Name: 
 

CS-440 Final Review



True/False
Indicate whether the statement is true or false.
 

 1. 

Human errors, ignorance, and omissions cause more than half of all security breaches sustained by networks.
 

 2. 

Network security is more often compromised “from the inside” than from external sources.
 

 3. 

A security policy should state exactly which hardware, software, architecture, or protocols will be used to ensure security.
 

 4. 

Encryption is the last means of defense against data theft.
 

 5. 

By default, the 802.11 standard offers substantial security.
 

 6. 

All VoIP calls are carried over the Internet.
 

 7. 

IP telephones are directly connected to the local loop.
 

 8. 

An off-the-shelf workstation can be programmed to act like an IP telephone.
 

 9. 

SIP and H.323 account for communication between media gateways.
 

 10. 

It is more difficult to transmit VoIP and video over IP signals over a packet-switched network than it is to transmit data signals.
 

 11. 

Some software errors point to a physical connectivity problem.
 

 12. 

Logical connectivity problems often prove more difficult to isolate and resolve than physical connectivity problems.
 

 13. 

Tone generators and tone locators are used to determine characteristics about a cable.
 

 14. 

Continuity testers can only be used to test copper cable.
 

 15. 

Most wireless testing tools contain more powerful antennas than a workstation NIC.
 

 16. 

Protection against harmful code involves more than just installing anti-malware software.
 

 17. 

When implementing anti-malware software on a network, one of your most important decisions is where to install the software.
 

 18. 

An anti-malware policy is meant to protect the network from damage and downtime.
 

 19. 

The goal of fault-tolerant systems is to prevent failures from progressing to faults.
 

 20. 

Generators provide surge protection.
 

Multiple Choice
Identify the choice that best completes the statement or answers the question.
 

 1. 

A NOS that contains a “back door”is an example of a risk associated with ____.
a.
people
c.
protocols and software
b.
transmission and hardware
d.
Internet access
 

 2. 

A ____ main function is to examine packets and determine where to direct them based on their Network layer addressing information.
a.
switch’s
c.
router’s
b.
gateway’s
d.
proxy server’s
 

 3. 

A ____ firewall is a router (or a computer installed with software that enables it to act as a router) that examines the header of every packet of data it receives to determine whether that type of packet is authorized to continue to its destination.
a.
packet-filtering
c.
proxy
b.
gateway
d.
selective
 

 4. 

A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in a dictionary to gain access to the network.
a.
flashing
c.
dictionary
b.
denial-of-service
d.
brute force
 

 5. 

A ____ attack occurs when a hacker tries numerous possible character combinations to find the key that will decrypt encrypted data.
a.
flashing
c.
dictionary
b.
denial-of-service
d.
brute force
 

 6. 

A(n) ____ is a password-protected and encrypted file that holds an individual’s identification information, including a public key.
a.
digital certificate
c.
access control list
b.
authentication file
d.
authentication certificate
 

 7. 

The use of certificate authorities to associate public keys with certain users is known as ____.
a.
PGP
c.
IPSec
b.
PKI
d.
SSL
 

 8. 

____ is a public key encryption system that can verify the authenticity of an e-mail sender and encrypt e-mail data in transmission.
a.
PGP
c.
IPSec
b.
SSH
d.
SSL
 

 9. 

RADIUS and TACACS belong to a category of protocols known as AAA (____).
a.
access, authorization, and accounting
b.
authentication, authorization, and accounting
c.
authentication, authorization, and authority
d.
authentication, authorization, and access
 

 10. 

____ describes the use of any network to carry voice signals using the TCP/IP protocol.
a.
Telephony
c.
IP telephony
b.
Internet telephony
d.
Voice telephony
 

 11. 

IPTV, videoconferencing, streaming video, and IP multicasting belong to the range of services known as ____.
a.
voice over IP
c.
video over IP
b.
data over IP
d.
Web over IP
 

 12. 

____ messaging is a service that makes several forms of communication available from a single user interface.
a.
Unified
c.
Diversified
b.
Instant
d.
Open
 

 13. 

In general, a(n) ____ is a private switch that accepts and interprets both analog and digital voice signals.
a.
IP-PBX
c.
Data PBX
b.
analog PBX
d.
IT-PBX
 

 14. 

When a caller uses an IP telephone, his or her voice is immediately digitized and issued from the telephone to the network in ____ form.
a.
segment
c.
circuit
b.
frame
d.
packet
 

 15. 

One drawback to ____ video is that content may not be edited before it’s distributed.
a.
on demand
c.
streaming server
b.
live streaming
d.
VoIP
 

 16. 

____ is a measure of how well a network service matches its expected performance.
a.
QoS
c.
DiffServ
b.
RSVP
d.
MPLS
 

 17. 

____ are often considered first-level support.
a.
Help desk coordinators
c.
Administrators
b.
Help desk analysts
d.
Network specialists
 

 18. 

____ are often considered third-level support.
a.
Help desk coordinators
c.
Administrators
b.
Help desk analysts
d.
Technical specialists
 

 19. 

A ____ system is a process or program that provides support personnel with a centralized means of documenting changes to the network.
a.
release management
c.
change document
b.
asset management
d.
change management
 

 20. 

A____ is a small electronic device that issues a signal on a wire pair.
a.
tone locator
c.
tone generator
b.
probe kit
d.
probe
 

 21. 

____ is a fundamental property of wire that depends on a wire’s molecular structure and size.
a.
Voltage
c.
Resistance
b.
Current
d.
Impedance
 

 22. 

Resistance is measured in ____.
a.
ohms
c.
centimeters
b.
hertz
d.
volts
 

 23. 

When used on a copper-based cable, a continuity tester applies a small amount of ____ to each conductor at one end of the cable.
a.
resistance
c.
voltage
b.
impedance
d.
current
 

 24. 

A ____ is a software-based tool that continually monitors network traffic from a server or workstation attached to the network.
a.
network monitor
c.
protocol analyzer
b.
sniffer
d.
multimeter
 

 25. 

____ packets exceed the medium’s maximum packet size.
a.
Jabber
c.
Giant
b.
Ghost
d.
Runt
 

 26. 

A ____ usually results from a bad NIC.
a.
jabber
c.
giant
b.
ghost
d.
runt
 

 27. 

A ____ can generate traffic in an attempt to reproduce a network problem and monitor multiple network segments simultaneously.
a.
multimeter
c.
network monitor
b.
cable performance tester
d.
protocol analyzer
 

 28. 

A ____ is a tool that can assess the quality of the wireless signal.
a.
function analyzer
c.
quality analyzer
b.
signal analyzer
d.
spectrum analyzer
 

 29. 

____ are programs that run independently and travel between computers and across networks.
a.
Viruses
c.
Bots
b.
Worms
d.
Trojan horses
 

 30. 

A(n) ____ virus disguises itself as a legitimate program to prevent detection.
a.
stealth
c.
time dependent
b.
encrypted
d.
polymorphic
 

 31. 

____ scanning detects malware by comparing a file’s content with known malware signatures in a signature database.
a.
Integrity checking
c.
Signature
b.
Polymorphic
d.
Heuristic
 

 32. 

____ detects malware by comparing current characteristics of files and disks against an archived version of these characteristics to discover any changes.
a.
Integrity checking
c.
Signature
b.
Polymorphic
d.
Heuristic
 

 33. 

A(n) ____ is a deviation from a specified level of system performance for a given period of time.
a.
fault
c.
error
b.
failure
d.
hoax
 

 34. 

Power that is free from noise is called “____” power.
a.
clear
c.
filtered
b.
clean
d.
white
 

 35. 

A(n) ____ UPS uses the A/C power from the wall outlet to continuously charge its battery, while providing power to a network device through its battery.
a.
standby
c.
offsite
b.
offline
d.
online
 

 36. 

Mesh topologies and ____ topologies are good choices for highly available enterprise networks.
a.
star
c.
bus
b.
SONET ring
d.
ring
 

 37. 

A group of hard disks is called a ____.
a.
RAID group
c.
disk array
b.
disk volume
d.
disk partition
 

 38. 

____ is a specialized storage device or group of storage devices that provides centralized fault-tolerant data storage for a network.
a.
NAS
c.
SANs
b.
RAID
d.
Optical media
 

 39. 

____ is a type of media capable of storing digitized data and that uses a laser to write data to it and read data from it.
a.
Tape backup media
c.
Fiber optic media
b.
Optical media
d.
USB
 

 40. 

An archive ____ is a file attribute that can be checked or to indicate whether the file must be archived.
a.
bit
c.
word
b.
byte
d.
field
 

Completion
Complete each statement.
 

 1. 

In general, information is ____________________ if it could be used by other parties to impair an organization’s functioning, decrease customers’ confidence, cause a financial loss, damage an organization’s status, or give a significant advantage to a competitor.
 

 

 2. 

A(n) ____________________ is a software application on a network host that acts as an intermediary between the external and internal networks, screening all incoming and outgoing traffic.
 

 

 3. 

Some VoIP vendors prefer ____________________ over H.323.
 

 

 4. 

____________________ performs the same functions as MGCP, but using different commands and processes.
 

 

 5. 

____________________ is a QoS technique that replaces the IP datagram header with a label at the first router a data stream encounters.
 

 

 6. 

A help desk is typically staffed with ____________________ - people proficient in workstation and network troubleshooting.
 

 

 7. 

Many bots spread through the ____________________, a protocol that enables users running client software to communicate instantly with other participants in a chat room on the Internet.
 

 

 8. 

A(n) ____________________ is a battery-operated power source directly attached to one or more devices and to a power supply (such as a wall outlet) that prevents undesired features of the wall outlet’s A/C power from harming the device or interrupting its services.
 

 

 9. 

____________________ refers to a collection of disks that provide fault tolerance for shared data and applications.
 

 

 10. 

A(n) ____________________ is a copy of data or program files created for archiving or safekeeping.
 

 

Short Answer
 

 1. 

Describe who should conduct a security audit and the advantages of doing so, if any.
 

 2. 

Define and describe PAP.
 

 3. 

How does implementing VoIP assist in centralizing voice and data network management?
 

 4. 

Explain the issue that IP telephones face regarding the need for electric current .
 

 5. 

Aside from extreme mobility, describe another advantage to softphones.
 

 6. 

Explain how gateways on a converged network exchange and translate signaling and control information with each other so that voice and video packets are properly routed through the network.
 

 7. 

List eight questions to ask to help identify network problem symptoms that are not immediately obvious.
 

 8. 

Describe how a problem’s solution might affect users and network functionality in terms of security.
 

 9. 

Describe how an organization implements anti-malware software.
 

 10. 

Describe the key to fault tolerance in network design. Provide examples of fault tolerant topologies.
 



 
Check Your Work     Start Over