Exam 6: Understanding Internet Technologies and Security
Exam 1: Into the Internet103 Questions
Exam 2: Browsing the Web103 Questions
Exam 3: Searching the Web103 Questions
Exam 4: Communicating Online103 Questions
Exam 5: Getting More Out of the Internet103 Questions
Exam 6: Understanding Internet Technologies and Security103 Questions
Exam 7: Understanding E Business103 Questions
Select questions type
A virtual conversation is a virtual meeting conducted using a browser and the web.
(True/False)
4.8/5
(39)
Network administrators and IT managers use network ____ to expose network vulnerabilities.
(Multiple Choice)
5.0/5
(37)
Modified Multiple Choice
Which of the following are examples of services used in holding virtual conversations?
(Multiple Choice)
4.8/5
(32)
A hardware device or software connecting two or more networks or network segments that use different packet formatting, different communication protocols, and different access methods is called a ____.
(Multiple Choice)
4.9/5
(37)
A(n) ____ cannot determine how to direct a packet; it simply sends the same signal to all of its connected nodes or segments.
(Multiple Choice)
4.9/5
(38)
Each computer or other device on a LAN is called a(n) _________________________.
(Short Answer)
4.8/5
(27)
With a(n) _________________________ topology, a transmission moves from node to node around a circle in a clockwise direction.
(Short Answer)
4.8/5
(30)
An organization may outgrow a(n) _________________________ LAN quickly, as more computers and devices need to be added or file- and device-sharing becomes more complex.
(Short Answer)
4.8/5
(37)
Identify the letter of the choice that best matches the phrase or concept.
Correct Answer:
Premises:
Responses:
(Matching)
5.0/5
(45)
At the top of the DNS hierarchy are the DNS authoritative servers that publish a directory of the root zone file.
(True/False)
4.8/5
(39)
LAN jacking is a process that encapsulates one protocol inside another protocol.
(True/False)
4.9/5
(36)
The process of resolving a domain name to an IP address begins with a(n) ____ server.
(Multiple Choice)
4.7/5
(37)
A smart card, a plastic card the size of a credit card, contains memory chips that can store special access codes or biometric information.
(True/False)
4.8/5
(27)
A(n) _________________________ is a specific type of IXP that provides a high-speed Ethernet connection within a metropolitan area.
(Short Answer)
4.8/5
(45)
_________________________ routing allows a router to determine the best route between two nodes automatically and then stores this information in a routing table.
(Short Answer)
4.8/5
(36)
A network ____ is a combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.
(Multiple Choice)
4.9/5
(41)
Businesses should test data storage procedures periodically to ensure that backed up data is correct and complete, and that the storage media or cloud-based storage service works properly.
(True/False)
4.9/5
(45)
The _________________________ topology connects all nodes on a peer-to-peer LAN to a single connection shared by all nodes and allows only one transmission at a time.
(Short Answer)
4.8/5
(35)
Showing 21 - 40 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)