MIS 589 Week 7 Quiz
To Download This Material Click HERE: DOWNLOAD
Or Copy The Link: http://www.fortuneofstudents.com/mis-589-week-7-quiz/
(TCO E) _________ controls stop a person from acting.
(TCO E) A _________ is a situation in which a hacker attempts to disrupt the network by sending messages to the network that prevent normal users’ messages from being processed.
(TCO E) Your organization has decided to host a web server that will be accessible by the public. Organizational leadership is concerned about the web server being compromised and thus allowing the remaining network to be compromised. You want to come up with a solution to host the secure the web server internally, but still protect your network. What should you do?
use a firewall
put the web server on the DMZ
put the web server in front of the firewall.
chassis based switch
(TCO F) The traditional network design approach does not work well for _________ networks.
(TCO F) Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity?
(TCO F) Which of the following are not costs that are generally considered during the cost assessment stage of the network design process?
cost of advertising brochures for new products to be offered by an organization
internetworking devices cost
network management costs
(TCO G) ____________ refers to keeping track of the operation of network circuits to make sure they are working properly.
(TCO G) _____________ is a simple method that can help identify computers/devices or communication circuits that have higher-than-average error or usage rates.
Quality control charting
Quality of servicing
Electronic software distributing
(TCO G) A __________ is an organizational department that is responsible for monitoring and fixing overall network problems.
mission critical area
fault tolerance department
network operations center
mullion delimiter agency
(TCO G) Service Level Agreements (SLA) are significant for what reason?
they ensure that the network will stay up 100% of the time
they are contracts outlining exact type of performance and fault conditions acceptable
they create redundant network links
they exclude compensation that must be provided by service providers