Exam IT 505
Multiple Choice (20 questions , 2 points each)
Please Submit a word document of your exam. Please DO NOT repeat the questions. Only submit your answers for example 1.A, 2. B……Ect
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate B. high-speed interface C. distributed access D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices
on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network
interconnection devices B. insufficient reliability, limited capacity, and limited distances C. insufficient reliability, limited distances, and inappropriate network
interconnection devices D. limited distances, limited capacity, and inappropriate network
interconnection devices
3. Which of following is NOT one of the designs that determines data rate and
distance?
A. the number of senders B. the number of receivers C. transmission impairment D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth B. attenuation C. resistance D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical
fiber cables compared with twisted pair or coaxial cables?
A. greater capacity B. lower attenuation C. electromagnetic isolation D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS B. SQL C. API D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server B. minicomputer C. PaaS D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL B. API C. Middleware D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds B. its high overhead C. the extensive use of in-band signaling D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB B. LAPD
C. LAPF Core D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling B. outband signaling C. common channel signaling D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame B. cell C. packet D. segment
13. When using ATM, which of the following is NOT one of the advantages for the
use of virtual paths?
A. less work is needed to set a virtual path B. the network architecture is simplified C. the network performance and reliability is enhanced
D. channel connection setup times are reduced
14. Which of the following are WAN protocols?
A. Frame Relay B. T-1 C. SONET D. all of the above
15. Public switched services include which of the following?
A. ISDN B. WAE
C. dial-up/modem D. all of the above
16. Important objectives of computer security include:
A. confidentiality B. integrity
C. availability D. all of the above
17. One type of attack on the security of a computer system or network that impacts
the availability of a system (e.g. destruction of a resource in the system) is
referred to as ___________
A. interruption B. interception
C. modification D. all of the above
18. The type of attack on communications lines and networks known as traffic
analysis belongs to the general category of ____________.
A. active attacks B. passive attacks
C. administrative attacks D. none of the above
19. A secret entry point into a program that allows intruders aware of the breached
area to gain access and bypass the usual security access procedures is called a:
A. logic bomb B. Trojan horse
C. virus D. none of the above
20. The primary mechanism used in implementing denial-of-service attacks is the:
A. worm B. Trojan horse
C. bot D. all of the above
Essay Questions
1) Describe what are Backbone Networks and their characteristics. (10 points)
2) Describe what is Middleware and the role of Middleware in Client Server architecture(10 points)
3) Describe want is MPLS (Multi Protocol Label Switching) and what they are designed for?(10 points)
4) Describe the following security mechanisms: (30 points)
a. Authentication
b. Authorization
c. Accounting (Auditing)
d. Data encryption
e. Packet filters
f. Firewalls
g. Intrusion Detection Systems (IDS)
h. Intrusion Prevention Systems (IPS)