(TCO A) Organization XYZ has just been granted access tothe LAN of the ABC organization

1. (TCO A) Organization XYZ has just been granted access tothe LAN of the ABC organization to access Web-based applications over theInternet. Organization ABC has established what type of access? (Points : 5)

Extranet   Internet   Remote Protocol Exchange   Intranet

Question 2. 2. (TCO B) The ________________ is a WAN network thatincludes hundreds of thousands to millions of machines and users worldwide. (Points : 5)

Intranet   Metropolitan Area Network (MAN)    Internet   Ethernet

Question 3. 3. (TCO B) Which of the following is considered a componentof a network? (Points : 5)

Server   Client   Circuit    All of the above

Question 4. 4. (TCO C) Which is true about a network hub? (Points : 5)

When a frame is sent from one   computer to another, the hub retransmits it to all computers attached.   it keeps a table of addresses and   ports.   Each circuit connected to it is   not shared.   Internally, the logical topology   is a set of point-to-point circuits.

Question 5. 5. (TCO C) Hubs and switches also act as __________ to helpprevent attenuation. (Points :

repeaters   firewalls   junction points   layer 2 devices

Question 6. 6. (TCO D) A ___________ connect(s) two similarnetworks having the same network protocol and chooses the best routebetween two networks when there are multiple paths. (Points : 5)

router   modem   router and modem   None of the above

Question 7. 7. (TCO D) In the case of Internet operation, a networkaccess point is ______.(Points : 5)

the point that links regional ISPs   used by National ISPs to exchange   data   used to exchange data between   local servers and local ISPs   used as a redundant path between   local ISPs

Question 8. 8. (TCO E) Your organization has been the victim of arecent DoS on one of your public websites. Your CIO wants this problem tohave minimal impact on your organization in the future. What is the besttechnology to deploy to quickly detect and take action on a DoS attack onceit starts? (Points : 5)

Firewall   Intrusion   detection system   Traffic filters and traffic limiting   Honeypot

Question 9. 9. (TCO E) Your organization has decided to host a webserver that will be accessible by the public. Organizational leadership isconcerned about the web server being compromised and thus allowing theremaining network to be compromised. You want to come up with a solution tohost and secure the Web server internally but still protect yournetwork. What should you do?(Points : 5)

Use a firewall    Put the web server on the DMZ   Put the web server in front of the   firewall.   Chassis based switch

Question 10. 10. (TCO F) The building block design approach is sometimescalled ______. (Points : 5)

wide and shallow    narrow and deep   wide and deep   narrow and shallow

Question 11. 11. (TCO F) Your company is new and finally has acquired anoperating facility. You are in change of designing the network.Organizational leadership has explained to you that they want a networkthat is simplistic, standardized, and that can be implemented in less thanone year. What design option would best suit the needs of the organization? (Points : 5)

Needs analysis   Traditional network design    Building-block network design   Lateral network design

Question 12. 12. (TCO G) __________ policies attempt to allocate costsassociated with a WAN or a mainframe to specificusers. (Points : 5)

Charge-back   Web spinning   Internet access fees   Support staff billing

Question 2. 2. (TCO B) Discuss and support your opinions of why combining voice and data is a major organizational challenge. Include your thoughts on its possible impacts on the organization in terms of competitive advantage, internal organization, and so forth. (Points : 25)

Question 3. 3. (TCO C) Switched Ethernet networks dominate the landscape of computer networks today. What improvements do Switched Ethernet networks have over its predecessor Shared Ethernet networks? Be specific and answer in details. (Points : 25)

Question 4. 4. (TCO C) What are the preferred technologies used in the three technology layers in backbone design? Describe each of the technologies in detail

Question 5. 5. (TCO D) What are the principal organizations responsible for Internet governance, and what do they do? (Points : 25)

Question 7. 7. (TCO F) What are some major problems that can cause network designs to fail? Provide the problems in detail. (Points : 25)

Question 6. 6. (TCO E) Viruses and worms are issues that any networking professional must face. Compare and contrast viruses and worms. Be n. (Points : 25)

Question 8. 8. (TCO G) The total cost of ownership (TCO) is a measure of how much it costs per year to keep one computer operating. TCO includes the cost of support staff to attach it to the network, install software, administer the network (e.g., create user ids, backup user data), provide training and technical support, and upgrade hardware and software. It also includes the cost of time “wasted” by the user when problems occur or when the user is attempting to learn new software. Discuss in detail at least three approaches that can be used to reduce network costs. (Points : 25)

Need your ASSIGNMENT done? Use our paper writing service to score better and meet your deadline.


Click Here to Make an Order Click Here to Hire a Writer