Placeholder

CIS 532 Week 5 Midterm Exam (2 Different Versions)

$25.00

Quantity:

Product Description

CIS 532 Week 5 Midterm Exam (2 Different Versions)

CIS 532 Week 5 Midterm Exam – Latest

Using a systematic top-down methodology to design networks solves the problem of ____________________ that are difficult to trouble shoot and expand.

What are the three types of unicast addresses in IPv6?

usiness goals include the following:

A(n) _____ routing protocol would most likely be found on an older network or one which values simplicity and ease of troubleshooting.

Which of the following are technical goals for scaling and upgrading corporate enterprise networks when the business goal is to make more data available to users?

What three methods for IP address allocation does DHCP (Dynamic Host Configuration Protocol) support?

What causes the system to begin a new cycle of modification, testing, and optimization?

Some design customers might think they need five nines availability. This refers to:

The addressing model can dictate which ___________ and __________ protocols you can select.

To maximize network performance, reduce the time to implement and troubleshoot a design, and minimize costs, you should use a ___________________ model.

Detailed campus network maps should show various information, including

Problems which can effect an RF signal traveling through different objects include reflection, diffraction, absorption, and

Scalability is the prime goal for many enterprise network design customers. It refers to how much:

What should be done when analyzing technical requirements for a network design?

Why don’t classful routing protocols support discontiguous subnets?

In the structured network design process, the ________ model is developed prior to the __________ model.

Which of the following traffic flow types would be characterized as bidirectional and asymmetric?

Which of the following traffic flow types would be characterized as bidirectional and asymmetric?

________________ network designs duplicate network components with the goal of eliminating single points of failure on the network.

Business constraints might include budgets, limited network personnel, and

The main goal of ______________________________________ is to represent user’s needs accurately.

_____________________ depicts routers, logical links between routers, and high-level routing protocol configuration information.

What is the difference between classful routing and classless routing?

Ideally, ________ should be the same as ________.

Workplace politics would be considered

What is another term for bandwidth?

CIS 532 Week 5 Midterm Exam – Old

 

_________ computing refers to applications that require multiple computing nodes working together to complete a job.

A(n) _____ routing protocol would most likely be found on an older network or one which values simplicity and ease of troubleshooting.

An advantage a full-mesh topology has over a partial-mesh topology is that

Under which section would you find information about the company presenting the design proposal, including pages from annual reports, product catalogs or recent favorable press releases?

The addressing model can dictate which ___________ and __________ protocols you can select.

The triggered updates used within EIGRP include

A good naming model should let a user transparently access a service by __________ rather than by _________.

What causes the system to begin a new cycle of modification, testing, and optimization?

Most systems follow a cyclical set of phases:

_____________________ depicts routers, logical links between routers, and high-level routing protocol configuration information.

Your network diagram should document the _____________ connections between buildings, their number and type, and how far the buildings are from one another.

In the structured network design process, the ________ model is developed prior to the __________ model.

Detailed campus network maps should show various information, including

When you know the ________ an application uses, you will be able to completely characterize application behavior.

Examination of an existing network consists of learning about the topology and structure, and

When characterizing the logical topology, you should look for

In order to understand network traffic flow, what needs to be identified first?

Using a systematic top-down methodology to design networks solves the problem of ____________________ that are difficult to trouble shoot and expand.

The four characteristics of network topologies are:

What 3 things are needed in order to calculate whether capacity is sufficient?

Business constraints might include budgets, limited network personnel, and

In order to judge how to best meet expectations for network scalability, performance, and availability, you should first

Network management functions include:

What three methods for IP address allocation does DHCP (Dynamic Host Configuration Protocol) support?

What is the difference between classful routing and classless routing?