Exam 6: Understanding Internet Technologies and Security
Exam 1: Into the Internet103 Questions
Exam 2: Browsing the Web103 Questions
Exam 3: Searching the Web103 Questions
Exam 4: Communicating Online103 Questions
Exam 5: Getting More Out of the Internet103 Questions
Exam 6: Understanding Internet Technologies and Security103 Questions
Exam 7: Understanding E Business103 Questions
Select questions type
Modified Multiple Choice
Which of the following are external network security threats?
(Multiple Choice)
4.8/5
(34)
Public peering involves exchanging Internet traffic at a public connection, such as an IXP.
(True/False)
4.9/5
(39)
Modified True/False
Linux®, Novell® NetWare®, and UNIX® are all examples of network operating systems .
______________________
(True/False)
4.8/5
(36)
Each node on a network has a unique physical address called its _________________________ address.
(Short Answer)
4.8/5
(31)
Discuss the transactional risks associated with online business. Include in your answer definitions of the following terms: encryption, certification authority (CA), public key, private key, digital certificate, and public-key infrastructure.
(Essay)
4.9/5
(30)
A special kind of virus that spreads across a network, such as the Internet, by replicating itself is called a computer ____.
(Multiple Choice)
4.9/5
(31)
A hacker can create a rogue WLAN by installing a wireless router that uses network resources and exposes the network to security threats.
(True/False)
4.9/5
(35)
At the top of the DNS server hierarchy are the ____ servers that publish a directory of the next level of DNS servers.
(Multiple Choice)
4.8/5
(38)
Critical Thinking Questions Case 6-2
You are the secretary to the president of a small company that makes custom furniture. The president wants to set up a website and asks you to research the domain name registration process.
Which of the following websites can you use to handle the registration of your domain name?
(Multiple Choice)
4.8/5
(40)
Virus protection ____ and apps require continual updates with information on recently discovered viruses.
(Multiple Choice)
4.8/5
(39)
A peer-to-peer LAN consists of a small number of computers and devices (generally 10 or fewer) linked together.
(True/False)
4.8/5
(33)
A network's _________________________ method specifies how data travels from node to node across the network.
(Short Answer)
4.8/5
(41)
A network supporting users in a small geographical area, such as a home, an office, a single building, or several buildings, is called a ____.
(Multiple Choice)
5.0/5
(42)
Google Drive and Microsoft One Drive are examples of ____ services.
(Multiple Choice)
4.8/5
(40)
A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.
(Multiple Choice)
4.9/5
(33)
Bluetooth is an example of a short-range _________________________ technology that sends and receives wireless transmissions between devices, such as computers, smartphones, tablets, and headsets.
(Short Answer)
4.8/5
(46)
As shown in the accompanying figure, a(n) _________________________ transmission uses radio waves to connect devices that are touching or nearby (generally within 10 centimeters).

(Short Answer)
4.8/5
(40)
____ business services typically include a PBX (private branch exchange) switching service that manages incoming and outgoing calls and calls between extensions.
(Multiple Choice)
5.0/5
(38)
A proxy server compares information contained in an IP packet header, such as a packet's source and destination IP addresses, with a set of predetermined filtering rules.
(True/False)
4.9/5
(46)
Showing 61 - 80 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)