Basic CS-Networks [3i Infotech Placement]: Sample Questions 31 - 33 of 90
Glide to success with Doorsteptutor material for competitive exams : get questions, notes, tests, video lectures and more- for all subjects of your exam.
Question 32
Explanation
- Telnet also called terminal emulation- belongs to application layer.
- Ability to make one computer terminal appear like some other terminal
- Allows users to log on and get direct access to legacy programs in a mainframe operating system.
- Emulation programs run like any other workstation application as a separate program task.
- It comes in the application layer.
- Requires installing a special program a telnet program- runs like workstation application as a separate program task providing its own window to the user.
- Window might presents some particular mainframe operating system or application interface that is text-only.
Question 33
Explanation
Challenges in managing a network
- Visibility:
- Required for:
- Plan capacity upgrades
- Troubleshoot app performance
- Fact check efficacy of security investments
- Deploy early warning system for suspicious traffic- data breaches or compliance violations.
- Visibility needs to translate into simple reports and detailed flow-level records of network events.
- Required for:
- Getting context of application (for example for QoS)
- Identifying applications based on ports and protocols.
- Greater context based on nature of the application traffic.
- Personalized experience:
- For example, for education align network with specific users՚ needs, such as students versus faculty.
- Includes:
- Allocating bandwidth
- Aligning available bandwidth to meet application specific service level agreements for satisfaction, performance and productivity.
- Conserve bandwidth:
- All network issues cannot be solved by adding more bandwidth.
- Take into account cost of bandwidth:
- Some regions have bandwidth nearly free or heavily subsidized by government programs.
- Other regions have very expensive bandwidth
- Imperative to calculate cost of bandwidth
- Security posture:
- Intelligently monitor network traffic mix.
- Balance between visibility and control help educational institutions with encrypted traffic.
- Knowledge of risk points can not only protect the users but also de-risk the institution, its brand, and assets.