Network Security FAQ: Secure Design

Network Security FAQ: Secure Design

Q1. ROI is calculated by dividing the ___ by the total ___.

Answer: ROI is calculated by dividing the profit (return) by the total investment cost.

Q2. What are the four general categories of constraints encountered by a network designer?

Answer: Technological, political, social, and economical constraints affect network design.

Q3. What are the technological constraints when designing a network infrastructure?

Answer: Processor speed, buffer capacity, device port density, interface bandwidth, and backplane capacity are examples of technological constraints.

Q4. The optimization phase of the PDIOO process can result in a complete redesign of the network. True or False?

Answer: True.

Q5. What are the political constraints when designing a network infrastructure?

Answer: Compulsory use of standards, a single-vendor prearranged partnership agreement, and network ownership are examples of political constraints.

Q6. Define some of the activities supported by the tools used in today’s network-design process.

Answer: In today’s network-design process, tools support network audits, traffic analysis, traffic generation, and network simulation. Network audit tools help you generate specific reports on certain parts of your network and analyze how these segments of the network are performing. Traffic analyzers collect and analyze data, which allows the network designer to balance the network load, troubleshoot and resolve network problems, optimize network performance, and plan future network growth. Network simulation has at least two distinct realizations. The first models how the network uses software and hardware to emulate the traffic sources and sinks, network devices, and the links that connect them.

Q7. What does the acronym PDIOO stand for?
a. Purpose, design, install, operation, optimization
b. Plan, design, install, operation, optimization
c. Plan, design, implement, operate, optimize
d. Purpose, design, implement, operate, optimize
e. Plan, designate, install, operate, optimization

Answer: c. Plan, design, implement, operate, and optimize. PDIOO represents the different stages of the network life cycle.

Q8. List the processes that are part of physical security.

Answer: Physical security includes internal and external security measures, disaster-recovery plans, and personnel training.

Q9. Hubs share all available bandwidth among all connected devices. True or False?

Answer: True.

Q10. Switches share all available bandwidth among all connected devices. True or False?

Answer: False. Hubs share all the available bandwidth among all the connected devices, meaning that they distribute all the data received on one port to all the network devices to which they are connected on other ports. This is a highly inefficient use of your network bandwidth; switches have full bandwidth available per port or connected device.

About the author

Scott

Leave a Comment