(Multiple Choice) 1. Which of the following statements is correct? a. TCP/IP is the basic protocol that...
Question:
1. Which of the following statements is correct?
a. TCP/IP is the basic protocol that permits communication between Internet sites.
b. TCP/IP controls Web browsers that access the Web.
c. TCP/IP is the document format used to produce Web pages.
d. TCP/IP is used to transfer text files, programs, spreadsheets, and databases across the Internet.
e. TCP/IP is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.
2. Which of the following best describes a system that connects the internal users of an organization distributed over a wide geographic area?
a. LAN
b. Internet
c. decentralized network
d. multi-drop network
e. intranet
3. Sniffer software is
a. used by malicious Web sites to sniff data from cookies stored on the user’s hard drive.
b. used by network administrators to analyze net work traffic.
c. used by bus topology intranets to sniff for carriers before transmitting a message to avoid data collisions.
d. an illegal program downloaded from the Web to sniff passwords from the encrypted data of Internet customers.
e. illegal software for decoding encrypted messages transmitted over a shared intranet channel.
4. Which of the following statements is true?
a. Cookies were originally intended to facilitate advertising on the Web.
b. Cookies always contain encrypted data.
c. Cookies are text files and never contain encrypted data.
d. Cookies contain the URLs of sites the user visits.
e. Web browsers cannot function without cookies.
5. A message that is contrived to appear to be coming from a trusted or authorized source is called
a denial of service attack.
b. digital signature forging.
c. Internet protocol spoofing.
d. URL masquerading.
e. a SYN-ACK packet.
6. A DDos attack
a. is more intensive than a Dos attack because it emanates from single source.
b. may take the form of either a SIN flood or smurf attack.
c. is so named because it affects many victims simultaneously, which are distributed across the Internet.
d. turns the target victim’s computers into zombies that are unable to access the Internet.
e. none of the above is correct.
7. A ping signal is used to initiate
a. URL masquerading.
b. digital signature forging.
c. Internet protocol spoofing.
d. a smurf attack
e. a SYN-ACK packet.
8. A digital signature
a. is the encrypted mathematical value of the message sender’s name.
b. is derived from the digest of a document that has been encrypted with the sender’s private key.
c. is derived from the digest of a document that has been encrypted with the sender’s public key.
d. is the computed digest of the sender’s digital certificate.
e. allows digital messages to be sent over an analog telephone line.
9. Which of the following statements about the client-server model is correct?
a. It is best suited to the token ring topology because the random-access method this topology uses detects data collisions.
b. It distributes both data and processing tasks to the server node. The client-server model can use the bus or ring topology.
c. It is most effective when used as a bus topology because its deterministic access method avoids collisions and prevents data loss during transmissions.
d. It is more efficient than the bus or ring topologies because it transmits an entire file of records to the requesting node rather than only a single record.
e. It is not used in conjunction with either the bus or ring topologies.
10. Which of the following statements is correct?
a. A bridge is used to connect a LAN and a WAN.
b. Packet switching combines the messages of multiple users into a packet for transmission. At the receiving end, the packet is disassembled into individual messages and distributed to the user.
c. The decision to partition a database assumes that no identifiable primary user exists in the organization.
d. Message switching is used to establish temporary connections between network devices for the duration of a communications session.
e. A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data the other nodes need.
Fantastic news! We've Found the answer you've been seeking!
Step by Step Answer:
Related Book For
Question Posted: