Filters
Question type

Study Flashcards

FTP


A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.

Correct Answer

verifed

verified

The bus topology connects the nodes in parallel.

Correct Answer

verifed

verified

Which of the following statements is correct? TCP/IP


A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.

Correct Answer

verifed

verified

HTML


A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet.
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.

Correct Answer

verifed

verified

Contrast a LAN and a WAN.Typically,who owns and maintains a WAN?

Correct Answer

verifed

verified

A LAN is a local area network covering a...

View Answer

A distributed denial of service (DDoS) attack


A) is more intensive that a Dos attack because it emanates from single source
B) may take the form of either a SYN flood or smurf attack
C) is so named because it effects many victims simultaneously, which are distributed across the internet
D) turns the target victim's computers into zombies that are unable to access the Internet
E) none of the above is correct

Correct Answer

verifed

verified

Which of the following is considered an unintentional threat to the integrity of the operating system?


A) a hacker gaining access to the system because of a security flaw
B) a hardware flaw that causes the system to crash
C) a virus that formats the hard drive
D) the systems programmer accessing individual user files

Correct Answer

verifed

verified

IP spoofing


A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.

Correct Answer

verifed

verified

To preserve audit trails in a computerized environment,transaction logs are permanent records of transactions.

Correct Answer

verifed

verified

Which of the following statements is correct? The client-server model


A) is best suited to the token-ring topology because the random-access method used by this model detects data collisions.
B) distributes both data and processing tasks to the server's node.
C) is most effective used with a bus topology.
D) is more efficient than the bus or ring topologies.

Correct Answer

verifed

verified

A software program that allows access to a system without going through the normal logon procedures is called a


A) logic bomb
B) Trojan horse
C) worm
D) back door

Correct Answer

verifed

verified

The most frequent victims of program viruses are microcomputers.

Correct Answer

verifed

verified

A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.

Correct Answer

verifed

verified

All of the following are designed to control exposures from subversive threats except


A) firewalls
B) one-time passwords
C) field interrogation
D) data encryption

Correct Answer

verifed

verified

Transmitting numerous SYN packets to a targeted receiver,but NOT responding to an ACK,is


A) a smurf attack.
B) IP Spoofing.
C) an ACK echo attack
D) a ping attack.
E) none of the above

Correct Answer

verifed

verified

In a ring topology


A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other

Correct Answer

verifed

verified

Which of the following is true?


A) Deep Packet Inspection uses a variety of analytical and statistical techniques to evaluate the contents of message packets.
B) An Intrusion prevention system works in parallel with a firewall at the perimeter of the network to act as a filer that removes malicious packets from the flow before they can affect servers and networks.
C) A distributed denial of service attack is so named because it is capable of attacking many victims simultaneously who are distributed across the internet.
D) None of the above are true statements.

Correct Answer

verifed

verified

A digital signature is


A) the encrypted mathematical value of the message sender's name
B) derived from the digest of a document that has been encrypted with the sender's private key
C) the computed digest of the sender's digital certificate
D) allows digital messages to be sent over analog telephone lines

Correct Answer

verifed

verified

All of the following techniques are used to validate electronic data interchange transactions except


A) value added networks can compare passwords to a valid customer file before message transmission
B) prior to converting the message, the translation software of the receiving company can compare the password against a validation file in the firm's database
C) the recipient's application software can validate the password prior to processing
D) the recipient's application software can validate the password after the transaction has been processed

Correct Answer

verifed

verified

Describe a denial of service (DoS)attack and identify three common forms.

Correct Answer

verifed

verified

A denial of service attacks (DoS)is an a...

View Answer

Showing 101 - 120 of 143

Related Exams

Show Answer