Config Router

  • Google Sheets
  • CCNA Online training
    • CCNA
  • CISCO Lab Guides
    • CCNA Security Lab Manual With Solutions
    • CCNP Route Lab Manual with Solutions
    • CCNP Switch Lab Manual with Solutions
  • Juniper
  • Linux
  • DevOps Tutorials
  • Python Array
You are here: Home / Cisco / Network Security FAQ: Secure Design

Network Security FAQ: Secure Design

March 26, 2020 by Scott

Network Security FAQ: Secure Design

Q1. ROI is calculated by dividing the ___ by the total ___.

Answer: ROI is calculated by dividing the profit (return) by the total investment cost.

Q2. What are the four general categories of constraints encountered by a network designer?

Answer: Technological, political, social, and economical constraints affect network design.

Q3. What are the technological constraints when designing a network infrastructure?

Answer: Processor speed, buffer capacity, device port density, interface bandwidth, and backplane capacity are examples of technological constraints.

Q4. The optimization phase of the PDIOO process can result in a complete redesign of the network. True or False?

Answer: True.

Q5. What are the political constraints when designing a network infrastructure?

Answer: Compulsory use of standards, a single-vendor prearranged partnership agreement, and network ownership are examples of political constraints.

Q6. Define some of the activities supported by the tools used in today’s network-design process.

Answer: In today’s network-design process, tools support network audits, traffic analysis, traffic generation, and network simulation. Network audit tools help you generate specific reports on certain parts of your network and analyze how these segments of the network are performing. Traffic analyzers collect and analyze data, which allows the network designer to balance the network load, troubleshoot and resolve network problems, optimize network performance, and plan future network growth. Network simulation has at least two distinct realizations. The first models how the network uses software and hardware to emulate the traffic sources and sinks, network devices, and the links that connect them.

Q7. What does the acronym PDIOO stand for?
a. Purpose, design, install, operation, optimization
b. Plan, design, install, operation, optimization
c. Plan, design, implement, operate, optimize
d. Purpose, design, implement, operate, optimize
e. Plan, designate, install, operate, optimization

Answer: c. Plan, design, implement, operate, and optimize. PDIOO represents the different stages of the network life cycle.

Q8. List the processes that are part of physical security.

Answer: Physical security includes internal and external security measures, disaster-recovery plans, and personnel training.

Q9. Hubs share all available bandwidth among all connected devices. True or False?

Answer: True.

Q10. Switches share all available bandwidth among all connected devices. True or False?

Answer: False. Hubs share all the available bandwidth among all the connected devices, meaning that they distribute all the data received on one port to all the network devices to which they are connected on other ports. This is a highly inefficient use of your network bandwidth; switches have full bandwidth available per port or connected device.

Related

Filed Under: Cisco Tagged With: Network Security, Secure Design

Recent Posts

  • How do I give user access to Jenkins?
  • What is docker volume command?
  • What is the date format in Unix?
  • What is the difference between ARG and ENV Docker?
  • What is rsync command Linux?
  • How to Add Music to Snapchat 2021 Android? | How to Search, Add, Share Songs on Snapchat Story?
  • How to Enable Snapchat Notifications for Android & iPhone? | Steps to Turn on Snapchat Bitmoji Notification
  • Easy Methods to Fix Snapchat Camera Not Working Black Screen Issue | Reasons & Troubleshooting Tips to Solve Snapchat Camera Problems
  • Detailed Procedure for How to Update Snapchat on iOS 14 for Free
  • What is Snapchat Spotlight Feature? How to Make a Spotlight on Snapchat?
  • Snapchat Hack Tutorial 2021: Can I hack a Snapchat Account without them knowing?

Copyright © 2025 · News Pro Theme on Genesis Framework · WordPress · Log in