Review for Third Test

The following questions are provided to help you study for the third test. Do not expect to see these exact questions on the test.

  1. In the author's discussion about making choices, what are the last two steps that some people leave out of the process? Why are they needed?

  2. What are some of the essential functions of a switch? Does a hub do any of those functions?

  3. What are VLAN tags and why are they used?

  4. Compare and contrast Distance Vector and Link State protocols. Why would or wouldn/t you choose Link State protocols over Distance Vector protocols?

  5. Name some Distance Vector protocols and some Link State protocols.

  6. Why is it necessary to find tradeoffs when creating a security strategy?

  7. What should be included in an accountability policy? In an access policy?

  8. What are two ways to securely send a key to a remote device? What kind of encryption is used?

  9. What are two types of network performance that you should monitor, according to the text? What is the main difference between them?

  10. What are some examples of Physical Security?

  11. What is an advantage of using a full-mesh topology compared to a partial mesh or star topology? What are some disadvantages?

  12. What is the difference between the operation of an implicit-allow firewall and an implicit-deny firewall? How does it affect the adminstrator who configures them?

  13. Which can be used with more security, File Transfer Protocol or Trivial File Transfer Protocol?

  14. What does a stateful firewall do that others do not?

  15. What is a routing protocol you would not use in a netowrk for a multi-national company? Why?

  16. What should we do regarding DNS service if we are concerned about security?

  17. What kind of servers in our network are probably most concerned with PCI DSS rules?

  18. What is the disadvantage of a Static route when compared to Dynamic route?

  19. The text recommends several tools that use SNMP. What should we do about known security issues with that protocol?

  20. What effect should we expect from constant performance measurement on our network?

  21. What is accounting management used for besides billing?

  22. Why does the text recommend that we should not trust the results from traceroute?

  23. Why is it a good idea to have more than one ISP for network traffic?

  24. What are the three layers in management architecture?

  25. Why might the management data transmitted by an in-band system be different from that transmitted by an out-of-band system?