NST 181; Networking 1 Exam #3 towner____________________ Name:______joanne Take-home: Due by Tuesday Dec. 17 in class or via e-mail or place in my mailbox at South Academic 1st floor in printer room Book chapter: 11; Handout lessons: Network Management, Network Security 1. 2. When managing a data network, routers and switches are known as: a. Nodes b. Hosts c. Network management station ! In a managed data network, end user PCs and various application servers are known as: a. Nodes b. Hosts c. Network management station 3. A server that contains applications that enable discovery and mapping of IP addressable devices and interconnections among them is known as: a. Nodes b. Hosts c. Network management station 4. A Network Management station can discover and map any device with an IP addressable network interface a. True b. False 5. A switch without IP addressable administrative interface connected to the network cannot be detected by a Network management station a. True b. False 6. A network management station can monitor status of IP addressable nodes, hosts and interconnection among them in real time a. True b. False 1 7. Network management station uses the following methods to discover and monitor nodes and hosts (check all that apply) a. Periodically pings all IP addressed interfaces on nodes and hosts b. Collects statistics on ‘ping’ returns. c. Uses SNMP protocol to get more detailed network traffic data from devices that run SNMP Agents and associated MIBs 8. Network management station produces logical level (IP) map of the network, nodes and hosts and provides visual alarms (red color) of down nodes, hosts and links a. True b. False 9. Network management stations can be programmed to filter various alarms, do preliminary troubleshooting and communicate specific alarms to specific operators. True a. False 10. Management Station uses SNMP protocol on nodes/hosts that run SNMP agents and contain associated MIBs. The Management Station has to contain the same MIBs as the managed nodes/hosts. a. True b. False 11. Ping and SNMP packets represent Management traffic that does not convey end user data (payload). Check all true statement about the management traffic. a. It..a high priority traffic, routers process it first b. It is the lowest priority traffic, routers process it if they are not busy with end user data traffic c. Use UDP transport protocol d. Use TCP transport protocol 12. Network management station can be programmed to produce periodic statistical reports of network availability, and on demand reports initiated by an operator a. True b. False 13. I am given permission to perform specific operations on specific data. This is known as: a. Encryption b. Norepudiation c. Authentication d. Authorization 14. A system verifies that I am a user with a valid permission to access specific data. This is known as: a. Encryption b. Norepudiation c. Authentication d. Authorization 2 15. I receive confidential data from John Smith. A system that verifies that most likely the sender is indeed the John Smith, and that the data were not altered by a third party is called: a. Encryption b. Nonrepudiation c. Authentication d. Authorization 16. A method for scrambling text or data so that uninvited readers cannot make sense out of it is known as: a. Encryption b. Norepudiation c. Authentication d. Authorization 17. Text or data before encryption are referred to as: a. Plaintext b. Clear text c. Cipher d. Algorithm e. Ciphertext f. Encryption g. Decryption 18. Output of encryption process is a humanly unreadable set of characters known as: a. Plaintext b. Cleartext c. Cipher d. Algorithm e. Ciphertext f. Encryption g. Decryption 19. A mathematical method for scrambling of data that makes it hard for a hacker to unscramble it is known as: a. Plaintext b. Cleartext c. Cipher d. Algorithm e. Ciphertext f. Encryption g. Decryption 3 20. A computer program that implements mathematical method for scrambling of text/data is known as: a. Plaintext b. Cleartext c. Cipher d. Algorithm e. Ciphertext f. Encryption g. Decryption 21. Process a. b. c. d. e. f. g. of recovering the original data from scrambled text/data is known as: Plaintext Cleartext Cipher Algorithm Ciphertext Encryption Decryption 22. To scramble text/data, one needs a specific Algorithm and a fixed length number known as Key. Algorithm uses the Key to scramble data specific way. a. True b. False 23. Algorithm needs a Key to encrypt text/data and a Key to decrypt text/data. Algorithm that uses the same key to encrypt and to decrypt is known as: a. Symmetric-key algorithm b. Asymmetric-key algorithm 24. Algorithm that uses one key to encrypt and a different key to decrypt text/data is known as a. Symmetric-key algorithm b. Asymmetric-key algorithm 25. Text encrypted with Asymmetric-key algorithm is generally harder to break by a hacker than text encrypted with a Symmetric-key algorithm a. True b. False 26. Public key cryptography is an Asymmetric-key Algorithm where encryption is done with a private key and decryption is done with a public key. Most popular public key cryptography is the RSA Algorithm a. True b. False 4 27. Examples of Symmetric-key algorithm are DES and RC4. a. True b. False 28. A Block cipher is a method of encrypting fixed pieces of text/data at a time a. True b. False 29. A stream cipher is a method of encrypting one bit of text/data at a time a. True b. False 30. A Hash function, Digital signature and Certificates are methods used for: a. Authentication b. Authorization c. Nonrepudiation 31. A hash function is most commonly used to detect whether a received file has been altered from the original one a. True b. False 32. Digital signature is a function performed by sender on message and private key and by a recipient on received data and public key to verify sender’s signature. It is most commonly used by e-mail a. True b. False 33. A certificate method is used by a sender to verify that an un-known recipient (a Web site) is genuine. Certificates are issued by a trusted third party known as a Certificate Authority. a. True b. False 34. Authentication is designed to prevent an unauthorized person or computer to access a remote host through a network. Authentication methods very according to network topology a. True b. False 35. For point-to-point links, which Authentication protocols or standards are used? a. Extensible Authentication protocol (EAP) b. Kerberos c. Password Authentication Protocol (PAP) d. Radius e. Challenge Handshake Authentication (CHAP) 5 36. For any client to any server authentication through any network topology, which protocols or standards are used? a. Extensible Authentication protocol (EAP) b. Kerberos c. Password Authentication Protocol (PAP) d. Radius e. Challenge Handshake Authentication (CHAP) 37. For wireless networks, which Authentication protocols or standards are used? a. Extensible Authentication protocol (EAP) b. Kerberos c. Password Authentication Protocol (PAP) d. Radius e. Challenge Handshake Authentication (CHAP) 38. For multiple links leading to a single point on the network, which Authentication protocols or standards are used? a. Extensible Authentication protocol (EAP) b. Kerberos c. Password Authentication Protocol (PAP) d. Radius e. Challenge Handshake Authentication (CHAP) 6