Services
Discover
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Discovering the Internet Complete
Exam 6: Understanding Internet Technologies and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 1
True/False
A private key infrastructure is the combination of organizations or individuals sending and receiving encrypted data, their public and private keys, and the certification authorities that issue the keys and digital certificates.
Question 2
Multiple Choice
____ involves real-time transmission of video and audio between two locations.
Question 3
Multiple Choice
A(n) ____ server is a computer or software application that hides an internal IP address from the outside world by substituting its own IP address for a source computer's IP address before sending outgoing email or webpage requests.
Question 4
Multiple Choice
A(n) ____ is a specialized computer that can connect LAN segments, two LANs, or multiple LANs on a WAN - all transmitting at different speeds and using different protocols.
Question 5
Multiple Choice
Modified Multiple Choice Which of the following are components of the TCP/IP stack set of standard Internet protocols on which communications across the Internet and many private IP networks rely?
Question 6
True/False
Cloud computing involves using devices to measure biological data to identify a user. ________________________
Question 7
Short Answer
The Shared Registration System (SRS) is managed by _________________________.
Question 8
True/False
War driving a website occurs when hackers redirect a URL to an alternate website.
Question 9
Multiple Choice
A client/server LAN, as shown in the accompanying figure, uses a network ____ to manage data storage, printer access, communications, Internet connections, security, and network administration.
Question 10
True/False
External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures. _______________________