Exam 6: Understanding Internet Technologies and Security

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Modified Multiple Choice Which of the following are external network security threats?

(Multiple Choice)
4.8/5
(34)

Public peering involves exchanging Internet traffic at a public connection, such as an IXP.

(True/False)
4.9/5
(39)

Modified True/False Linux®, Novell® NetWare®, and UNIX® are all examples of network operating systems . ______________________

(True/False)
4.8/5
(36)

Each node on a network has a unique physical address called its _________________________ address.

(Short Answer)
4.8/5
(31)

Discuss the transactional risks associated with online business. Include in your answer definitions of the following terms: encryption, certification authority (CA), public key, private key, digital certificate, and public-key infrastructure.

(Essay)
4.9/5
(30)

A special kind of virus that spreads across a network, such as the Internet, by replicating itself is called a computer ____.

(Multiple Choice)
4.9/5
(31)

A hacker can create a rogue WLAN by installing a wireless router that uses network resources and exposes the network to security threats.

(True/False)
4.9/5
(35)

At the top of the DNS server hierarchy are the ____ servers that publish a directory of the next level of DNS servers.

(Multiple Choice)
4.8/5
(38)

Critical Thinking Questions Case 6-2 You are the secretary to the president of a small company that makes custom furniture. The president wants to set up a website and asks you to research the domain name registration process. Which of the following websites can you use to handle the registration of your domain name?

(Multiple Choice)
4.8/5
(40)

Virus protection ____ and apps require continual updates with information on recently discovered viruses.

(Multiple Choice)
4.8/5
(39)

A peer-to-peer LAN consists of a small number of computers and devices (generally 10 or fewer) linked together.

(True/False)
4.8/5
(33)

A network's _________________________ method specifies how data travels from node to node across the network.

(Short Answer)
4.8/5
(41)

A network supporting users in a small geographical area, such as a home, an office, a single building, or several buildings, is called a ____.

(Multiple Choice)
5.0/5
(42)

Google Drive and Microsoft One Drive are examples of ____ services.

(Multiple Choice)
4.8/5
(40)

A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.

(Multiple Choice)
4.9/5
(33)

Bluetooth is an example of a short-range _________________________ technology that sends and receives wireless transmissions between devices, such as computers, smartphones, tablets, and headsets.

(Short Answer)
4.8/5
(46)

____ network is another name for a network running TCP/IP.

(Multiple Choice)
4.8/5
(38)

   As shown in the accompanying figure, a(n) _________________________ transmission uses radio waves to connect devices that are touching or nearby (generally within 10 centimeters). As shown in the accompanying figure, a(n) _________________________ transmission uses radio waves to connect devices that are touching or nearby (generally within 10 centimeters).

(Short Answer)
4.8/5
(40)

____ business services typically include a PBX (private branch exchange) switching service that manages incoming and outgoing calls and calls between extensions.

(Multiple Choice)
5.0/5
(38)

A proxy server compares information contained in an IP packet header, such as a packet's source and destination IP addresses, with a set of predetermined filtering rules.

(True/False)
4.9/5
(46)
Showing 61 - 80 of 103
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)