Podcast
Questions and Answers
Computer network technology changes at breakneck speed.
Computer network technology changes at breakneck speed.
True (A)
The software development cycle more commonly in use today is a one-time one.
The software development cycle more commonly in use today is a one-time one.
False (B)
Computer networks are constantly increasing in complexity.
Computer networks are constantly increasing in complexity.
True (A)
Not all analysis and design projects require all three network connectivity maps.
Not all analysis and design projects require all three network connectivity maps.
In a wide area connectivity map, a dotted line between two sites indicates the desired path for data (or voice) transmission.
In a wide area connectivity map, a dotted line between two sites indicates the desired path for data (or voice) transmission.
A metropolitan area connectivity map shares some of the characteristics of wide area maps and some of the characteristics of local area maps.
A metropolitan area connectivity map shares some of the characteristics of wide area maps and some of the characteristics of local area maps.
Latency, delivery rate, and failover are usually significant factors that are included at the local area level.
Latency, delivery rate, and failover are usually significant factors that are included at the local area level.
The streamlining and built-in repetition of the application lifecycle, along with the increased collaboration between the teams working on each app, has come to be known as DevOps.
The streamlining and built-in repetition of the application lifecycle, along with the increased collaboration between the teams working on each app, has come to be known as DevOps.
The term “feasible” has several meanings when it's applied to computer-based projects.
The term “feasible” has several meanings when it's applied to computer-based projects.
When calculating computer system benefits, you do not need to include intangible benefits.
When calculating computer system benefits, you do not need to include intangible benefits.
Project management is the application of specific skills, tools, and techniques to manage processes in such a way that the desired outcome is achieved.
Project management is the application of specific skills, tools, and techniques to manage processes in such a way that the desired outcome is achieved.
A new method, called waterfall, is starting to be employed by organizations, and it takes a linear path to SDLC.
A new method, called waterfall, is starting to be employed by organizations, and it takes a linear path to SDLC.
Computer networks are mission-critical systems and designing a new computer network or increasing the capacity of a current system requires careful planning.
Computer networks are mission-critical systems and designing a new computer network or increasing the capacity of a current system requires careful planning.
Capacity planning is a fairly easy and fast operation.
Capacity planning is a fairly easy and fast operation.
A local area overview connectivity map can show how individual workstations or groups of workstations are clustered with switches, routers, and server farms.
A local area overview connectivity map can show how individual workstations or groups of workstations are clustered with switches, routers, and server farms.
Computer simulations are easy to create, mainly because it is difficult to make mistakes in the modeling process and easy to discover them.
Computer simulations are easy to create, mainly because it is difficult to make mistakes in the modeling process and easy to discover them.
Compared to simulation, benchmarking is a relatively straightforward technique and can provide useful information when it's used to analyze a network.
Compared to simulation, benchmarking is a relatively straightforward technique and can provide useful information when it's used to analyze a network.
Setting up a benchmark test can be quite time-consuming.
Setting up a benchmark test can be quite time-consuming.
Many experts feel analytical modeling is a good way to determine network capacity.
Many experts feel analytical modeling is a good way to determine network capacity.
The advantage of analytical modeling is that it is extremely difficult to create inaccurate analytical models and thus generate results that are invalid.
The advantage of analytical modeling is that it is extremely difficult to create inaccurate analytical models and thus generate results that are invalid.
Once a baseline is created, the results can be used to identify network weaknesses and strengths.
Once a baseline is created, the results can be used to identify network weaknesses and strengths.
Baseline studies are most effective when they are initiated during a time when the network is experiencing severe problems.
Baseline studies are most effective when they are initiated during a time when the network is experiencing severe problems.
A system's time feasibility is the extent to which the system can be installed in a timely fashion that meets organizational needs.
A system's time feasibility is the extent to which the system can be installed in a timely fashion that meets organizational needs.
Capacity planning involves trying to determine the amount of workstation memory necessary to support an application or a set of applications.
Capacity planning involves trying to determine the amount of workstation memory necessary to support an application or a set of applications.
Load testing places the full force of anticipated demand on a system to determine if it can handle the load.
Load testing places the full force of anticipated demand on a system to determine if it can handle the load.
Regression testing cannot confirm that changes to one system haven't negatively impacted other systems or functionality.
Regression testing cannot confirm that changes to one system haven't negatively impacted other systems or functionality.
Puppet is a configuration management tool similar to Chef.
Puppet is a configuration management tool similar to Chef.
Ansible is an open-source and free automation tool.
Ansible is an open-source and free automation tool.
NetFlow is a proprietary traffic monitoring protocol from Cisco.
NetFlow is a proprietary traffic monitoring protocol from Cisco.
With the increasing speed of technological advancement, organizations are finding the ____ method for SDLC can no longer keep up with demand.
With the increasing speed of technological advancement, organizations are finding the ____ method for SDLC can no longer keep up with demand.
____ is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where it is enabled.
____ is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where it is enabled.
Change____ consists of carefully defined processes to evaluate the need for a change, the cost of the change, a plan for making the change with minimal disruption, and a backup plan if the change does not work as expected.
Change____ consists of carefully defined processes to evaluate the need for a change, the cost of the change, a plan for making the change with minimal disruption, and a backup plan if the change does not work as expected.
One technique used to model a corporation's network environment is to create ____.
One technique used to model a corporation's network environment is to create ____.
Three different modeling techniques can be used: ____ area connectivity maps, metropolitan area connectivity maps, and local area connectivity maps.
Three different modeling techniques can be used: ____ area connectivity maps, metropolitan area connectivity maps, and local area connectivity maps.
In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____.
In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____.
In a wide area connectivity map, external sites, such as suppliers or external agents, are denoted by circles containing the letter ____.
In a wide area connectivity map, external sites, such as suppliers or external agents, are denoted by circles containing the letter ____.
Data rate and security are still important parameters at the metropolitan layer, but ____ is probably not as important as it was in the wide area map.
Data rate and security are still important parameters at the metropolitan layer, but ____ is probably not as important as it was in the wide area map.
To examine the nodes in a wide area connectivity map in more detail, an analyst can expand each individual site into a ____ area connectivity map.
To examine the nodes in a wide area connectivity map in more detail, an analyst can expand each individual site into a ____ area connectivity map.
A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms.
A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms.
A system’s ____ feasibility is the extent to which the system can be created, given the company's current finances.
A system’s ____ feasibility is the extent to which the system can be created, given the company's current finances.
When a company is evaluating a project's ____ feasibility, the company must ask: Will the proposed system produce the expected results?
When a company is evaluating a project's ____ feasibility, the company must ask: Will the proposed system produce the expected results?
When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree?
When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree?
____ projection involves predicting one or more network capacities based on the current network parameters and multiplying those capacities by some constant.
____ projection involves predicting one or more network capacities based on the current network parameters and multiplying those capacities by some constant.
A ____ is an isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage.
A ____ is an isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage.
____ testing confirms that changes to one system haven't negatively impacted other systems or functionality.
____ testing confirms that changes to one system haven't negatively impacted other systems or functionality.
____ testers can verify connectivity and test for line faults, such as open circuits, short circuits, reversed circuits, and crossed circuits.
____ testers can verify connectivity and test for line faults, such as open circuits, short circuits, reversed circuits, and crossed circuits.
____ testers measure AC and DC volts, resistance, and continuity.
____ testers measure AC and DC volts, resistance, and continuity.
____ testers have a display that graphically shows a network segment and all the devices attached to it.
____ testers have a display that graphically shows a network segment and all the devices attached to it.
A(n) ____ can monitor traffic at a specific interface between a server or client and the network.
A(n) ____ can monitor traffic at a specific interface between a server or client and the network.
It is called ___ when a NIC transmits continuously but does not send valid data.
It is called ___ when a NIC transmits continuously but does not send valid data.
____ is a standard for generating, storing, and processing messages about events on many networked systems.
____ is a standard for generating, storing, and processing messages about events on many networked systems.
Most UNIX and Linux desktop operating systems provide a GUI application for easily reviewing and filtering the information in system ____.
Most UNIX and Linux desktop operating systems provide a GUI application for easily reviewing and filtering the information in system ____.
The cloud migration strategy ____ can also be called rip and replace.
The cloud migration strategy ____ can also be called rip and replace.
The cloud migration strategy ____ can also be called rebuild and rearchitect.
The cloud migration strategy ____ can also be called rebuild and rearchitect.
_____ refers to the use of software-based solutions to perform a process or procedure with minimal human intervention.
_____ refers to the use of software-based solutions to perform a process or procedure with minimal human intervention.
A ____ is a collection of physical or digital documents that outline the precise steps to complete procedures or operations in a specific IT environment.
A ____ is a collection of physical or digital documents that outline the precise steps to complete procedures or operations in a specific IT environment.
____ are important information to know for cloud migration because countries and states have different laws for data protection.
____ are important information to know for cloud migration because countries and states have different laws for data protection.
____ is an industry standard created by the Internet Engineering Task Force and designed originally to manage Internet components.
____ is an industry standard created by the Internet Engineering Task Force and designed originally to manage Internet components.
The ____ software controls the operations of a managed element and maintains a database of information about all managed elements.
The ____ software controls the operations of a managed element and maintains a database of information about all managed elements.
We call ____ when one environment is active while the other environment receives updates, allowing for further testing, or serving as a backup.
We call ____ when one environment is active while the other environment receives updates, allowing for further testing, or serving as a backup.
The most active portion of the ALM is the ____ phase.
The most active portion of the ALM is the ____ phase.
When a(n) ____ or architect is asked to design or update an IT system, they will typically create a set of models for both the existing system (if there is one) and the proposed system.
When a(n) ____ or architect is asked to design or update an IT system, they will typically create a set of models for both the existing system (if there is one) and the proposed system.
In order to create a(n) ____ connectivity map, the modeler begins by identifying each site or location in which the company has an office.
In order to create a(n) ____ connectivity map, the modeler begins by identifying each site or location in which the company has an office.
If a company desires a metropolitan area network connection between one of its offices and another business, it can use a(n) ____ connectivity map to outline this connection and define the desired network characteristics.
If a company desires a metropolitan area network connection between one of its offices and another business, it can use a(n) ____ connectivity map to outline this connection and define the desired network characteristics.
A(n) ____ analysis is a study used to compare current conditions with desired conditions.
A(n) ____ analysis is a study used to compare current conditions with desired conditions.
If only an overview of a local network is desired, then the analyst can create a(n) ____ connectivity map.
If only an overview of a local network is desired, then the analyst can create a(n) ____ connectivity map.
The ____ feasibility of a system is the extent to which the system can be created and implemented using currently existing technology.
The ____ feasibility of a system is the extent to which the system can be created and implemented using currently existing technology.
To collect baseline information on ____ you create a list of the number and types of system nodes in the network.
To collect baseline information on ____ you create a list of the number and types of system nodes in the network.
Collecting baseline information on ____ involves listing the types of operational protocols used throughout the system.
Collecting baseline information on ____ involves listing the types of operational protocols used throughout the system.
The cloud migration strategy ____ can also be called lift and shift.
The cloud migration strategy ____ can also be called lift and shift.
Network personnel create a ____ to determine the normal and current operating conditions of the network.
Network personnel create a ____ to determine the normal and current operating conditions of the network.
Flashcards
Rapid evolution of network technology
Rapid evolution of network technology
The rapid pace of changes in computer network technologies.
Modern Software Development Cycle
Modern Software Development Cycle
A modern approach to application development that emphasizes iterative cycles and continuous improvements.
Increasing complexity of networks
Increasing complexity of networks
Computer networks are becoming more complex and challenging to manage effectively.
Essential network maps
Essential network maps
Signup and view all the flashcards
Dotted lines on WAN maps
Dotted lines on WAN maps
Signup and view all the flashcards
Metropolitan area connectivity maps characteristics
Metropolitan area connectivity maps characteristics
Signup and view all the flashcards
LAN-specific factors
LAN-specific factors
Signup and view all the flashcards
DevOps
DevOps
Signup and view all the flashcards
Meaning of 'Feasible' in Projects
Meaning of 'Feasible' in Projects
Signup and view all the flashcards
Calculating system benefits
Calculating system benefits
Signup and view all the flashcards
Project Management Goals
Project Management Goals
Signup and view all the flashcards
Waterfall method
Waterfall method
Signup and view all the flashcards
Importance of network planning
Importance of network planning
Signup and view all the flashcards
Capacity planning complexity
Capacity planning complexity
Signup and view all the flashcards
Local area detailed connectivity map
Local area detailed connectivity map
Signup and view all the flashcards
Simulation challenges
Simulation challenges
Signup and view all the flashcards
Benchmarking: network analysis
Benchmarking: network analysis
Signup and view all the flashcards
Benchmark setup time
Benchmark setup time
Signup and view all the flashcards
Analytical modeling for capacity
Analytical modeling for capacity
Signup and view all the flashcards
Accuracy of analytical models
Accuracy of analytical models
Signup and view all the flashcards
Baseline studies and network analysis
Baseline studies and network analysis
Signup and view all the flashcards
Effective baseline study timing
Effective baseline study timing
Signup and view all the flashcards
Time feasibility
Time feasibility
Signup and view all the flashcards
Capacity planning
Capacity planning
Signup and view all the flashcards
Load testing
Load testing
Signup and view all the flashcards
Regression testing
Regression testing
Signup and view all the flashcards
Cable testers
Cable testers
Signup and view all the flashcards
Electrical testers
Electrical testers
Signup and view all the flashcards
Network testers
Network testers
Signup and view all the flashcards
Protocol analyzers
Protocol analyzers
Signup and view all the flashcards
Jabbering in networks
Jabbering in networks
Signup and view all the flashcards
Syslog standard
Syslog standard
Signup and view all the flashcards
Reviewing system logs
Reviewing system logs
Signup and view all the flashcards
Repurchase cloud migration
Repurchase cloud migration
Signup and view all the flashcards
Phases of Cloud Migration
Phases of Cloud Migration
Signup and view all the flashcards
Computer simulations in network design
Computer simulations in network design
Signup and view all the flashcards
Benchmarking network performance
Benchmarking network performance
Signup and view all the flashcards
Analytical modeling for network analysis
Analytical modeling for network analysis
Signup and view all the flashcards
Retain cloud migration strategy
Retain cloud migration strategy
Signup and view all the flashcards
Baseline study for networks
Baseline study for networks
Signup and view all the flashcards
Baseline information collection
Baseline information collection
Signup and view all the flashcards
Rehost cloud migration
Rehost cloud migration
Signup and view all the flashcards
Refactor cloud migration
Refactor cloud migration
Signup and view all the flashcards
Automation in IT
Automation in IT
Signup and view all the flashcards
Runbooks in IT
Runbooks in IT
Signup and view all the flashcards
Legal restrictions on data
Legal restrictions on data
Signup and view all the flashcards
SNMP: Network Management
SNMP: Network Management
Signup and view all the flashcards
SNMP Manager
SNMP Manager
Signup and view all the flashcards
Blue-green deployment
Blue-green deployment
Signup and view all the flashcards
ALM Software Development Phase
ALM Software Development Phase
Signup and view all the flashcards
Systems Analyst and IT Modeling
Systems Analyst and IT Modeling
Signup and view all the flashcards
Wide Area Connectivity Map
Wide Area Connectivity Map
Signup and view all the flashcards
Metropolitan Area Connectivity Map
Metropolitan Area Connectivity Map
Signup and view all the flashcards
Gap Analysis in Network Design
Gap Analysis in Network Design
Signup and view all the flashcards
Local Area Overview Connectivity Map
Local Area Overview Connectivity Map
Signup and view all the flashcards
Technical Feasibility
Technical Feasibility
Signup and view all the flashcards
Study Notes
Computer Network Design and Management
- Computer network technology changes rapidly.
- The software development cycle is not always a one-time event.
- Computer networks are constantly becoming more complex.
- Not all network analysis and design projects need all three network connectivity maps.
- A dotted line on a wide area connectivity map does not indicate the desired data path.
- Metropolitan area connectivity maps share features of both wide area and local area maps.
- Factors like latency and failover are typically significant at the local area level.
- DevOps refers to streamlined application lifecycle processes with increased team collaboration.
- The term "feasible" has various meanings in computer-based projects.
- Intangible benefits should be considered when calculating computer system benefits.
- Project management involves specific skills, tools, and techniques to achieve project goals.
- The waterfall method is no longer the only method employed by organisations.
- Computer networks are critical and necessitate careful planning for new system creation or capacity enhancements.
- Capacity planning isn't a simple or quick process.
- Local area overview maps illustrate how workstations group with switches, routers, and server farms.
- Computer simulations are not always easy to create due to potential errors in the modelling processes.
- Benchmarking offers useful insight into network analysis.
- Benchmark testing commonly requires a significant amount of time.
- Analytical modelling is a valuable approach for determining network capacity.
- Inaccurate analytical models can lead to invalid results.
- Baseline studies are usually most effective during periods of minimal network problems.
- System time feasibility is the extent to which a system can meet organizational needs in a timely manner.
- Capacity planning determines necessary workstation memory for application support.
- Load testing evaluates a system's ability to handle projected demand.
- Regression testing does not guarantee that changes to one system haven't affected others.
- Puppet is a configuration management tool similar to Chef.
- Ansible is an open source and free automation tool.
- NetFlow is a Cisco proprietary traffic monitoring protocol.
- Agile methodologies are becoming increasingly important due to the rapid pace of technological advancements.
- The SNMP protocol manages data for network components.
- Change management involves assessment of changes, their cost, and plans to minimise disruptions.
- Connectivity maps are used to model network environments.
- Three categories of connectivity maps exist: area, metropolitan area, and local.
- External sites on wide area maps are represented by circles with the letter 'M'.
- Data rate and security are important parameters, but data rate is often less critical for metropolitan areas.
- Regression testing validates system functionality after changes without affecting other systems
- Network testers measure AC and DC voltages, resistance, and continuity.
- Network testers graphically represent network segments and connected devices
- Protocol analysers monitor the flow at given network interfaces
- A network device error is called a "flood" error.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the rapidly evolving field of computer network design and management. This quiz covers various aspects, including connectivity maps, project management techniques, and the DevOps lifecycle. Perfect for those looking to enhance their understanding of computer networks and their complexities.