Podcast
Questions and Answers
Computer network technology changes at breakneck speed.
Computer network technology changes at breakneck speed.
True
The software development cycle more commonly in use today is a one-time one.
The software development cycle more commonly in use today is a one-time one.
False
Computer networks are constantly increasing in complexity.
Computer networks are constantly increasing in complexity.
True
Not all analysis and design projects require all three network connectivity maps.
Not all analysis and design projects require all three network connectivity maps.
Signup and view all the answers
In a wide area connectivity map, a dotted line between two sites indicates the desired path for data (or voice) transmission.
In a wide area connectivity map, a dotted line between two sites indicates the desired path for data (or voice) transmission.
Signup and view all the answers
A metropolitan area connectivity map shares some of the characteristics of wide area maps and some of the characteristics of local area maps.
A metropolitan area connectivity map shares some of the characteristics of wide area maps and some of the characteristics of local area maps.
Signup and view all the answers
Latency, delivery rate, and failover are usually significant factors that are included at the local area level.
Latency, delivery rate, and failover are usually significant factors that are included at the local area level.
Signup and view all the answers
The streamlining and built-in repetition of the application lifecycle, along with the increased collaboration between the teams working on each app, has come to be known as DevOps.
The streamlining and built-in repetition of the application lifecycle, along with the increased collaboration between the teams working on each app, has come to be known as DevOps.
Signup and view all the answers
The term “feasible” has several meanings when it's applied to computer-based projects.
The term “feasible” has several meanings when it's applied to computer-based projects.
Signup and view all the answers
When calculating computer system benefits, you do not need to include intangible benefits.
When calculating computer system benefits, you do not need to include intangible benefits.
Signup and view all the answers
Project management is the application of specific skills, tools, and techniques to manage processes in such a way that the desired outcome is achieved.
Project management is the application of specific skills, tools, and techniques to manage processes in such a way that the desired outcome is achieved.
Signup and view all the answers
A new method, called waterfall, is starting to be employed by organizations, and it takes a linear path to SDLC.
A new method, called waterfall, is starting to be employed by organizations, and it takes a linear path to SDLC.
Signup and view all the answers
Computer networks are mission-critical systems and designing a new computer network or increasing the capacity of a current system requires careful planning.
Computer networks are mission-critical systems and designing a new computer network or increasing the capacity of a current system requires careful planning.
Signup and view all the answers
Capacity planning is a fairly easy and fast operation.
Capacity planning is a fairly easy and fast operation.
Signup and view all the answers
A local area overview connectivity map can show how individual workstations or groups of workstations are clustered with switches, routers, and server farms.
A local area overview connectivity map can show how individual workstations or groups of workstations are clustered with switches, routers, and server farms.
Signup and view all the answers
Computer simulations are easy to create, mainly because it is difficult to make mistakes in the modeling process and easy to discover them.
Computer simulations are easy to create, mainly because it is difficult to make mistakes in the modeling process and easy to discover them.
Signup and view all the answers
Compared to simulation, benchmarking is a relatively straightforward technique and can provide useful information when it's used to analyze a network.
Compared to simulation, benchmarking is a relatively straightforward technique and can provide useful information when it's used to analyze a network.
Signup and view all the answers
Setting up a benchmark test can be quite time-consuming.
Setting up a benchmark test can be quite time-consuming.
Signup and view all the answers
Many experts feel analytical modeling is a good way to determine network capacity.
Many experts feel analytical modeling is a good way to determine network capacity.
Signup and view all the answers
The advantage of analytical modeling is that it is extremely difficult to create inaccurate analytical models and thus generate results that are invalid.
The advantage of analytical modeling is that it is extremely difficult to create inaccurate analytical models and thus generate results that are invalid.
Signup and view all the answers
Once a baseline is created, the results can be used to identify network weaknesses and strengths.
Once a baseline is created, the results can be used to identify network weaknesses and strengths.
Signup and view all the answers
Baseline studies are most effective when they are initiated during a time when the network is experiencing severe problems.
Baseline studies are most effective when they are initiated during a time when the network is experiencing severe problems.
Signup and view all the answers
A system's time feasibility is the extent to which the system can be installed in a timely fashion that meets organizational needs.
A system's time feasibility is the extent to which the system can be installed in a timely fashion that meets organizational needs.
Signup and view all the answers
Capacity planning involves trying to determine the amount of workstation memory necessary to support an application or a set of applications.
Capacity planning involves trying to determine the amount of workstation memory necessary to support an application or a set of applications.
Signup and view all the answers
Load testing places the full force of anticipated demand on a system to determine if it can handle the load.
Load testing places the full force of anticipated demand on a system to determine if it can handle the load.
Signup and view all the answers
Regression testing cannot confirm that changes to one system haven't negatively impacted other systems or functionality.
Regression testing cannot confirm that changes to one system haven't negatively impacted other systems or functionality.
Signup and view all the answers
Puppet is a configuration management tool similar to Chef.
Puppet is a configuration management tool similar to Chef.
Signup and view all the answers
Ansible is an open-source and free automation tool.
Ansible is an open-source and free automation tool.
Signup and view all the answers
NetFlow is a proprietary traffic monitoring protocol from Cisco.
NetFlow is a proprietary traffic monitoring protocol from Cisco.
Signup and view all the answers
With the increasing speed of technological advancement, organizations are finding the ____ method for SDLC can no longer keep up with demand.
With the increasing speed of technological advancement, organizations are finding the ____ method for SDLC can no longer keep up with demand.
Signup and view all the answers
____ is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where it is enabled.
____ is a proprietary traffic monitoring protocol from Cisco that tracks all IP traffic crossing any interface where it is enabled.
Signup and view all the answers
Change____ consists of carefully defined processes to evaluate the need for a change, the cost of the change, a plan for making the change with minimal disruption, and a backup plan if the change does not work as expected.
Change____ consists of carefully defined processes to evaluate the need for a change, the cost of the change, a plan for making the change with minimal disruption, and a backup plan if the change does not work as expected.
Signup and view all the answers
One technique used to model a corporation's network environment is to create ____.
One technique used to model a corporation's network environment is to create ____.
Signup and view all the answers
Three different modeling techniques can be used: ____ area connectivity maps, metropolitan area connectivity maps, and local area connectivity maps.
Three different modeling techniques can be used: ____ area connectivity maps, metropolitan area connectivity maps, and local area connectivity maps.
Signup and view all the answers
In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____.
In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____.
Signup and view all the answers
In a wide area connectivity map, external sites, such as suppliers or external agents, are denoted by circles containing the letter ____.
In a wide area connectivity map, external sites, such as suppliers or external agents, are denoted by circles containing the letter ____.
Signup and view all the answers
Data rate and security are still important parameters at the metropolitan layer, but ____ is probably not as important as it was in the wide area map.
Data rate and security are still important parameters at the metropolitan layer, but ____ is probably not as important as it was in the wide area map.
Signup and view all the answers
To examine the nodes in a wide area connectivity map in more detail, an analyst can expand each individual site into a ____ area connectivity map.
To examine the nodes in a wide area connectivity map in more detail, an analyst can expand each individual site into a ____ area connectivity map.
Signup and view all the answers
A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms.
A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms.
Signup and view all the answers
A system’s ____ feasibility is the extent to which the system can be created, given the company's current finances.
A system’s ____ feasibility is the extent to which the system can be created, given the company's current finances.
Signup and view all the answers
When a company is evaluating a project's ____ feasibility, the company must ask: Will the proposed system produce the expected results?
When a company is evaluating a project's ____ feasibility, the company must ask: Will the proposed system produce the expected results?
Signup and view all the answers
When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree?
When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree?
Signup and view all the answers
____ projection involves predicting one or more network capacities based on the current network parameters and multiplying those capacities by some constant.
____ projection involves predicting one or more network capacities based on the current network parameters and multiplying those capacities by some constant.
Signup and view all the answers
A ____ is an isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage.
A ____ is an isolated environment where you can experiment with changes or potentially dangerous software without exposing sensitive resources to risk of damage.
Signup and view all the answers
____ testing confirms that changes to one system haven't negatively impacted other systems or functionality.
____ testing confirms that changes to one system haven't negatively impacted other systems or functionality.
Signup and view all the answers
____ testers can verify connectivity and test for line faults, such as open circuits, short circuits, reversed circuits, and crossed circuits.
____ testers can verify connectivity and test for line faults, such as open circuits, short circuits, reversed circuits, and crossed circuits.
Signup and view all the answers
____ testers measure AC and DC volts, resistance, and continuity.
____ testers measure AC and DC volts, resistance, and continuity.
Signup and view all the answers
____ testers have a display that graphically shows a network segment and all the devices attached to it.
____ testers have a display that graphically shows a network segment and all the devices attached to it.
Signup and view all the answers
A(n) ____ can monitor traffic at a specific interface between a server or client and the network.
A(n) ____ can monitor traffic at a specific interface between a server or client and the network.
Signup and view all the answers
It is called ___ when a NIC transmits continuously but does not send valid data.
It is called ___ when a NIC transmits continuously but does not send valid data.
Signup and view all the answers
____ is a standard for generating, storing, and processing messages about events on many networked systems.
____ is a standard for generating, storing, and processing messages about events on many networked systems.
Signup and view all the answers
Most UNIX and Linux desktop operating systems provide a GUI application for easily reviewing and filtering the information in system ____.
Most UNIX and Linux desktop operating systems provide a GUI application for easily reviewing and filtering the information in system ____.
Signup and view all the answers
The cloud migration strategy ____ can also be called rip and replace.
The cloud migration strategy ____ can also be called rip and replace.
Signup and view all the answers
The cloud migration strategy ____ can also be called rebuild and rearchitect.
The cloud migration strategy ____ can also be called rebuild and rearchitect.
Signup and view all the answers
_____ refers to the use of software-based solutions to perform a process or procedure with minimal human intervention.
_____ refers to the use of software-based solutions to perform a process or procedure with minimal human intervention.
Signup and view all the answers
A ____ is a collection of physical or digital documents that outline the precise steps to complete procedures or operations in a specific IT environment.
A ____ is a collection of physical or digital documents that outline the precise steps to complete procedures or operations in a specific IT environment.
Signup and view all the answers
____ are important information to know for cloud migration because countries and states have different laws for data protection.
____ are important information to know for cloud migration because countries and states have different laws for data protection.
Signup and view all the answers
____ is an industry standard created by the Internet Engineering Task Force and designed originally to manage Internet components.
____ is an industry standard created by the Internet Engineering Task Force and designed originally to manage Internet components.
Signup and view all the answers
The ____ software controls the operations of a managed element and maintains a database of information about all managed elements.
The ____ software controls the operations of a managed element and maintains a database of information about all managed elements.
Signup and view all the answers
We call ____ when one environment is active while the other environment receives updates, allowing for further testing, or serving as a backup.
We call ____ when one environment is active while the other environment receives updates, allowing for further testing, or serving as a backup.
Signup and view all the answers
The most active portion of the ALM is the ____ phase.
The most active portion of the ALM is the ____ phase.
Signup and view all the answers
When a(n) ____ or architect is asked to design or update an IT system, they will typically create a set of models for both the existing system (if there is one) and the proposed system.
When a(n) ____ or architect is asked to design or update an IT system, they will typically create a set of models for both the existing system (if there is one) and the proposed system.
Signup and view all the answers
In order to create a(n) ____ connectivity map, the modeler begins by identifying each site or location in which the company has an office.
In order to create a(n) ____ connectivity map, the modeler begins by identifying each site or location in which the company has an office.
Signup and view all the answers
If a company desires a metropolitan area network connection between one of its offices and another business, it can use a(n) ____ connectivity map to outline this connection and define the desired network characteristics.
If a company desires a metropolitan area network connection between one of its offices and another business, it can use a(n) ____ connectivity map to outline this connection and define the desired network characteristics.
Signup and view all the answers
A(n) ____ analysis is a study used to compare current conditions with desired conditions.
A(n) ____ analysis is a study used to compare current conditions with desired conditions.
Signup and view all the answers
If only an overview of a local network is desired, then the analyst can create a(n) ____ connectivity map.
If only an overview of a local network is desired, then the analyst can create a(n) ____ connectivity map.
Signup and view all the answers
The ____ feasibility of a system is the extent to which the system can be created and implemented using currently existing technology.
The ____ feasibility of a system is the extent to which the system can be created and implemented using currently existing technology.
Signup and view all the answers
To collect baseline information on ____ you create a list of the number and types of system nodes in the network.
To collect baseline information on ____ you create a list of the number and types of system nodes in the network.
Signup and view all the answers
Collecting baseline information on ____ involves listing the types of operational protocols used throughout the system.
Collecting baseline information on ____ involves listing the types of operational protocols used throughout the system.
Signup and view all the answers
The cloud migration strategy ____ can also be called lift and shift.
The cloud migration strategy ____ can also be called lift and shift.
Signup and view all the answers
Network personnel create a ____ to determine the normal and current operating conditions of the network.
Network personnel create a ____ to determine the normal and current operating conditions of the network.
Signup and view all the answers
Study Notes
Computer Network Design and Management
- Computer network technology changes rapidly.
- The software development cycle is not always a one-time event.
- Computer networks are constantly becoming more complex.
- Not all network analysis and design projects need all three network connectivity maps.
- A dotted line on a wide area connectivity map does not indicate the desired data path.
- Metropolitan area connectivity maps share features of both wide area and local area maps.
- Factors like latency and failover are typically significant at the local area level.
- DevOps refers to streamlined application lifecycle processes with increased team collaboration.
- The term "feasible" has various meanings in computer-based projects.
- Intangible benefits should be considered when calculating computer system benefits.
- Project management involves specific skills, tools, and techniques to achieve project goals.
- The waterfall method is no longer the only method employed by organisations.
- Computer networks are critical and necessitate careful planning for new system creation or capacity enhancements.
- Capacity planning isn't a simple or quick process.
- Local area overview maps illustrate how workstations group with switches, routers, and server farms.
- Computer simulations are not always easy to create due to potential errors in the modelling processes.
- Benchmarking offers useful insight into network analysis.
- Benchmark testing commonly requires a significant amount of time.
- Analytical modelling is a valuable approach for determining network capacity.
- Inaccurate analytical models can lead to invalid results.
- Baseline studies are usually most effective during periods of minimal network problems.
- System time feasibility is the extent to which a system can meet organizational needs in a timely manner.
- Capacity planning determines necessary workstation memory for application support.
- Load testing evaluates a system's ability to handle projected demand.
- Regression testing does not guarantee that changes to one system haven't affected others.
- Puppet is a configuration management tool similar to Chef.
- Ansible is an open source and free automation tool.
- NetFlow is a Cisco proprietary traffic monitoring protocol.
- Agile methodologies are becoming increasingly important due to the rapid pace of technological advancements.
- The SNMP protocol manages data for network components.
- Change management involves assessment of changes, their cost, and plans to minimise disruptions.
- Connectivity maps are used to model network environments.
- Three categories of connectivity maps exist: area, metropolitan area, and local.
- External sites on wide area maps are represented by circles with the letter 'M'.
- Data rate and security are important parameters, but data rate is often less critical for metropolitan areas.
- Regression testing validates system functionality after changes without affecting other systems
- Network testers measure AC and DC voltages, resistance, and continuity.
- Network testers graphically represent network segments and connected devices
- Protocol analysers monitor the flow at given network interfaces
- A network device error is called a "flood" error.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on the rapidly evolving field of computer network design and management. This quiz covers various aspects, including connectivity maps, project management techniques, and the DevOps lifecycle. Perfect for those looking to enhance their understanding of computer networks and their complexities.