Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT repeat the questions. Only submit your answers for example 1.A, 2. B……Ect
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate B. high-speed interface
C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network
interconnection devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network
interconnection devices
D. limited distances, limited capacity, and inappropriate network
interconnection devices
3. Which of following is NOT one of the designs that determines data rate and
distance?
A. the number of senders B. the number of receivers
C. transmission impairment D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth B. attenuation
C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation
C. electromagnetic isolation D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS B. SQL C. API D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server B. minicomputer C. PaaS D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds B. its high overhead
C. the extensive use of in-band signaling D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling B. outband signaling
C. common channel signaling D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell
C. packet D. segment
13. When using ATM, which of the following is NOT one of the advantages for the
use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C.
Exam IT 505Multiple Choice (20 questions , 2 points each)Pleas.docx
1. Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT
repeat the questions. Only submit your answers for example
1.A, 2. B……Ect
1. Which of the following is NOT one of the typical
characteristics of back-end networks?
A. high data rate B. high-speed interface
C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to
interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate
network
interconnection devices
B. insufficient reliability, limited capacity, and limited
distances
C. insufficient reliability, limited distances, and inappropriate
network
interconnection devices
D. limited distances, limited capacity, and inappropriate
network
interconnection devices
3. Which of following is NOT one of the designs that
determines data rate and
distance?
A. the number of senders B. the number of
receivers
C. transmission impairment D. bandwidth
2. 4. The fact that signal strength falls off with distance is called
________________.
A. bandwidth B. attenuation
C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing
characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation
C. electromagnetic isolation D. heavier
weight
6.________ is a set of function and call programs that allow
clients and servers to intercommunicate.
A. IaaS B. SQL C. API D.
Middleware
7. A computer that houses information for manipulation by
networked clients is a __________.
A. server B. minicomputer C. PaaS
D. broker
8. ________ is software that improves connectivity between a
client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is
offset by:
A. its gigabit speeds B. its high
overhead
C. the extensive use of in-band signaling D. the
3. increasing reliability of networks
10. All Frame Relay nodes contain which of the following
protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called
__________.
A. inband signaling B. outband signaling
C. common channel signaling D. open shortest path first
routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell
C. packet D. segment
13. When using ATM, which of the following is NOT one of the
advantages for the
use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C. the network performance and reliability is enhanced
D. channel connection setup times are reduced
14. Which of the following are WAN protocols?
A. Frame Relay B. T-1 C. SONET D. all of the
above
15. Public switched services include which of the following?
A. ISDN B. WAE
C. dial-up/modem D. all of the above
4. 16. Important objectives of computer security include:
A. confidentiality B. integrity
C. availability D. all of the above
17. One type of attack on the security of a computer system or
network that impacts
the availability of a system (e.g. destruction of a resource
in the system) is
referred to as ___________
A. interruption B. interception
C. modification D. all of the above
18. The type of attack on communications lines and networks
known as traffic
analysis belongs to the general category of ____________.
A. active attacks B. passive attacks
C. administrative attacks D. none of the above
19. A secret entry point into a program that allows intruders
aware of the breached
area to gain access and bypass the usual security access
procedures is called a:
A. logic bomb B. Trojan horse
C. virus D. none of the above
20. The primary mechanism used in implementing denial-of-
service attacks is the:
A. worm B. Trojan horse
C. bot D. all of the above
5. Essay Questions
1) Describe what are Backbone Networks and their
characteristics. (10 points)
2) Describe what is Middleware and the role of Middleware in
Client Server architecture(10 points)
3) Describe want is MPLS (Multi Protocol Label Switching) and
what they are designed for?(10 points)
4) Describe the following security mechanisms: (30 points)
a. Authentication
b. Authorization
c. Accounting (Auditing)
d. Data encryption
e. Packet filters
f. Firewalls
g. Intrusion Detection Systems (IDS)
h. Intrusion Prevention Systems (IPS)