Name: Date: ______ 1. Which of the following is not a step under the

advertisement

Name: __________________________ Date: _____________

1. Which of the following is not a step under the traditional network design approach?

A) An analyst develops cost estimates of the circuits needed to support the network.

B) An analyst takes the traffic on the current network and then multiplies that by a factor of 3.65 to come up with the estimate of the total traffic for the new network.

C) An analyst meets with users to identify user needs.

D) An analyst develops a precise estimate of the amount of data that users will send and receive to estimate the total amount of traffic on each part of the network.

E) An analyst designs the circuits to support the estimated traffic, allowing for modest growth.

2. The traditional network design approach does not work well for _________ networks.

A) slowly evolving

B) rapidly growing

C) static

D) modestly growing

E) not growing

3. Which of the following is not making the traditional design approach less appropriate for today's networks?

A) The underlying technology of networking devices is changing very rapidly

B) The underlying technology of client and server devices is changing very rapidly

C) The underlying technology of circuits is changing very rapidly

D) Growth in network traffic is very high

E) The most expensive part of any network is the hardware

4. Which of the following is not contributing to the dramatic increase in network traffic today?

A) Video applications on networks are becoming common.

B) Electronic mail is now used by most people who work in organizations.

C) Web searches are now commonly performed by network users.

D) Client computers today can have 512 RAM, a 60 Gb hard drive, and 1.86 Ghz processors.

E) Multimedia applications on networks are becoming common.

Page 1

5. Which of the following is false about staff costs for a network?

A) The most expensive part of the network today is the staff who design, operate, and maintain it

B) The emphasis is on network designs that reduce staff time needed to operate them

C) Network staff are often required to learn to operate a variety of devices

D) Network staff are often required to maintain a variety of devices

E) When a variety of devices are used in a network, it takes less time to perform network management activities

6. The building block design approach is sometimes called:

A) wide and shallow

B) narrow and deep

C) wide and deep

D) narrow and shallow

E) narrow and flat

7. Nowadays, most organizations use a simpler approach to network design called the

___________ approach.

A) building-block

B) frame definition

C) prototype

D) systems development life cycle

E) guided network

8. Which of the following is not a step that is used in newer type of network design process?

A) cost assessment

B) technology design

C) implementation

D) needs analysis

E) none of the above is a correct answer

9. In __________, the network designer attempts to understand the fundamental current and future network needs of the various users, departments, and applications.

A) technology design

B) needs analysis

C) narrow and deep analysis

D) cost assessment

E) distribution layering

Page 2

10. In __________, the network designer examines the available technologies and assesses which options will meet the users' needs.

A) technology design

B) needs analysis

C) narrow and deep analysis

D) cost assessment

E) distribution layering

11. In __________, the network designer considers the relative cost of the technologies.

A) technology design

B) needs analysis

C) narrow and deep analysis

D) cost assessment

E) distribution layering

12. Which of the following is not true about network design?

A) In designing LAN networks, network designers tend to err on the side of building too big a network

B) In designing BN networks, network designers tend to err on the side of building too big a network

C) In designing WAN networks, network designers tend to err on the side of building too small a network

D) In designing LAN networks, network designers tend to err on the side of building too small a network

E) In designing MAN networks, network designers tend to err on the side of building too small a network

13. In needs analysis:

A) a great deal of the work has probably never been done

B) the goal is to understand what users and applications the network will support

C) the geographic scope is not an important consideration

D) a baseline of current operations is not important

E) the rate of growth of network traffic is not an issue

14. Gaining an understanding of the current application system and messages provides a

_________ against which future design requirements can be gauged.

A) backplane

B) baseline

C) turnpike document

D) wish list

E) RFP

Page 3

15. The goal of the needs analysis step is to produce a ___________, or a statement of the network elements necessary to meet the needs of the organization.

A) building block

B) access layer

C) core layer

D) cost assessment

E) logical network design

16. Which of the following is not a conceptual part, or layer, of the geographic scope of the network?

A) core layer

B) application layer

C) access layer

D) distribution layer

E) the layer that connects the different distribution layers to each other

17. Which of the following is not a basic level of the geographic scope of the network?

A) local area network

B) focused area network

C) backbone network

D) metropolitan area network

E) wide area network

18. Which of the following would not be collected by a designer, working in the needs analysis phase, who was documenting general information and characteristics of the environment in which the network must operate?

A) local laws that could affect the network

B) international laws that could affect the network

C) federal laws that could affect the network

D) building codes that could affect the network

E) traffic laws that could affect the network

19. __________ is not an important consideration when network designers review old and new applications.

A) Reviewing the NFL scores

B) Reviewing the organization's possible changes in product mix

C) Understanding the organization's strategic plans

D) Understanding development plans for new uses of electronic commerce

E) Reviewing the organization's projections of sales

Page 4

20. Which of the following is not an example of identifying protocols that are needed to support hardware and software requirements of applications that will use the network?

A) an application will use HTTP over TCP/IP

B) an application will run on an IBM mainframe and so the network will require SNA traffic

C) an application will need a gateway to translate SNA traffic into TCP/IP protocols

D) an application will use SPX/IPX with a Novell file server

E) an application will have drop down menu choices

21. Which of the following is not a way in which network requirements, identified in the needs analysis of the network design process, are organized?

A) non-necessary requirements

B) wish list requirements

C) desirable requirements

D) mandatory requirements

E) none of the above is an appropriate answer

22. Which of the following is not included in the key deliverable for the needs assessment stage, the set of logical network diagrams?

A) applications of the proposed network

B) servers in the proposed network

C) circuits in the proposed network

D) specific routers that have been chosen to implement the proposed network

E) clients in the proposed network

23. Which of the following is not an example of a building block used in technology design?

A) typical application

B) typical user

C) high traffic application

D) standard network circuit

E) specifications for a particular lighting fixture in the network operating center

24. Once the needs have been defined in the logical network design, the next step is to develop a(n) __________.

A) application

B) baseline

C) physical network design

D) turnpike design

E) backplane design

Page 5

25. Which of the following would not be a type of protocol that needs to be considered in technology design?

A) Ethernet

B) 10 Mbps

C) TCP/IP

D) ATM

E) SNA

26. Estimating the size and type of the “standard” and “advanced” network circuits is called

_________.

A) needs categorization

B) turnpike design

C) cost assessment

D) capacity planning

E) soliciting RFPs

27. Which of the following would not be a type of circuit that needs to be considered when planning for technology design capacity?

A) 1000 Mbps

B) Ethernet

C) 10 Mbps

D) 100 Mbps

E) 1 Gbps

28. In the technology design stage of network design,

A) the fundamental technology/protocols to be chosen have no relationship with the circuit capacity

B) the decision for fundamental technology/protocols can be made without considering circuit capacity

C) the decision for circuit capacity can be made without considering fundamental technology/protocols

D) the decisions for fundamental technology/protocols and circuit capacity are interrelated

E) the decision for fundamental technology/protocols and/or circuit capacities is not made at this stage

Page 6

29. ___________ refers to the amount of data transmitted on a circuit.

A) Circuit loading

B) Leading edge deployment

C) Capacity planning

D) Calculating message volumes

E) Requirements documentation

30. __________ is an estimate of the highest data volume on a link.

A) Data mode

B) Backplane load

C) Peak circuit traffic

D) Leading edge data flow

E) Circuit transfer

31. To establish circuit loading, the designer usually starts with the:

A) total characters transmitted per day on each circuit, or, if possible, the number of characters transmitted per two-second intervals if peaks must be met

B) individual user training

C) bus diameter, disk cache that is used at the server station

D) channel bandwidth and baud rate used at each client

E) local, trunk, IXC, DDD, and leased-line circuit bandwidth for each node

32. According to one rule of thumb, ______ percent of circuit loading information is easy to gather.

A) 50

B) 25

C) 80

D) 19

E) 20

33. A _________ results when a network is used to a greater extent than was originally anticipated by the network designer.

A) leading edge data flow

B) circuit load

C) turnpike effect

D) protocol volume

E) capacity plan

Page 7

34. There are some network modeling tools that can ________ the existing network.

A) discover

B) disassemble

C) sensitize

D) maintain

E) implement

35. ________ is used to model the behavior of the planned communication network once the proposed network map is complete.

A) Implementation

B) Post-implementation review

C) Documentation

D) Simulation

E) Training users

36. Which of the following are not costs that are generally considered during the cost assessment stage of the network design process?

A) cost of advertising brochures for new products to be offered by an organization

B) internetworking devices cost

C) network management costs

D) circuit costs

E) software costs for network operating system

37. Which of the following is not a main item for which network designers estimate costs for the proposed network?

A) software

B) hardware

C) purchasing and installing circuits

D) ergonomic chairs for users

E) circuits provided by common carriers

38. To estimate costs for large network purchases, organizations often:

A) purchase all network purchases 'off the shelf'

B) obtain 'book value' information for the existing network from the accounting department

C) ask other users what they paid for their network bought in the past

D) multiply old network costs by a factor of 3

E) issue an RFP to vendors

Page 8

39. RFP stands for:

A) Request for Proposal

B) Ring Fault Path

C) Routing File Protocol

D) Record Facsimile Program

E) Redundant File Protocol

40. Estimating the cost of a network is ______ complex than estimating the cost of one new piece of data processing hardware.

A) much more

B) much less

C) about the same

D) exactly the same

E) a little more

41. Which of the following is a way to sell the network proposal to management?

A) talk about upgrades from 10Mbps to 100Mbps

B) give many details about using routers vs. gateways for a particular connection

C) concentrate on a discussion about token ring vs. Ethernet protocol

D) focus on network reliability

E) discuss SNA architecture

42. Which of the following is not a key deliverable for the cost assessment step?

A) RFP

B) list of wish list requirements

C) revised physical network diagram

D) business case, defined in business objectives and business language, that supports the network design

E) none of the above is an appropriate choice

43. The physical network diagram is done:

A) before the vendors are selected

B) before the RFP is sent out

C) after the RFP is sent out, but before the vendors are selected

D) after the vendors are selected

E) after the network has been implemented

Page 9

44. _________ are standard devices, such as switches and routers, that have small onboard computers to monitor traffic flows through the device as well as the status of the device and other devices connected to it.

A) Unmanaged devices

B) Managed devices

C) MIB

D) Application hardware

E) SNMP

45. Correlating the individual error messages into a pattern to find the true cause of the problem is referred to as_______

A) network-based analysis

B) application cause analysis

C) root cause analysis

D) alarm storm

E) none of the above is an appropriate answer

46. A central database called the _____________, has an agent that collects information about a device and makes this information available to the network management station.

A) remote monitoring

B) simple network management protocol

C) management information base

D) system management software

E) common management interface protocol

47. When devices operate as fast as the circuits they connect and add virtually no delays, we say that the device operates at _______________.

A) network speed

B) wire speed

C) content speed

D) balancing speed

E) none of the above

48. Storing other people's Web data closer to your users is referred to as

A) SNMP

B) web storing

C) content caching

D) load balancing

E) traffic analysis

Page 10

Download