Data Communication & Networking - True - False - 7

As the number of ISPs has grown, a new form of network access point called a metropolitan area exchange has emerged.

Answer: True

Common carriers include the RBOCs, IXCs, and Cable TV companies.

Answer: True

Common carriers sell or lease communication services and facilities to the public.

Answer: True

Circuit switched networks run over the public switched telephone networks operated by the common carriers.

Answer: True

Cloud (as in cloud architecture) means that the design for the common carrier's network comes from satellite networks above the clouds.

Answer: False

A dedicated circuit is usually not available late at nights or on weekends.

Answer: False

Full mesh networks are inexpensive.

Answer: False

Full mesh design networks are more common than partial mesh design networks.

Answer: False

Datagrams are connection-oriented.

Answer: False

Connectionless routing sets up a TCP connection, or virtual circuit between a sender and receiver.

Answer: False

Virtual private networks permit users to create permanent virtual circuits, or tunnels, through the Internet.

Answer: True

National Internet service providers connect together and exchange data at Network Access Points.

Answer: True

Network access points were originally designed to connect only local ISPs.

Answer: False

A point of presence is the place at which the ISP provides services to its customers.

Answer: True

Peering means that a national ISP does not charge another national ISP to transmit its messages.

Answer: True

Digital Subscriber Line is a family of multipoint technologies.

Answer: False

The dominant standard for a cable modem is Data over Cable System Interface Specification.

Answer: True

Internet 2 is the common name for the Abilene network.

Answer: True

Each of the networks in Internet 2 has a set of access points called terapops.

Answer: False

Security on a network not only means being able to prevent a hacker from breaking into your computer but also includes being able to recover from temporary service problems or from natural disasters.

Answer: True

The rise of the Internet has increased significantly the potential vulnerability of an organization's assets.

Answer: True

Confidentiality is not a threat to business continuity.

Answer: False

Intrusion refers to confidentiality and integrity of data.

Answer: True

A control spreadsheet lists threats to the network across the top of the spreadsheet and lists the network assets down the side of the sheet.

Answer: True

A threat to the data communications network is any potential adverse occurrence that can do harm, interrupt the systems using the network, or cause a monetary loss to the organization.

Answer: True

Companies have learned that threats from hacking from its own employees occur about as often as by outsiders.

Answer: True

A NAT proxy server uses an address table to translate private IP addresses used inside the organization into proxy data link layer addressed used on the Internet.

Answer: True


Learn More :