Saturday, 21 April 2018

Which of the following are considerations in designing and building a network? (Select all that apply.)

1. (p. 535) Which of the following are considerations in designing and building a network? (Select all that apply.)
A. list of requirements
B. compatibility issues
C. security
D. peripherals
E. A, B, C, and D

2. (p. 537) Network design must consider all of the following factors EXCEPT:
A. acceptable use policies
B. wireless
C. structured cabling
D. system security

3. (p. 535) Which of the following steps determines the requirements for the network?
A. define the network's needs
B. determine external connections
C. determine internal connections
D. plan security

4. (p. 540) Structured cabling is a design consideration related to which of the following?
A. compatibility
B. external connections
C. security
D. internal connections

5. (p. 548) Which of the following are considered network peripherals? (Select all that apply.)
A. switch
B. printer
C. router
D. scanner
E. both B and D

6. (p. 536) All of the following are considered characteristics of a SOHO network EXCEPT:
A. simple design (usually)
B. wide variety of enterprise-level services and servers
C. a minimal number of switches, routers, servers, and workstations
D. standardization of operating systems

7. (p. 537) All of the following are considerations in determining network needs EXCEPT:
A. determining size and location
B. determining host and server operating systems
C. determining how many servers are needed
D. determining file and folder access permissions

8. (p. 537) Quantifying the need for equipment, operating systems, and network applications is a function of which of the following?
A. security
B. structured cabling
C. network design
D. compatibility

9. (p. 537) All of the following are considerations when selecting workstations EXCEPT:
A. brand
B. standardized hardware
C. standardized operating systems
D. number for each employee

10. (p. 538) Which of the following can be used to avoid using a full-blown file server?
A. File Server
B. Workstation
C. Peripheral
D. Network Attached Storage (NAS)

11. (p. 537) Design considerations such as purpose and functionality, operating system, redundancy, and backups primarily affect which of the following devices?
A. switches
B. routers
C. servers
D. PBX

12. (p. 538, 541) All of the following factors affect equipment room design and selection EXCEPT:
A. location
B. size
C. power
D. operating system

13. (p. 538) Which of the following are ways that peripherals, such as printers and scanners, may be networked? (Select all that apply.)
A. dedicated NIC
B. serial cable
C. shared from computer
D. virtualization
E. both A and C

14. (p. 539) Compatibility issues stemming from newer equipment or applications when integrated with older or legacy ones are called:
A. frontward compatibility
B. data compatibility
C. connector compatibility
D. backward compatibility

15. (p. 539) Network compatibility issues affect interoperability of all of the following EXCEPT:
A. network devices
B. data
C. applications
D. cabling

16. (p. 542) Which of the following is a compatibility issue with wireless networking?
A. encryption
B. user accounts
C. WAP placement
D. signal strength

17. (p. 540) Which of the following are desired features on a network switch? (Select all that apply.)
A. encryption
B. Power over Ethernet (PoE)
C. VLAN support
D. WAN support
E. Both B and C

18. (p. 540) All of the following are design considerations with structured cabling EXCEPT:
A. length of runs
B. documentation
C. CAT ratings
D. data flow

19. (p. 541) Which of the following is NOT a consideration when considering electrical and environmental issues in equipment rooms?
A. temperature
B. humidity
C. electrical load capacity
D. data

20. (p. 537) Which of the following can reduce equipment needs, consolidate servers, and provide security features to a network?
A. outsourcing
B. virtualization
C. insourcing
D. Software as a Service (SaaS)

21. (p. 542) Which of the following switch features can be used to prevent broadcasts from spanning networks?
A. WANs
B. placement
C. VLANs
D. encryption

22. (p. 542) Which of the following enables access and management capabilities on servers and network devices even when there is no power to the device?
A. lights-out management
B. remote management
C. SNMP
D. virtual management

23. (p. 543) All of the following are design considerations in a network's IP address scheme EXCEPT:
A. static address assignment
B. MAC addressing
C. DHCP address assignment
D. private IP addressing

24. (p. 544) All of the following are factors involved in router selection EXCEPT:
A. scalability
B. expandability
C. media support
D. VLAN support

25. (p. 544) Which of the following design considerations affects the bandwidth and reliability of external connections?
A. ISP selection
B. switch selection
C. structured cabling
D. security

26. (p. 546) What is the Maximum Transmission Unit (MTU) for Ethernet?
A. 1000 bytes
B. 1400 bytes
C. 2500 bytes
D. 1500 bytes

27. (p. 547) What is an MTU compatibility issue that can occur when an Ethernet network connects to an ISP's WAN connection?
A. MTU mismatch c. Path MTU Discovery
B. MTU black hole d. MTU fragmentation

28. (p. 548) What is an MTU issue that can happen when a network device blocks ICMP traffic?
A. MTU mismatch
B. MTU black hole
C. Path MTU Discovery
D. MTU fragmentation

29. (p. 549) All of the following are security issues inherent in network design EXCEPT:
A. wireless encryption
B. equipment theft
C. data format
D. Access Control Lists

30. (p. 549) Door locks, deadbolts, and motion sensors that protect equipment rooms are all forms of which type of security?
A. physical
B. logical
C. managerial
D. technical



True / False Questions
 
31. (p. 534) Enterprise networks are considered SOHO.
FALSE

32. (p. 535) The list of requirements describes the network's needs.
TRUE

33. (p. 535) Security is not a network design consideration.
FALSE

34. (p. 535) The term "internal connections" refers to all connections outside the network's control.
FALSE

35. (p. 536) A checklist or methodology is of little value in designing and implementing a network.
FALSE

36. (p. 535) Security considerations are designed to protect the internal network from threats and failures.
TRUE

37. (p. 549) Security is the final step in network design.
FALSE

38. (p. 547) Path MTU Discovery adds a "Fragment Flag" to an IP packet.
FALSE

39. (p. 542) "Lights-out management" allows servers and other devices to be remotely managed - even when powered down.
TRUE

40. (p. 541) Wireless access point placement is not a significant issue in network design.
FALSE



Fill in the Blank Questions
 
41. (p. 545) Router expansion cards that allow additional ports to be added, usually to connect ISPs or other high-speed connections, are called _______________.
High-Speed WAN Internet Cards (HSWIC)

42. (p. 548) A condition where network devices, such as routers and firewalls, block ICMP, preventing MTU discovery is called a(n) __________.
MTU black hole

43. (p. 535) An All-in-One printer/scanner/copier device would be considered a(n) __________.
peripheral

44. (p. 535) __________ affect how existing equipment, applications, or cabling work together.
compatibility issues

45. (p. 542) Management software built into higher-end servers and other devices that allow remote management and control even when the server is turned off is called __________.
lights-out management

46. (p. 535) A network that has a minimal number of switches, routers, servers, and workstations is called a __________ network.
small office/home office (SOHO)

47. (p. 537) ___________ may require variations in the standard baseline operating system (OS).
unique users

48. (p. 541) __________ and ____________ are environmental factors in the design consideration of the equipment room.
temperature, humidity

49. (p. 540) Detailed information on CAT ratings, run length, and floor plans affects __________.
structured cabling

50. (p. 541) __________ placement affects wireless network design considerations.
wireless access point (WAP)

51. (p. 542) __________ segregate particular users, computers or networks.
virtual LANs (VLANs)

52. (p. 543) The choice of DHCP vs. static address assignments affects the ___________ of the network.
IP address scheme

53. (p. 544-545) Expandability for add-in connections is an important factor in __________ selection.
router

54. (p. 546-547) The Maximum Transmission Unit (MTU) for Ethernet is __________ bytes.
1500

55. (p. 547) __________ adds a "Don't Fragment Flag" to the IP packet to prevent MTU mismatch.
Path MTU Discovery (PMTU)

56. (p. 547) Path MTU Discovery uses the __________ protocol.
ICMP

57. (p. 547) A(n) ____________ results when Ethernet connects to a WAN technology with different size MTU.
MTU mismatch

58. (p. 549) __________ is an integral part of all other network design steps.
security

59. (p. 542) Wireless ___________ is a security issue in network design.
encryption

60. (p. 549) ___________ are not considered a traditional security issue, but you must be aware of security configuration issues and risks.
peripherals

61. (p. 545) A(n) __________ is a module used in networking equipment, such as switches, that allows different fiber connections from the device.
Small Form-factor Pluggable (SFP)

62. (p. 537) Determining and quantifying the equipment, operating systems, and applications used by the network is called ___________.
network design

63. (p. 540) Connections within and controlled by your network are called _______________.
internal connections

64. (p. 549) Installing __________ software is an important part of security when implementing a network design.
anti-malware

65. (p. 535) Defining the network's needs results in a(n) __________.
list of requirements

66. (p. 538) Using a(n) __________ can help avoid using an unneeded file server.
Network Attached Storage (NAS) device

67. (p. 549) An important consideration in designing servers to protect data through redundancy in hard disks is called _______________.
RAID

68. (p. 539) __________ equipment may have compatibility issues with newer equipment.
Older

69. (p. 540) VLAN support and Power over Ethernet (PoE) are two important considerations when selecting a network __________.
switch

70. (p. 541) A(n) _______________ can help deliver high-amperage power to network devices.
dedicated circuit



Essay Questions
 
71. (p. 535) Describe the characteristics of a SOHO network. 
Small office/home office networks are smaller networks that support only a few users. The network design is usually simple, and there are a minimal number of switches, routers, servers, and workstations.

72. (p. 536) Describe the important considerations in network design. 
Network needs, network design, compatibility issues, internal connections, external connections, peripherals, and network/system security.

73. (p. 536-537) Describe what is involved in determining network needs. 
Determine size, location, other physical factors; determine how many servers and what services are needed; determine host and server operating systems; determine software and hardware needs for unique users.

74. (p. 537) What are items that must be quantified during network design? 
Equipment, including workstations, servers, the equipment room, and any peripherals, as well as operating systems and network applications.

75. (p. 536-537) When must variations in equipment, software applications, and even operating systems be considered in network design? 
When addressing the needs of a unique user, such as a graphics designer or engineer that must have specialized workstations, applications, or even an alternate operating system.

76. (p. 537) What are some factors when considering workstations? 
Quantity, standardized operating systems and applications, and the needs of unique users.

77. (p. 537) What are some factors when considering servers? 
Purpose and function, quantity, OS, redundancy (clustering or failover), virtualization, and backups.

78. (p. 538, 541) What are some design factors when considering equipment rooms? 
Size, location within facility, environmental factors (temperature, humidity, and so on), physical access control, power, and cabling to and from room.

79. (p. 548) Describe how peripherals fit into the network design process. 
The use of various peripherals depends on the size and needs of the SOHO network. Many devices, including All-in-One devices (scanner, copier, and fax) are common. They are typically provided for use by all users, and are networked using dedicated NICs or shared from computers.

80. (p. 535, 539) Describe different compatibility issues that must be addressed during network design. 
Compatibility issues could include interoperability between different network cabling types, connectors, and devices. There could also be backward-compatibility issues with older vs. newer equipment. These issues affect everything that touches the network, including network devices, computers, applications, peripherals, cabling, connectors, and other equipment.

81. (p. 540) What are the components that need to be considered during design of internal connections? 
Internal network connection components include switches, structured cabling, electrical and environmental considerations, wireless networking equipment, VLANs, and the network's IP address scheme.

82. (p. 540) Discuss the considerations involved with structured cabling within a network and the facility. 
Structured cabling has several considerations that must be addressed, including documentation (clearly labeled runs and the floor plans showing all runs), the length of all the runs, and the CAT ratings on all cabling.

83. (p. 541) Discuss the considerations involved with electrical and environmental issues in the equipment areas. 
Some of these considerations include electrical wiring and load capacity, humidity, temperature, fire detection and protection, and physical security.

84. (p. 541, 542, 549) Discuss the considerations involved with wireless network design. 
Wireless network design issues include WAP placement, signal strength and power, and encryption/authentication mechanisms.

85. (p. 542) What are two advantages of VLANs to consider when designing a SOHO network? 
VLANs segregate particular users, computers, or networks on their own virtual LAN segment and prevent broadcast traffic from spanning networks.

86. (p. 542) Describe the concept of lights-out management (LOM). 
Lights-out management (LOM) allows a network administrator to manage (even remotely) a higher-end server or network device even when the device is powered off, due to a special "computer within a computer" feature built into the system.

87. (p. 543) What are some design considerations in the network's IP addressing scheme? 
A network's IP address scheme has several design considerations, including whether to use private or public IP addresses (based on how the architecture is designed), the use of NAT, and the decision to use DHCP or static addressing for some or all hosts.

88. (p. 544) What are some considerations that affect router selection? 
Router selection includes factors such as whether to use a business-class or smaller-scale router, and which features it supports, as well as available ports and expandability for different add-in connections, such as additional Ethernet or fiber.

89. (p. 546) What are some considerations in selecting an ISP? 
ISP selection includes these considerations: Is there an existing connection into the building that can be used or added to? What services are offered by the ISP and what do they cost? What is the type of connection to the Internet? Additional considerations are guaranteed bandwidth/throughput, service commitment, connection uptime, network reliability, and security.

90. (p. 547) What is an MTU mismatch? 
An MTU mismatch is a condition resulting when an Ethernet network connects to a WAN technology that uses a different size MTU. This usually requires adjustment on either or both of the systems to fix.

91. (p. 547) What is Path MTU Discovery? 
Path MTU Discovery (PMTU) is a newer technology (2007) created to determine the best MTU settings between two networks (such as a LAN and a WAN through an ISP) and fix mismatches between them. It essentially adds a "Don't Fragment Flag" to an IP packet, and pings another device to test the MTU settings. It can automatically correct the MTU size on the sending device if there is a mismatch.

92. (p. 548) What is an "MTU black hole"? 
It is a condition in which some network devices, such as firewalls and routers, block ICMP and prevent PMTU discovery. In many cases, going into the router or firewall and turning off ICMP blocking is all you need to do to fix the problem, assuming you have administrative control over these devices.

93. (p. 548) What are some issues that should be addressed when installing peripherals on the network? 
Some considerations include IP addressing (peripherals usually need static or reserved IP addresses), access permissions, and the capacity and functionality of the devices.

94. (p. 549) What is the significance of security to the network design process? 
Security isn't just an additional or final step in the process; it's an integral part of all other network design steps. It is important to integrate security into each design step throughout the design and building process.

95. (p. 549) What are the security needs that may be identified for a SOHO network during its design? 
Some of the security requirements for the network may include: anti-malware on all systems, a firewall with the ability to use access control lists (ACLs), security from equipment theft, wireless encryption, and wireless network isolation.

96. (p. 549) What are some security measures that could be taken to protect the internal connections of the SOHO network? 
Verify that anti-malware is installed and updated—install Microsoft Security Essentials and configure for automatic updates; document the location of all PCs and their associated connections; configure servers to use RAID 5 for redundancy; for power failure, use four 5000-joule, rack-mounted standby power supplies in the equipment room: three for servers and one for all routers, switches, and so on; install removable hard drives for backup; contract for offsite backup and storage; and configure the domain for strict password security.

97. (p. 549) Explain how peripherals should be treated, in terms of security risks. 
Traditionally, peripherals have not been considered to be a security issue, but due to the increasing complexity and use of the devices, along with their increased storage capacity, more "intelligent" processors to deliver advanced functionality, and increased pervasiveness into the network, users and administrators should be aware of potential security configuration issues and risks.

98. (p. 549) What are some security risks specific to wireless networks and devices? 
Backward compatibility with security features, such as WEP, WPA, and WPA2, as well as shared keys and WAP placement, are typical risks associated with wireless networks.

99. (p. 545) Describe two types of add-in cards that can help expand a network device's capability. 
A Small Form-factor Pluggable (SFP) module is used in networking equipment, such as switches, that allows different fiber connections from the device. A High-Speed WAN Internet Card (HSWIC) is a router expansion card that allows additional ports to be added, usually to connect to ISPs or other high-speed connections.

100. (p. 537) Describe how virtualization could be used in a SOHO network. 

Virtualization could provide many benefits that should be considered during network design, including server consolidation, equipment reduction, and security.

No comments:

Post a Comment