Exam IT 505 Multiple Choice Questions (20 Questions, 2 Point
Exam IT 505 Multiple Choice (20 questions , 2 points each) Please Submit a word document of your exam
1. Which of the following is NOT one of the typical characteristics of back-end networks?
A. high data rate
B. high-speed interface
C. distributed access
D. extended distance
2. Problems with using a single Local Area Network (LAN) to interconnect devices on a premise include:
A. insufficient reliability, limited capacity, and inappropriate network interconnection devices
B. insufficient reliability, limited capacity, and limited distances
C. insufficient reliability, limited distances, and inappropriate network interconnection devices
D. limited distances, limited capacity, and inappropriate network interconnection devices
3. Which of following is NOT one of the designs that determines data rate and distance?
A. the number of senders
B. the number of receivers
C. transmission impairment
D. bandwidth
4. The fact that signal strength falls off with distance is called ________________.
A. bandwidth
B. attenuation
C. resistance
D. propagation
5. Which of the following is NOT one of the distinguishing characteristics for optical fiber cables compared with twisted pair or coaxial cables?
A. greater capacity
B. lower attenuation
C. electromagnetic isolation
D. heavier weight
6.________ is a set of function and call programs that allow clients and servers to intercommunicate.
A. IaaS
B. SQL
C. API
D. Middleware
7. A computer that houses information for manipulation by networked clients is a __________.
A. server
B. minicomputer
C. PaaS
D. broker
8. ________ is software that improves connectivity between a client application and a server.
A. SQL
B. API
C. Middleware
D. SAP
9. The inability of frame relay to do hop by hop error control is offset by:
A. its gigabit speeds
B. its high overhead
C. the extensive use of in-band signaling
D. the increasing reliability of networks
10. All Frame Relay nodes contain which of the following protocols?
A. LAPB
B. LAPD
C. LAPF Core
D. LAPF Control
11. The technique employed by Frame Relay is called __________.
A. inband signaling
B. outband signaling
C. common channel signaling
D. open shortest path first routing
12. In ATM, the basic transmission unit is the ________.
A. frame
B. cell
C. packet
D. segment
13. When using ATM, which of the following is NOT one of the advantages for the use of virtual paths?
A. less work is needed to set a virtual path
B. the network architecture is simplified
C. the network performance and reliability is enhanced
D. channel connection setup times are reduced
14. Which of the following are WAN protocols?
A. Frame Relay
B. T-1
C. SONET
D. all of the above
15. Public switched services include which of the following?
A. ISDN
B. WAE
C. dial-up/modem
D. all of the above
16. Important objectives of computer security include:
A. confidentiality
B. integrity
C. availability
D. all of the above
17. One type of attack on the security of a computer system or network that impacts the availability of a system (e.g., destruction of a resource in the system) is referred to as ___________
A. interruption
B. interception
C. modification
D. all of the above
18. The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.
A. active attacks
B. passive attacks
C. administrative attacks
D. none of the above
19. A secret entry point into a program that allows intruders aware of the breached area to gain access and bypass the usual security access procedures is called a:
A. logic bomb
B. Trojan horse
C. virus
D. none of the above
20. The primary mechanism used in implementing denial-of-service attacks is the:
A. worm
B. Trojan horse
C. bot
D. all of the above
Paper For Above instruction
Backbone networks form the core infrastructure of modern telecommunications and data communication systems, providing high-capacity pathways that interconnect various smaller networks such as local area networks (LANs), metropolitan area networks (MANs), and wide area networks (WANs). They are characterized by their high data transmission rates, extensive geographical coverage, and robust reliability, which enable the seamless flow of data across vast distances. These networks are essential for supporting large-scale internet services, cloud computing, and enterprise-level communications, acting as the main arteries that facilitate efficient and secure data exchange.
Characteristics of backbone networks include their ability to handle massive volumes of data with high throughput, typically employing high-speed interfaces such as fiber optic links that support speeds in gigabits per second. Moreover, they often feature redundant pathways and sophisticated routing protocols to ensure high reliability and fault tolerance. Due to their extensive reach, backbone networks incorporate advanced technologies that enable data to traverse long distances with minimal delay and attenuation, which is the loss of signal strength over distance. These attributes allow backbone networks to sustain critical digital communications, accommodate future expansion, and adapt to the increasing demand for bandwidth driven by data-intensive applications.
Middleware is a crucial component in client-server architecture, representing a software layer that facilitates communication, data management, and integration of diverse applications and systems. Acting as an intermediary, middleware ensures that various applications, possibly built on different platforms and technologies, can interact seamlessly. It provides services such as messaging, authentication, transaction management, and data translation, simplifying the development and management of distributed systems. In the context of client-server architecture, middleware enhances scalability, interoperability, and flexibility by managing data exchange processes, coordinating business logic, and abstracting underlying complexities of network communication.
The primary role of middleware is to connect clients and servers in a manner that abstracts the complexities of network communication. It enables clients to invoke server-side functions without concerning themselves with communication protocols, message formats, or data translation intricacies. Middleware also handles transaction management and data consistency, ensuring reliable exchanges even in the presence of network disruptions or failures. By providing these services, middleware reduces development time, minimizes errors, and ensures scalable application deployment. Its use supports a modular, service-oriented architecture that emphasizes flexibility and integration, vital for large-scale enterprise applications and cloud-based solutions.
Multi Protocol Label Switching (MPLS) is a versatile data-cacket forwarding technology designed to enhance the speed, scalability, and flexibility of network traffic management. MPLS operates by assigning short, fixed-length labels to data packets, which enables routers to make forwarding decisions based on these labels rather than lengthy network addresses. This label-switching mechanism allows for efficient data routing, traffic engineering, and Quality of Service (QoS) management within complex networks. MPLS is primarily designed to facilitate the creation of end-to-end circuits across IP networks, supporting multiple network protocols and providing a scalable infrastructure for multimedia streaming, VPNs, and real-time applications.
Developed as an overlay solution, MPLS supports a wide range of network protocols and ensures that data packets are transmitted along predetermined paths, improving overall network performance. It enables service providers and enterprises to manage traffic flows dynamically, optimize bandwidth utilization, and ensure reliable delivery of services. MPLS also simplifies network architecture by consolidating multiple traditional routing protocols into a unified framework, offering enhanced control, scalability, and operational efficiency. As such, MPLS plays a vital role in delivering high-performance virtual private networks (VPNs), traffic engineering, and converged networks that support differentiated services and reliable delivery of multimedia content.
Security mechanisms are fundamental to protecting computer systems and networks from unauthorized access, misuse, and malicious attacks. Authentication is the process of verifying the identity of users or systems attempting to access resources, usually through credentials such as passwords, biometrics, or security tokens. It ensures that only legitimate entities can gain entry. Authorization follows authentication and determines what actions or resources an authenticated user can access, enforcing access controls based on predefined policies and permissions. It limits users to only the functions or data they are permitted to use, reducing the risk of misuse or breach.
Accounting, also known as auditing, involves tracking and recording user activities on systems or networks to monitor usage, detect suspicious behavior, and facilitate forensic investigations if security breaches occur. Data encryption ensures that transmitted data is transformed into an unreadable format, usable only by authorized parties with the appropriate decryption keys, thus maintaining confidentiality and integrity of sensitive information. Packet filters are security mechanisms that examine network packets based on pre-established rules, allowing or blocking traffic to protect networks from unauthorized access and attacks.
Firewalls are security devices or software that monitor and control incoming and outgoing network traffic based on security policies. They serve as a barrier between trusted internal networks and untrusted external networks, preventing malicious traffic from entering. Intrusion Detection Systems (IDS) are security tools that analyze network traffic or system activities to identify and alert on potential security breaches or malicious activities. Intrusion Prevention Systems (IPS) extend IDS functionalities by not only detecting but also actively blocking or mitigating identified threats, providing real-time defense against cyber-attacks.
References
- Kurose, J. F., & Ross, K. W. (2017). Computer Networking: A Top-Down Approach (7th ed.). Pearson.
- Tanenbaum, A. S., & Wetherall, D. J. (2011). Computer Networks (5th ed.). Pearson.
- Odom, W. (2009). Mastering MPLS: A Guide for Network Engineers. Cisco Press.
- Stallings, W. (2018). Network Security Essentials: Applications and Standards (6th ed.). Pearson.
- Leung, S. (2013). Middleware for Distributed Systems: Methods, Architectures and Applications. CRC Press.
- Bershad, B. N., et al. (2006). Middleware: Providing real-time, scalable, and reliable services. IEEE Computer.
- Sharma, P. (2020). Introduction to MPLS and VPNs. Wiley.
- Sahami, M., et al. (2018). Network Security: Private Communication in a Public World. Prentice Hall.
- Scarfone, K., & Mell, P. (2007). Guide to Intrusion Detection and Prevention Systems (IDPS). NIST.
- Vacca, J. R. (2014). Computer and Information Security Handbook. Morgan Kaufmann.