computer networks
14. The is the part of the backbone that connects the LANs together. A. Routed layer B. Distribution layer C. Core layer D. Structured layer E. Switched layer 15. Which of the following statements about the core layer is FALSE? A. It is merged with the distribution layer in the two-tier network design model B. It can use a router C. It can use a layer-2 switch D. It can use a layer-3 switch E. None of above is false 16. Which of the following statements about Layer-3 switches is FALSE? A. They forward messages based on IP address B. They can be used in place of routers C. They are faster than routers D. They can find a best route when forwarding packets on BBNs E. None of above is false 17. Which of the following would NOT be part of an "ideal" network using a structured design? A. Access layers using 100/1000BaseT layer-2 switches B. A distribution layer using redundant 1000B aseT layer-3 switches C. A distribution layer using a single 1000 BaseT layer-2 switch D. A core layer using layer- 3 switches E. All of the above can be part of an "ideal" network using a structured design 18. Which of the following is NOT a type of threat to network security? A. Disruption B. Destruction C. Controlled chaos D. Intrusion E. Disaster 19. Which of the following statements about network security is (are) true? A. A threat scenario describes how an IT asset can be compromised by a specific threat. B. Encryption is a security control that protects against unauthorized access C. Backing up servers is a security control that protects against the risks of intrusion D. a and b E. a,b and c 20. Which of the following statements about MAN and WAN topology is (are) true? A. A simple point-to-point topology is used to link 2 remote networks B. A ring, star or mesh topology is used to link together 3 or more remote networks C. For a given WAN, a mesh topology typically contains more circuits than a star or a ring topology D. All of the above E. None of the above