As the number of ISPs has grown, a new form of network access point called a metropolitan area exchange has emerged.
Answer: True
Common carriers include the RBOCs, IXCs, and Cable TV companies.
Answer: True
Common carriers sell or lease communication services and facilities to the public.
Answer: True
Circuit switched networks run over the public switched telephone networks operated by the common carriers.
Answer: True
Cloud (as in cloud architecture) means that the design for the common carrier's network comes from satellite networks above the clouds.
Answer: False
A dedicated circuit is usually not available late at nights or on weekends.
Answer: False
Full mesh networks are inexpensive.
Answer: False
Full mesh design networks are more common than partial mesh design networks.
Answer: False
Datagrams are connection-oriented.
Answer: False
Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.
Answer: False
Virtual private networks permit users to create permanent virtual circuits, or tunnels, through the Internet.
Answer: True
National Internet service providers connect together and exchange data at Network Access Points.
Answer: True
Network access points were originally designed to connect only local ISPs.
Answer: False
A point of presence is the place at which the ISP provides services to its customers.
Answer: True
Peering means that a national ISP does not charge another national ISP to transmit its messages.
Answer: True
Digital Subscriber Line is a family of multipoint technologies.
Answer: False
The dominant standard for a cable modem is Data over Cable System Interface Specification.
Answer: True
Internet 2 is the common name for the Abilene network.
Answer: True
Each of the networks in Internet 2 has a set of access points called terapops.
Answer: False
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
Answer: True
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
Answer: True
Confidentiality is not a threat to business continuity.
Answer: False
Intrusion refers to confidentiality and integrity of data.
Answer: True
A control spreadsheet lists threats to the network across the top of the spreadsheet and lists the network assets down the side of the sheet.
Answer: True
A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.
Answer: True
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
Answer: True
A NAT proxy server uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.
Answer: True
Answer: True
Common carriers include the RBOCs, IXCs, and Cable TV companies.
Answer: True
Common carriers sell or lease communication services and facilities to the public.
Answer: True
Circuit switched networks run over the public switched telephone networks operated by the common carriers.
Answer: True
Cloud (as in cloud architecture) means that the design for the common carrier's network comes from satellite networks above the clouds.
Answer: False
A dedicated circuit is usually not available late at nights or on weekends.
Answer: False
Full mesh networks are inexpensive.
Answer: False
Full mesh design networks are more common than partial mesh design networks.
Answer: False
Datagrams are connection-oriented.
Answer: False
Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.
Answer: False
Virtual private networks permit users to create permanent virtual circuits, or tunnels, through the Internet.
Answer: True
National Internet service providers connect together and exchange data at Network Access Points.
Answer: True
Network access points were originally designed to connect only local ISPs.
Answer: False
A point of presence is the place at which the ISP provides services to its customers.
Answer: True
Peering means that a national ISP does not charge another national ISP to transmit its messages.
Answer: True
Digital Subscriber Line is a family of multipoint technologies.
Answer: False
The dominant standard for a cable modem is Data over Cable System Interface Specification.
Answer: True
Internet 2 is the common name for the Abilene network.
Answer: True
Each of the networks in Internet 2 has a set of access points called terapops.
Answer: False
Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.
Answer: True
The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.
Answer: True
Confidentiality is not a threat to business continuity.
Answer: False
Intrusion refers to confidentiality and integrity of data.
Answer: True
A control spreadsheet lists threats to the network across the top of the spreadsheet and lists the network assets down the side of the sheet.
Answer: True
A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.
Answer: True
Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.
Answer: True
A NAT proxy server uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.
Answer: True