail packets
C)World Wide Web packets
D)network management packets
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
23
An SLA for jitter should specify a ________.
A)maximum jitter
B)minimum jitter
C)both A and B
D)neither A nor B
A)maximum jitter
B)minimum jitter
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
24
Overprovisioning is ________.
A)wasteful of capacity
B)highly labor-intensive
C)both A and B
D)neither A nor B
A)wasteful of capacity
B)highly labor-intensive
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
25
Companies should ________ single points of takeover.
A)eliminate
B)pay special attention to
C)multiply
D)authorize
A)eliminate
B)pay special attention to
C)multiply
D)authorize
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
26
There is a single countermeasure in ________.
A)weakest links
B)defense in depth
C)both A and B
D)neither A nor B
A)weakest links
B)defense in depth
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
27
ISPs usually offer QoS guarantees to ________.
A)residential customers
B)business customers
C)both A and B
D)neither A nor B
A)residential customers
B)business customers
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
28
Priority is assigning high priority to ________ applications while giving low priority to ________ applications.
A)latency-tolerant, latency-intolerant
B)latency-intolerant, latency-tolerant
A)latency-tolerant, latency-intolerant
B)latency-intolerant, latency-tolerant
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
29
Balancing threats against protection costs is called ________.
A)economic justification
B)risk analysis
C)comprehensive security
D)defense in depth
A)economic justification
B)risk analysis
C)comprehensive security
D)defense in depth
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
30
A packet will definitely get through if it has ________.
A)QoS reserved capacity
B)priority
C)both A and B
A)QoS reserved capacity
B)priority
C)both A and B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
31
If throughput falls substantially below a QoS guaranteed speed,the ISP ________.
A)always pays a penalty
B)may pay a penalty
C)does not pay a penalty
D)may renegotiate the QoS guarantee for speed
A)always pays a penalty
B)may pay a penalty
C)does not pay a penalty
D)may renegotiate the QoS guarantee for speed
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
32
Which of the following is latency intolerant?
A)video
B)e-mail
C)both A and B
D)neither A nor B
A)video
B)e-mail
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
33
Overprovisioning means ________.
A)assigning high priority to latency-intolerant applications while giving low priority to latency-tolerant applications
B)adding much more switching and transmission line capacity than will be needed most of the time
A)assigning high priority to latency-intolerant applications while giving low priority to latency-tolerant applications
B)adding much more switching and transmission line capacity than will be needed most of the time
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
34
Priority addresses the problem of ________.
A)momentary traffic peaks
B)chronic under-capacity
C)both A and B
D)neither A nor B
A)momentary traffic peaks
B)chronic under-capacity
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following is NOT one of the four major security planning principles?
A)perimeter defense
B)risk analysis
C)comprehensive security
D)defense in depth
A)perimeter defense
B)risk analysis
C)comprehensive security
D)defense in depth
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
36
Momentary traffic peaks can lead to ________.
A)latency
B)packet loss
C)both A and B
D)neither A nor B
A)latency
B)packet loss
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
37
Compared to other methods for reducing problems during momentary traffic peaks,overprovisioning ________.
A)increases capital cost
B)increases labor costs
C)both A and B
D)neither A nor B
A)increases capital cost
B)increases labor costs
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
38
An attacker must break through two firewalls to get to a host.This illustrates the principle called ________.(Select the most specific answer.)
A)comprehensive security
B)risk assurance
C)having a DMZ
D)defense in depth
A)comprehensive security
B)risk assurance
C)having a DMZ
D)defense in depth
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
39
Attackers only need to find a single weakness to break in.Consequently,companies must ________.
A)have comprehensive security
B)have insurance
C)do risk analysis
D)only give minimum permissions
A)have comprehensive security
B)have insurance
C)do risk analysis
D)only give minimum permissions
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
40
Which phase of the plan-protect-respond cycle takes the largest amount of work?
A)plan
B)protect
C)respond
D)The phases require about equal amounts of effort.
A)plan
B)protect
C)respond
D)The phases require about equal amounts of effort.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
41
SNMP agents can initiate ________.
A)Get commands
B)traps
C)both A and B
D)neither A nor B
A)Get commands
B)traps
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
42
SNMP Set commands can ________.
A)ask agents for information about the managed device
B)reroute traffic
C)both A and B
D)neither A nor B
A)ask agents for information about the managed device
B)reroute traffic
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
43
Attacking your own firm occurs in ________.
A)vulnerability testing
B)auditing
C)both A and B
D)neither A nor B
A)vulnerability testing
B)auditing
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
44
Which of the following is true?
A)Guidelines must be followed.
B)Guidelines must be considered.
C)both A and B
D)neither A nor B
A)Guidelines must be followed.
B)Guidelines must be considered.
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
45
Creating switching tables is an example of ________.
A)forwarding
B)routing complexity
C)hardwiring
D)control
A)forwarding
B)routing complexity
C)hardwiring
D)control
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
46
To determine if a host is reachable,you would send a(n)________.
A)SNMP SET command
B)MIB
C)trap
D)ping
A)SNMP SET command
B)MIB
C)trap
D)ping
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
47
A policy specifies ________.
A)what should be done
B)how to do it
C)both A and B
D)neither A nor B
A)what should be done
B)how to do it
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
48
Oversight activities include ________.
A)vulnerability testing
B)creating guidelines
C)both A and B
D)neither A nor B
A)vulnerability testing
B)creating guidelines
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
49
SNMP ________ commands can change how managed devices operate.
A)Get
B)Set
C)both A and B
D)neither A nor B
A)Get
B)Set
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
50
Policies should drive ________.
A)implementation
B)oversight
C)both A and B
D)neither A nor B
A)implementation
B)oversight
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
51
Actions that people are allowed to take on a resource come under the heading of ________.
A)hacks
B)authorizations
C)exploits
D)risks
A)hacks
B)authorizations
C)exploits
D)risks
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
52
In SNMP,the manager communicates directly with the managed device.
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
53
Control is done on individual switches and routers in ________.
A)traditional operation
B)SDN
C)both A and B
D)neither A nor B
A)traditional operation
B)SDN
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
54
Policies are separated by implementation to take advantage of ________.
A)implementer knowledge
B)the delegation of work principle
C)minimum permissions
A)implementer knowledge
B)the delegation of work principle
C)minimum permissions
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
55
Implementation guidance is less specific than ________.
A)policy
B)implementation
C)standards
D)none of the above
A)policy
B)implementation
C)standards
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
56
Another term for authorization is ________.
A)authentication
B)token
C)establishing the creator of a file
D)permission
A)authentication
B)token
C)establishing the creator of a file
D)permission
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
57
If someone has been properly authenticated,they should receive ________ permissions.
A)all
B)no
C)maximum
D)minimum
A)all
B)no
C)maximum
D)minimum
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
58
Which of the following must be followed?
A)standards
B)guidelines
C)both A and B
D)neither A nor B
A)standards
B)guidelines
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
59
The SNMP manager stores the information it receives from Get commands ________.
A)in the MIB
B)on the agent
C)on the managed device
D)in the cloud
A)in the MIB
B)on the agent
C)on the managed device
D)in the cloud
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
60
Which of the following specifies what should be done?
A)policies
B)implementation
C)both A and B
D)neither A nor B
A)policies
B)implementation
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
61
In SDN,which device manages the control function for individual devices?
A)SNMP manager console
B)forwarding device itself
C)SDN policy server
D)SDN controller
A)SNMP manager console
B)forwarding device itself
C)SDN policy server
D)SDN controller
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
62
Which of the following is the easiest to understand?
A)firewall hardware
B)firewall ACLs
C)firewall policies
D)firewall IDSs
A)firewall hardware
B)firewall ACLs
C)firewall policies
D)firewall IDSs
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
63
When a firewall policy server is used to manage SPI firewalls,what device creates specific ACL rules?
A)the policy server
B)the SNMP manager
C)individual firewalls
D)none of the above
A)the policy server
B)the SNMP manager
C)individual firewalls
D)none of the above
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck
64
SDN holds the promise of bringing ________.
A)lower cost
B)lower agility
C)both A and B
D)neither A nor B
A)lower cost
B)lower agility
C)both A and B
D)neither A nor B
Unlock Deck
Unlock for access to all 64 flashcards in this deck.
Unlock Deck
k this deck