What is the principal American organization working on the future of the Internet?
> What is a Certificate Authority (CA)?
> What is PKI, and why is it important?
> Explain how pulse code modulation (PCM) works.
> Explain how authentication works.
> Compare and contrast DES and public key encryption.
> How does DES differ from 3DES? From AES?
> What is key management?
> Describe how asymmetric encryption and decryption work.
> Describe how symmetric encryption and decryption work.
> Name and describe the main impact areas. Who should be responsible for assessing what is meant by low/medium/high impact for each of the impact areas? Explain your answer.
> Compare and contrast symmetric and asymmetric encryption.
> Explain how a Trojan horse works.
> What is a security hole, and how do you fix it?
> What data compression standard uses Lempel–Ziv encoding? Describe how it works.
> What is a NAT firewall, and how does it work?
> What is IP spoofing?
> How do the different types of firewalls work?
> What is a firewall?
> What is a sniffer?
> What is eavesdropping in a computer security sense?
> What is physical security, and why is it important?
> Briefly outline the steps required to complete a risk assessment.
> How do you secure the network perimeter?
> What are major aspects of intrusion prevention?
> Some experts argue that thin-client client–server architectures are really host-based architectures in disguise and suffer from the same old problems. Do you agree? Explain.
> There are many components in a typical security policy. Describe three important components.
> People who attempt intrusion can be classified into several different categories. Describe them.
> What is online backup?
> What is a disaster recovery firm? When and why would you establish a contract with them?
> How does a denial-of-service attack differ from a distributed denial-of-service attack?
> Explain how a denial-of-service attack works.
> What is a computer virus? What is ransomware?
> What is the purpose of a disaster recovery plan? What are five major elements of a typical disaster recovery plan?
> What factors have brought increased emphasis on network security?
> How does a DSL modem differ from a DSLAM?
> Which of the common application architectures for email (two-tier client–server, Web-based) is “best”? Explain.
> Explain how DSL works.
> Compare and contrast cable modem and DSL.
> What type of circuits are commonly used to build the Internet today? What type of circuits are commonly used to build Internet 2?
> Explain one reason why you might experience long response times in getting a Web page from a server in your own city.
> What is a POP?
> What is an IXP?
> Many experts predicted that small, local ISPs would disappear as regional and national ISPs began offering local access. This hasn’t happened. Why?
> Would you be interested in subscribing to 100 Mbps FTTH for a monthly price of $100? Why or why not?
> Today, there is no clear winner in the competition for Broad-band Internet access. What technology or technologies do you think will dominate in 2 years’ time? Why?
> What is a giga-pop?
> Compare and contrast the application architecture for video conferencing and the architecture for email.
> What is Internet2®?
> Explain how the Internet is a network of networks.
> How is the IETF related to the IRTF?
> What are the principal organizations responsible for Internet governance, and what do they do?
> Explain how WiMax works.
> What are some future technologies that might change how we access the Internet?
> Explain how FTTH works.
> Which is better, cable modem or DSL? Explain.
> What is an OE converter? A CMTS?
> Explain how Instant Messaging (IM) works.
> Explain how a cable modem works.
> Explain how ADSL works.
> What is the basic structure of the Internet?
> Describe SONET. How does it differ from SDH?
> Distinguish among T1, T2, T3, and T4 circuits.
> What are the most commonly used T carrier services? What data rates do they provide?
> Compare and contrast ring architecture, star architecture, and mesh architecture.
> Is a WAN that uses dedicated circuits easier or harder to design than one that uses packet-switched circuits? Explain.
> Compare and contrast dedicated-circuit services and packet-switched services.
> How do Ethernet services work in the WAN?
> What is cloud computing?
> It is said that frame relay services and dedicated-circuit services are somewhat similar from the perspective of the network designer. Why?
> Suppose you joined a company that had a WAN composed of SONET, T carrier, and frame relay services, each selected to match a specific network need for a certain set of circuits. Would you say this was a well-designed network? Explain.
> Are there any WAN technologies that you would avoid if you were building a network today? Explain.
> Are Ethernet services a major change in the future of networking or a technology blip?
> Who regulates common carriers and how is it done?
> Describe five important factors in selecting WAN services.
> How can you improve WAN performance?
> Compare the three types of VPN.
> Explain how VPN services work.
> How do VPN services differ from common carrier services?
> What is Telnet, and why is it useful?
> Describe the four basic functions of an application software package.
> Explain the differences between CIR and MAR.
> Which is likely to be the longer-term winner: IP or Ethernet services?
> Compare and contrast frame relay and Ethernet services.
> Where does packetizing take place?
> How do packet-switching services differ from other WAN services?
> What are common carriers, local exchange carriers, and interexchange carriers?
> Explain how switched backbones work.
> In Figure 8-5, would the network still work if we removed the routers in each building and just had one core router? What would be the advantages and disadvantages of doing this? Figure 8-5: Routed backbone architecture
> Explain how routed backbones work.
> Under what circumstances would you use a VLAN backbone?
> What is a virtual server?
> Under what circumstances would you use a routed backbone?
> Under what circumstances would you use a switched backbone?
> How does a router differ from a VLAN?
> Some experts are predicting that Ethernet will move into the WAN. What do you think?
> How does a layer 2 switch differ from a VLAN?
> What are the preferred architectures used in each part of the backbone?
> Why are broadcast messages important?
> How can you improve the performance of a BN?
> What are the advantages and disadvantages of VLANs?