Net Analysis Test Review (Past 3 in class Quiz Questions)

Network Management can be divided into several different categories, based upon the needs of a particular network. The three primary considerations are(1 ANSWER PER LINE)
Conflicts are events or factors that can directly influence the completion of a project. One of the biggest conflicts or trade-offs is between __________ & __________ (1 ANSWER PER LINE)
List the three main cloud service delivery models identified in class. (Hint: They are often identified by 4 letter acronyms). Acronpns are not adequate. You MUST state the entire service model name. (1 ANSWER PER LINE)
Link state protocols allow a network administrator to divide a network into routing sub-domains called areas. These areas are then assigned a unique __________
Autonomous System Number
IP Address
Subnet Mask
Network ID
CISCO identifies three switctiing levels, Core-Distribution-Access. In class I illustrated two primary switching levels, _______ switches and______switches.(1 ANSWER PER LINE)
A collapsed backbone has high bandwidth ______ from all segments and sub-networks to a_________device, such as a Gigabit switch that can serve as a single point for __________ and ___________ the network. (1 ANSWER PER LINE)
What does the acronym RFC stand for?
What governing body is responsible for RFC publications?
List the three types of firewalls discussed in class.(1 ANSWER PER LINE)
A firewall's configuration is referred to as a "stance." What are the two different stance discussed in class?(1 ANSWER PER LINE)
Some switch vendors have implemented a __________ ___________feature that limits the number of broadcast frames a switch will forward.(BOTH WORDS ONE LINE)
The Inputs to the Logical Design Phase are:
Requirements and Traffic Specification
Traffic and Baseline documents
User and Application Requirements Documents
Application and Network Requirements Specifications
The most common tradeoffs that take place in Network Design are:
Cost and Vendor Selection
Cost and Performance
Performance and Service Levels
One Time Only vs. Recurring Costs
Network Management Considerations would NOT include which of the following:
Network Troubleshooting
Network Configuration
Network Monitoring
Network Equipment Purchasing
Broadcast traffic is traffic that:
Is application related
Is user data related
Is network management related
Is network services related
Which term below is NOT used to identify groups or people involved in the supply and/or use of cloud services?
Cloud Service Provider
Cloud Service Administrator
Cloud Consumer
Cloud Providers
Switches make their switching decision based on
Source Address of a packet
Destination Address of a packet
Source Address of a Frame
Destination address of a frame
A level two switching device is one that switches:
Frames
Packets
Datagrams
Messages
Which term below is NOT a benefit of Cloud Computing?
Rapid Redundancy
Lower TCO
Measured Services
On-Demand Self Service
A Gateway would most likely be considered if: .
Two system architectures need connecting
Two different cable types need connecting
Type link layer protocols need connecting
Speed ot data transfer was of utmost importance
Routers are used to forward what type of information unit:
Messages
Frames
Packets
Bits
You may recall in class that we spoke about Routers, and the 4 things they provide. List them here; (1 ANSWER PER LINE)
The Ethernet standard specifies the 5-4-3 rule. This means that; There are no more than four signal regenerations, (repeaters), creating five ______________ and only three of which can be_________with nodes.(1 ANSWER PER LINE)
Regular baselining of a network can help an administrator; Proactively prevent ___________,Minimize user _____________,and, increase network____________(1 ANSWER PER LINE)
The Term __________ _____________ describes how busy a processor is.(BOTH WORDS ONE LINE)
The transmission speed across a cable and the ratio of frame overhead to frame data is characterized by the term__________(difference between max/min available frequencies)
Uptime
Broadcast
Bandwidth
Latency
He additional software processing performed by a router can increase packet,___________
The 40% Rule. This is an arbitrary ____________ value. When utilization reaches or is consistently at or above 40%, it's time for an upgrade.
We discussed four steps used to estimate traffic volume. List them IN ORDER.(1 STEP PER LINE)
Router create__________domains. Switches create____________domains(1 ANSWER PER LINE)
When considering end-to-end delay across a wide area network, which part of the network would most likely cause the longest delay?
The Server 1/0
A Wide Area Link
A Local Area Network Link
Client Redirector Software
As the CPU utilization of a network component increases, what happens to the overall network response time and component latency?
The component latency goes up and the response time goes down
The component latency goes down and the response time goes down
The component latency increases and the response time increases
The component latency increases and the response time decreases
In a ClienUServer environment, the lapsed time between a request and a response is referred to as:
Response time
Latency
Delay
Network latency
Utilization normally refers to what two areas of networking:
CPU and processor
Processor and router
CPU and network access device
CPU and Link
As CPU utilization of a network component increases, normally response time:
Remains flat
Increases
Decreases
Can't easily be measured
Considering the most modern technologies of today, which of the following provides the most bandwidth?
Dial-up using modems
ISDN basic rate
Ethernet LAN
T3
The 80-20 rule no longer properly describes modern traffic patterns in today's network environments. This is due to a number of factors. What is NOT one of these factors?
Storage Area Networks
Intranet Traffic
Cloud Computing
Database environments
Which of the following is NOT a common type of traffic distribution?
Peer-to-peer
Client/server
Server/client
Peer-to-server
An example of a logical traffic boundary would be:
VLAN boundary
A WAN boundary
A server Boundary
A client Boundary
The 80/20 rule refers to:
The amount of traffic that contains user data
The traffic distribution that is data versus voice
The amount of traffic that is local versus remote
The traffic distribution that is sent to a server versus another client
Baselining a network is important to establish:
Network costs
Capacity trends and requirements
Traffic types
Hardware and software requirements
If you suspect performance problem with a particular server, you should:
Monitor the backbone traffic
Monitor the peer-to-peer traffic
Monitor the server's CPU utilization
Increase the bandwidth going to and from the Server
The output of the Traffic Analysis Phase is
Traffic Pattern Specification Document
Traffic Specification
Requirements Gathering Specification Document
CPU Baseline
To properly capture traffic crossing a switch, you need a SPAN port or Port Mirroring enabled. SPAN means?
Specific Port Access
Shared Port Analyzer
Switch Port Access
Switch Port Analyzer
List the three measurement tools identified to 􀁼asure the "utilization of shared resources" on a network.(1 ANSWER PER LINE)
CS MA/CD stands for what? ______ ________ ________ _______ / ________ _________
Scalability or the_____________ of ___________provisioning in the Cloud, eliminates growth issue/concerns for its customers.'s one of the greatest advantages that Cloud Technologies provide.(1 ANSWER PER LINE)
The _______________ time ________________is the targeted duration of time within which a business process must be restored after a disaster (or disruption) in order to avoid unacceptable consequences associated with a break in Business Continuity.(1 ANSWER PER LINE)
Besides dissatisfied end users and management, list 3 other problems that can be avoided by using a formal design process.(1 ANSWER PER LINE)
List the five general steps or stages of the waterfall cycle, IN ORDER(1 STEP PER LINE)
Looking at Life Cycles, the guiding principle behind the spiral cycle is__________ ____________(BOTH WORDS ONE LINE)
List three cost factors or results that come into play when a network failure occurs(1 ANSWER PER LINE)
In class we identified 4 main types of computing hardware/platforms.
Recall I mentioned the goals of the first two Phases, referring to understanding the entire concept of the course, thinking of such, finish this statement. ______________shows you where you need to be. ______________________shows you where you currently are. (1 ANSWER PER LINE)
In general, you will work with two types of key players: They are ____________________ _________________and ____________________ ___________________(1 ANSWER PER LINE)
11.List 4 of the 5 common methods mentioned in class used to gather requirements from user groups. (1 ANSWER PER LINE)
List three inherent capabilities of leading-edge mainframe systems.(1 ANSWER PER LINE)
List the three different modes of network management.(1 ANSWER PER LINE)
The first phase of the network design process would be
Analysis Specification
Network Analysis
Requirements Analysis
Requirements Gathering
The Network Design Process can use which of the following systems development life cycles:
Waterfall
SDLC
IEEE development life cycle
SLA development processes
Which of the following should NOT be a factor in the Network Design Process:
Expertise of the Design Consulting Team
Current Network Configuration
Organizational Goals
Monthly Cost of Implementing a Solution
Which of the following is NOT a phase in the Network Design Process:
Requirements Gathering
Hardware Design
Logical Design
Physical Design
What is Cloud Computing replacing?
Corporate Data Centers
Expensive personal computing hardware
Expensive software upgrades
All of the above
What is the number one concern about Cloud Computing?
A shift in the IT employment landscape (job loss)
Security
Complexity of the various implementation models
Accurate metering or Time-of-Use accounting/billing
What is NOT a common classification of an Operating System?
Multi-Purposing
Multi-Processing
Multi-Threading
Multi-Tasking
Which answer was NOT identified as a focused policy and procedure for Change Management in the Cloud?
The development and acquisition of new infrastructure
Quality evaluation of new software
Adequate oversight of all system changes, including testing and deployment procedures
Monitoring the installation of unauthorized hardware and/or software
What does RISC stand for?
What does CISC stand for?
List the 5 Phases of the Network Design Process, NOT the deliverables. The answers are all multi word responses. Please Note; Your answers must be in order.(1 ANSWER PER LINE)
Secure Data in the Cloud has a Life Cycle. Which answer correctly identifies the phases in order?
Create - Use - Share - Store - Delete
Create - Classify - Use - Share - Archive - Delete
Create - Store - Share - Archive - Destroy
Create - Store - Use - Share -Archive - Destroy
Which of the following is NOT an area that is considered in the Requirements Gathering phase:
Computing Platforms
Business Requirements
Application Requirements
Technology Choices
Which of the following is NOT an Objective of Change Management in the Cloud?
Ensure that changes are recorded and documented
Optimize overall business risk ·
Respond to business and IT requests for change, (to align services with business needs)
Ensure that unauthorized changes are prioritized, planned, and tested before implementation
Mainframe applications are typically geared toward:
Transaction processing
LAN traffic
Off-line processing
Engineering systems
During which analysis and design phase do we make technology choices:
Network Analysis
Requirements Analysis
Logical Design
Physical Design
Which of the following is NOT an operating system found in corporate networks:
Windows 7
UNIX
SCSI
Yosemite
Which of the following is NOT a stand-alone NOS:
Windows Server 2012R2
Banyan Vines
Novell NetWare
TCP/IP
Thepart of the requirements analysis phase that would consider the operating systems in use would be:
User Requirements
Application Requirements
Computing Platform Requirements
Network Requirements
Which one of the following is NOT considered a network management task:
Fault management
Security
Accounting
Active management
Monitoring the state of a bridge's WAN links would be an example of:
Fault management
Security management
Accounting
Active management
{"name":"Net Analysis Test Review (Past 3 in class Quiz Questions)", "url":"https://www.quiz-maker.com/QPREVIEW","txt":"Network Management can be divided into several different categories, based upon the needs of a particular network. The three primary considerations are(1 ANSWER PER LINE), Conflicts are events or factors that can directly influence the completion of a project. One of the biggest conflicts or trade-offs is between __________ & __________ (1 ANSWER PER LINE), List the three main cloud service delivery models identified in class. (Hint: They are often identified by 4 letter acronyms). Acronpns are not adequate. You MUST state the entire service model name. (1 ANSWER PER LINE)","img":"https://www.quiz-maker.com/3012/images/ogquiz.png"}
Powered by: Quiz Maker