Network Data Communications Finals

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Aupchurch3
A
Aupchurch3
Community Contributor
Quizzes Created: 1 | Total Attempts: 124
Questions: 31 | Attempts: 124

SettingsSettingsSettings
Network Data Communications Finals - Quiz


Questions and Answers
  • 1. 

    Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    This statement is true because security on a network involves not only preventing unauthorized access by hackers but also ensuring the availability and continuity of services. In addition to protecting against external threats, network security measures should also include plans and mechanisms to recover from temporary service disruptions or natural disasters. This ensures that even if there is a temporary problem or a disaster, the network can be restored and services can resume as quickly as possible.

    Rate this question:

  • 2. 

    Business continuity planning refers primarily to ensuring availability, with some aspects of data integrity.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Business continuity planning is a process that focuses on ensuring the availability of essential business functions and processes during and after a disaster or disruption. It involves developing strategies, procedures, and systems to minimize downtime and maintain operations. While data integrity is also important in business continuity planning, it is not the primary focus. Therefore, the statement that business continuity planning primarily refers to ensuring availability, with some aspects of data integrity, is true.

    Rate this question:

  • 3. 

     A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization. 

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The given statement is true. A threat to the data communications network refers to any potential occurrence that can cause harm, disrupt the systems utilizing the network, or result in financial loss for the organization. This can include various forms of attacks such as hacking, malware, data breaches, or physical damage to the network infrastructure. It is important for organizations to be aware of these threats and implement appropriate security measures to protect their data communications network.

    Rate this question:

  • 4. 

    Fault-intolerant servers contain many redundant components to prevent failure.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    fault-tolerant

    Rate this question:

  • 5. 

    Often, incidents of ___________ involve employees of the organization, surprisingly enough.

    • A.

      Intrusion

    • B.

      Disruption

    • C.

      Controlled chaos

    • D.

      Destruction

    • E.

      Distaster

    Correct Answer
    A. Intrusion
    Explanation
    Incidents of intrusion often involve employees of the organization, surprisingly enough. This means that employees are the ones who are responsible for unauthorized access or entry into the organization's systems, networks, or physical premises. It is surprising because one would expect outsiders or hackers to be the main perpetrators of intrusion, but in many cases, employees themselves may engage in such activities, either intentionally or unintentionally. This highlights the importance of implementing strong security measures and ensuring proper employee training to prevent and detect intrusions.

    Rate this question:

  • 6. 

    ________ controls discover unwanted events.

    • A.

      Preventative

    • B.

      Corrective

    • C.

      Detective

    • D.

      Mitigating

    • E.

      Backup

    Correct Answer
    C. Detective
    Explanation
    Detective controls are designed to identify and detect unwanted events or activities that may occur within an organization's systems or processes. These controls are proactive in nature and aim to identify potential risks or threats before they can cause significant harm or damage. By implementing detective controls, organizations can quickly identify and respond to any unwanted events, allowing them to take appropriate action to mitigate the impact and prevent future occurrences.

    Rate this question:

  • 7. 

    A(n) ____________, is an information system that is critical to the survival of an organization. 

    • A.

      Network plan

    • B.

      Accounting system

    • C.

      IDS

    • D.

      Mission critical application

    • E.

      Firewall

    Correct Answer
    D. Mission critical application
    Explanation
    A mission critical application refers to an information system that is crucial for the survival and functioning of an organization. It is a software application or system that performs essential tasks and supports core business operations. Failure or disruption of a mission critical application can have severe consequences for the organization, leading to significant financial losses, reputational damage, and operational inefficiencies. Therefore, ensuring the reliability, availability, and performance of such applications is of utmost importance for the organization's overall success and continuity.

    Rate this question:

  • 8. 

    A(n) __________ is any potential adverse occurrence that can do harm, interrupt the system using the network to cause monetary loss to the organization.

    • A.

      Asset

    • B.

      Service level agreement

    • C.

      Threat

    • D.

      Security plan

    • E.

      Network design

    Correct Answer
    C. Threat
    Explanation
    A threat refers to any potential adverse occurrence that can cause harm or interrupt the system using the network, leading to monetary loss for the organization. It can be any malicious activity or event that poses a risk to the organization's assets and security.

    Rate this question:

  • 9. 

    What are the two main types of security problems?

    Correct Answer
    Business continuity and intrusion
    Explanation
    The two main types of security problems are business continuity and intrusion. Business continuity refers to the ability of a company to continue its operations and services in the face of disruptions or disasters. This includes having plans and measures in place to prevent and recover from incidents that could impact the organization's ability to function. On the other hand, intrusion refers to unauthorized access or attacks on a company's systems, networks, or data. This includes activities such as hacking, malware infections, and data breaches. Both business continuity and intrusion are critical aspects of security that organizations need to address to protect their assets and maintain their operations.

    Rate this question:

  • 10. 

    An intruder uses TCP spoofing to send packets to a target computer requesting certain privileges be granted to some user.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    IP Spoofing

    Rate this question:

  • 11. 

    A patch is a software solution to correct a security hole

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A patch is a software solution that is used to fix or correct a security hole. It is a common practice in the software industry to release patches to address vulnerabilities and improve the security of a software system. These patches are typically developed and released by the software vendor or developer to ensure that users have the latest and most secure version of the software. Therefore, the statement "A patch is a software solution to correct a security hole" is true.

    Rate this question:

  • 12. 

    A brute-force attack is a method of trying to guess the correct password by trying every possible key.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A brute-force attack is a method of trying to guess the correct password by systematically trying every possible key. This approach involves trying all possible combinations of characters until the correct password is found. It is a time-consuming process, but it can be effective if the password is weak or if the attacker has enough computational power. Therefore, the statement "A brute-force attack is a method of trying to guess the correct password by trying every possible key" is true.

    Rate this question:

  • 13. 

    Social engineering refers to creating a team that solves virus problems.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Social engineering refers to breaking security simply by asking

    Rate this question:

  • 14. 

    A commodity product or service is one that is widely available and thus offers low profit margins to its providers

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    A commodity product or service refers to something that is easily accessible and readily available in the market. Since it is widely available, there is a high level of competition among providers, which results in low profit margins. This is because customers have many options to choose from, leading to price competition and lower profitability for providers. Therefore, the statement "A commodity product or service is one that is widely available and thus offers low profit margins to its providers" is true.

    Rate this question:

  • 15. 

    Disruptive Innovations (as defined by Christensen) involve radically new technologies

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    creates simpler, more convenient products or services that start by meeting the needs of less-demanding customers

    Rate this question:

  • 16. 

    The traditional network design approach (used before the building block approach) worked very well for rapidly changing networks.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    worked well for slowly evolving networks

    Rate this question:

  • 17. 

    Today, the most expensive part of the network is the hardware.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    the cost of IT staff

    Rate this question:

  • 18. 

    Networks requirements can be divided into mandatory, desirable, and wish-list requirements.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    The statement suggests that network requirements can be categorized into three types: mandatory, desirable, and wish-list requirements. This implies that there are certain requirements that are necessary for the network to function properly (mandatory), some that are preferred but not essential (desirable), and others that are simply desired but not necessary (wish-list). This categorization helps in prioritizing and planning the network design and implementation.

    Rate this question:

  • 19. 

    The turnpike effect results when a network is used at a much lower rate than was anticipated when it was designed.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    means that traffic increases much FASTER than originally forecast

    Rate this question:

  • 20. 

    A sniffer program is a: 

    • A.

      Type of macro-virus

    • B.

      Small peep-hole in a door or wall to allow a security guard to sniff the area with his or her nose before entering a secure area or location

    • C.

      Used in a call-back modem

    • D.

      A program that records all LAN messages received for later (unauthorized) analysis

    • E.

      Secure hub program

    Correct Answer
    D. A program that records all LAN messages received for later (unauthorized) analysis
    Explanation
    A sniffer program is a program that records all LAN messages received for later (unauthorized) analysis. This program is designed to capture and analyze network traffic, allowing users to monitor and analyze the data being transmitted over a network. It can be used for various purposes, including troubleshooting network issues, monitoring network performance, and even unauthorized surveillance.

    Rate this question:

  • 21. 

    __________ refers to the process of translating between one set of private addresses inside a network and a set of public address outside the network.

    • A.

      Translation

    • B.

      Conversion

    • C.

      Network address translation

    • D.

      Proxy translation

    • E.

      IP conversion

    Correct Answer
    C. Network address translation
    Explanation
    Network address translation (NAT) refers to the process of translating between one set of private addresses inside a network and a set of public addresses outside the network. This allows multiple devices with private IP addresses to share a single public IP address, conserving the limited pool of available public addresses. NAT is commonly used in home and small office networks to enable internet connectivity for multiple devices using a single internet connection.

    Rate this question:

  • 22. 

    IP spoofing means to

    • A.

      Fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network

    • B.

      Clad or cover the internal processing (IP) lines with insulating material to shield the IP lines from excess heat or radiation

    • C.

      Illegally tape or listen in on telephone conversations

    • D.

      Detect and prevent denial-of-service attacks

    • E.

      Act as an intermediate host computer between the Internet and the rest of the organization’s networks

    Correct Answer
    A. Fool the target computer and any intervening firewall into believing that messages from the intruder’s computer are actually coming from an authorized user inside the organization’s network
    Explanation
    IP spoofing refers to the act of deceiving the target computer and any firewall in between, making them believe that the messages being sent from the intruder's computer are actually originating from an authorized user within the organization's network. This technique allows the attacker to bypass security measures and gain unauthorized access to sensitive information or carry out malicious activities without being detected easily.

    Rate this question:

  • 23. 

    A(n) _________ is a type of application level firewall that is transparent so that no other computer notices that it is on the network.

    • A.

      ANI System

    • B.

      NAT Proxy Server

    • C.

      IP Spoofing Bridge

    • D.

      Packet level firewall

    • E.

      Smart hub

    Correct Answer
    B. NAT Proxy Server
    Explanation
    A NAT Proxy Server is a type of application level firewall that operates in a transparent manner, meaning it goes unnoticed by other computers on the network. This server acts as an intermediary between the internal network and external network, translating IP addresses and ports to allow communication while hiding the internal network's true identity. It provides an extra layer of security by concealing the internal network from potential threats and unauthorized access.

    Rate this question:

  • 24. 

    A way to prevent intrusion by disguising information through algorithms is:   

    • A.

      Spoofing

    • B.

      Call-back access

    • C.

      Encryption

    • D.

      Disk elevatoring

    • E.

      Disk mirroring

    Correct Answer
    C. Encryption
    Explanation
    Encryption is a method of disguising information through algorithms to prevent intrusion. It involves converting data into a code that can only be accessed or understood by authorized parties who possess the decryption key. This ensures that even if unauthorized individuals gain access to the data, they would not be able to understand or use it without the key. Encryption is widely used in various fields, such as communication, banking, and cybersecurity, to protect sensitive information from being intercepted or compromised.

    Rate this question:

  • 25. 

    The use of computer analysis techniques to gather evidence for criminal and/or civil trials is known as:

    • A.

      Trojan horse

    • B.

      Sniffing

    • C.

      Tunneling

    • D.

      Computer forensics

    • E.

      Misuse detection

    Correct Answer
    D. Computer forensics
    Explanation
    Computer forensics refers to the use of computer analysis techniques to gather evidence for criminal and/or civil trials. It involves collecting, analyzing, and preserving digital evidence from computers and other digital devices. This process helps investigators uncover and document potential digital crimes, such as hacking, data breaches, or cyberattacks, and provides valuable evidence that can be used in legal proceedings. By examining digital artifacts, logs, and other data, computer forensics experts can reconstruct events, identify perpetrators, and support or refute claims in court.

    Rate this question:

  • 26. 

    Which of the following is not an essential characteristic of cloud computing services:

    • A.

      They are offered over a web interface

    • B.

      They are accessible over a network

    • C.

      Resources can be rapidly scaled in and out

    • D.

      One can keep precise records of resources consumption

    • E.

      Resources are used by multiple users at the same time

    Correct Answer
    A. They are offered over a web interface
    Explanation
    Cloud computing services are typically offered over a web interface, making them easily accessible from any device with an internet connection. This allows users to access the services remotely without the need for physical infrastructure. However, the fact that cloud computing services are offered over a web interface is not an essential characteristic of cloud computing. The essential characteristics include accessibility over a network, rapid scalability of resources, the ability to keep precise records of resource consumption, and the sharing of resources among multiple users simultaneously.

    Rate this question:

  • 27. 

    In __________, the network designer considers the relative cost of the technologies.  

    • A.

      Technology design

    • B.

      Needs analysis

    • C.

      Narrow and deep analysis

    • D.

      Cost assessment

    • E.

      Distribution layering

    Correct Answer
    D. Cost assessment
    Explanation
    The network designer considers the relative cost of the technologies in order to make an informed decision about which technology to choose. This involves evaluating the cost of implementing and maintaining each technology and comparing it to the benefits it provides. By conducting a cost assessment, the designer can determine the most cost-effective solution for the network design.

    Rate this question:

  • 28. 

    In designing LAN networks, network designers tend to err on the sid of building too small a network

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Network designers tend to err on the side of building too small a network because it is easier and more cost-effective to expand a small network than to deal with the challenges of managing and troubleshooting a large network. Building a small network initially allows for better control and scalability, as resources can be easily added or adjusted as needed. Additionally, a smaller network reduces the risk of congestion and performance issues, ensuring better overall network performance and user experience.

    Rate this question:

  • 29. 

    Which of the following are included in the key deliverable for the needs assessment stage, the set of logical network diagrams?

    • A.

      Applications of the proposed network

    • B.

      Servers in the proposed network

    • C.

      Circuits in the proposed network

    • D.

      Specific routers that have been chosen to implement the proposed network

    • E.

      Clients in the proposed network

    Correct Answer(s)
    A. Applications of the proposed network
    B. Servers in the proposed network
    C. Circuits in the proposed network
    E. Clients in the proposed network
    Explanation
    The key deliverable for the needs assessment stage, the set of logical network diagrams, includes the applications of the proposed network, servers in the proposed network, circuits in the proposed network, and clients in the proposed network. These components are essential to understanding and visualizing the structure and functionality of the proposed network. However, specific routers that have been chosen to implement the proposed network are not included in the key deliverable for the needs assessment stage.

    Rate this question:

  • 30. 

    Which of the following is not a main item for which network designers estimate costs for the proposed network? 

    • A.

      Software

    • B.

      Hardware

    • C.

      Purchasing and installing circuits

    • D.

      Users' furniture

    • E.

      Circuits provided by common carriers

    Correct Answer
    D. Users' furniture
    Explanation
    Network designers estimate costs for the proposed network by considering various factors such as software, hardware, purchasing and installing circuits, and circuits provided by common carriers. However, users' furniture is not a main item for which network designers estimate costs. The cost of users' furniture is typically not directly related to the network infrastructure and is usually the responsibility of the users themselves.

    Rate this question:

  • 31. 

    RFP stands for:

    Correct Answer
    Request for proposal
    Explanation
    RFP stands for Request for Proposal. This term is commonly used in business and procurement processes. When a company or organization is looking to purchase goods or services, they issue an RFP to potential suppliers or vendors. The RFP outlines the requirements and specifications for the desired product or service and invites the vendors to submit a proposal detailing how they would meet those requirements. The company can then evaluate the proposals and choose the vendor that best meets their needs.

    Rate this question:

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Apr 19, 2024
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 13, 2010
    Quiz Created by
    Aupchurch3
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.