Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

1. How does the Internet of Things (IoT) present a potential security risk for the Internet? a. If IoT-based smart devices are not secured by

image text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribedimage text in transcribed

1. How does the Internet of Things (IoT) present a potential security risk for the Internet? a. If IoT-based smart devices are not secured by their owners, they might be used by hackers to conduct Distributed Denial of Service attacks. b. Because the use of IoT devices does not require any user authentication beforehand, it relies almost completely on a trust-based system. c. The IoT could make it impossible for phone carriers to develop true 5G networks, without such networks, the Internet's authentication systems will not function properly. d. The IoT will make it easier for devices that do not use standard Internet protocols to connect to networks. 2. Which of the following statements best describes the Payment Card Industry-Data Security Standard (PCI-DSS)? a PCI-DSS comes with security guarantees that ensure that card-related fraud becomes impossible for a hacker to commit. b. Because PCI-DSS only applies to CNP (Cardholder Not Present) transactions, its impact is limited; however, it plays an important role in protecting cards overall. c. A set of laws mandated by the U.S. government, PCI-DSS holds banks accountable in the event of fraud committed against any cardholder. d. Any U.S.-based merchant who accepts debit or credit cards must adhere to the PCI-DSS standards for security. 3. When the contents of a web page are stored as objects in a database, rather than hard-coded in HTML, site content can be updated in real-time (for instance, if a customer buys an item, the inventory count can be reduced by one). This is known as: a. Online cataloging. b. Dynamic page generation. c. Vertical scaling d Mobile-first e-commerce. 4. Suppose you called the help desk number for the publisher of our textbook. Hoping to obtain access to the test bank questions, you say over the phone, "Hello, my name is Greg Page, and I'm an instructor at BU. I seem to have forgot my password, can you please reset it to "Welcomel" so I can get into my instructor account? This would be an example of: a. pharming b. social engineering c. intrusion detection d. spyware application 5. Which of the following statements most likely describes the value proposition of a company offering a merchant server software package? (hint: Shopify is an example of a merchant server software package) a. Since you are already selling online, adding a package such as ours will enable you to also sell goods in the offline world." b. We will provide you access to a world-class network of warehouses, through which you can move merchandise across the continent very quickly." c. Your site won't run properly without strong acceptance testing. We can handle the acceptance testing that will ensure you're ready to face the market." d. We'll allow you to focus on your actual business, not the nitty-gritty technical details involved in e-commerce. If you don't know about HTML, hosting a site, or accepting credit card payments online, don't worry -- we'll handle all of that for you in exchange for a monthly fee." 6. A site developer decides to show a blue Buy it Now button on a website for the next 100 customers who visit. Then, for the next 100 customers, they'll show a green "Buy it Now button, and will continue to rotate back and forth between the two in order to see which button drives more sales. This is an example of a. Latency routing b. Showroom merchandising c. Omni-channel marketing d A/B Testing 7. A researcher goes to a lecture to hear a famous Professor speak about astronomy. The researcher takes notes on his laptop using Google Docs. By using Google Docs, the researcher can upload his notes instantaneously to the cloud, and then access them later from any Internet-connected device. Google Docs is an example of a. Infrastructure-as-a-Service (IaaS) b. Software-as-a-Service (SaaS) C. Platform-as-a-Service (PaaS) d. Global Reach 8. Rank the following network types in proper range order, from smallest to largest: a. Bluetooth, NFC, 4G, Wi-Fi b. NFC, Bluetooth, Wi-Fi, 4G c. NFC, Wi-Fi, Bluetooth, 4G d. Bluetooth, NFC, Wi-Fi, 4G 9. Why might someone who wants to become a hacker purchase an exploit kit? a. With an exploit kit, someone who is not skilled at hacking on his/her own can gain the ability to easily carry out malware attacks. b. An exploit kit would enable a hacker to carry out a Distributed Denial of Service attack; without such a kit, he or she would be limited to just a regular Denial of Service attack. c. Possession of an exploit kit would enable the hacker to establish true credibility with peers in the hacking community. d. An exploit kit would give the hacker access to a content management system. 10. Which of the following is NOT an advantage held by fast followers in a market? a. They can often save on Research & Development Costs that are incurred by first-movers. b. They typically have a lower Cost of Customer Acquisition, because the first mover has already made consumers familiar with the product or concept. C. Based on feedback from the consumer market, they can make improvements to early versions of a product or service. d. Their early position in the market means that they enjoy stronger brand recognition than any of their competitors. 11. Priceline serves an important function -- it connects sellers of items that often have low marginal cost, but cannot be advertised at the lowest possible price that the sellers would accept, with buyers who might not be willing to pay the advertised prices, but are still interested in the items. In exchange for doing this, it takes a fee from each transaction. Priceline is a: a. Advertising-revenue receiver. b. Market creator c. Domain Name Server. d. Virtual merchant 12. Why might it be difficult for a brand-new company to obtain a bank loan? a. By law, banks cannot loan money to businesses that are fewer than 90 days old. b. Bank loan officers will primarily be interested in the quality of the idea behind the business when deciding whether to lend money. c. Most banks will want to see existing revenue before making a loan; a brand-new business is not likely to have any revenue yet. d. Founders of new companies cannot pledge personal assets as collateral to guarantee a loan for the business. 13. Why might a company opt to use a private cloud, rather than a public one? a. The company may be looking for cost savings, a private cloud is generally quite cheaper than a public one. b. The company may have some sensitive, proprietary data that it wishes to closely control. c. In order to scale quickly, a company is more likely to use a private cloud option; this company may be attempting to quickly grow and maintain its market share. d. Most likely, the company is using legacy networking equipment, so it can save on short term capital expenditures by avoiding the purchase of the new equipment that a public cloud would require. 14. Which of the following is an advantage of using packet-switched communication, rather than circuit-switched communication? a. Packet-switching is more efficient, with circuit-switching, a dedicated connection must be maintained between two parties, even when no data is being transmitted. b. With packet-switched communication, both parties can be reasonable secure that their data is not being captured, copied, or otherwise interfered with by any third parties along the path between sender and receiver. c. Using a packet-switched system, a company can be assured that the connection to its own facility will never become disconnected. d. With packet-switching in place, a sender will always know the exact time at which a particular message was received by its intended recipient. 15. Which of the following is an example of two-factor authentication (2FA)? a. A system that requires a user to enter a username and a password in order to log in. b. A system that requires a form of biometric data from a user in order to log in. C. A system that requires a user to enter a username, password, and a randomly-generated code, sent to the user's phone, in order to log in. d. A system that uses a secured version of File Transfer Protocol (FTP) in order for a user to log in 16. Two friends recently started an e-commerce company that sells Victorian jewelry. The first friend wants to target the keywords "Victorian jewelry whereas the other wants to target the keyword jewelry. Assume that the first friend is right. What is good about her approach? a. Using such a broad keyword as "jewelryso soon after starting out is an indicator to Google that the site may be engaging in fraudulent activity. b. While fewer people will search for "Victorian jewelry than jewelry," it will far less expensive to bid for "Victorian jewelry." It will also be much easier to stand out among sites offering "Victorian jewelry than among sites offering jewelry in general. Counterintuitive though it may sound, there are actually far more Google searches for Victorian jewelry than for "jewelry." d. A longer keyword or keywords is better than a shorter one, all else equal. 17. Apache is the most popular web server software in the world. It is also free. Still, why might a company decide to use Internet Information Services (IIS) instead? a. Apache is very problematic -- its performance is so spotty that its original name was A Patchy Server." b. The company may want to avoid using Apache because it feels that IIS will give it a unique advantage in the perception of its everyday users. c. By using a proprietary system, the company can expect faster, more professional troubleshooting support, along with better compatibility with certain other software products. d. The company prefers IIS to Apache because that affords them the flexibility to use Linux or any other operating system. 18. Chapter Four in our textbook states that "Hosting, co-location, and cloud services have become a commodity..." What does it mean when a product has become commoditized? a. The product has become so differentiated that sellers have decided to no longer compete. b. Consumers no longer care about the product itself, but only about the impact that the product can have on other products. c. Because the product has been banned in certain markets, there is no longer any guarantee that particular consumers will be able to easily obtain the product in their home market. d Consumers no longer perceive any meaningful differences between one seller's offering and another seller's offering. 19. Which of the following is an advantage of developing a native app? a. Because a native app can run on any existing platform or device, it offers the developer WORA capability (Write Once, Run Anywhere). b. Because native apps are designed to blend in with proprietary apps, users will not always know that they are developed by the company that released them. c. Native apps typically enable the user to operate in a way that is more closely aligned with other members of a particular social sphere. d. Because a native app operates by using the device's hardware and operating system, it can still function even if the user does not have Internet connectivity. 20. Satellite Internet is generally more expensive and less efficient than other forms of Internet connections. Which of the following is most likely to describe a typical subscriber to a satellite-based Internet service? a. A researcher who wishes to be able to instantly share his findings with a larger community of readers and fellow researchers. b. A user who does not wish to use standard networking protocols, but instead uses only proprietary ones that are known to small organizations. c. A user who wants to be sure that he can communicate in a way that is 100% secure, and free from any possibility of interference or espionage. d. A user who lives in a region in which there is no reliable alternative available. 21. Periodically, Microsoft releases updates to its operating system that fix known flaws. Such updates are known as: a. Generation releases. b. Patches. c. OS kernels. d Tier reduction updates. 22. A friend of yours is curious about the way the Internet works. You tell her that there is a way in which she can trace the path that a particular group of packets takes as it moves from one computer to another. What is this called? a. Connection check b. Ping c. IPv6 Internet address. d Traceroute 23. Which of the following is an invention that makes using the Web easier for people without a technical background? a. Signal repeaters for millimeter waves in a 5G network. b. A Request for Comments (RFC) system with archived content. c. A ping command that can be run through a Network Utility application d. A browser with a Graphical User Interface (GUI) 24. A researcher goes to a lecture to hear a famous Professor speak about astronomy. The researcher takes notes on his laptop using Google Docs. By using Google Docs, the researcher can upload his notes instantaneously to the cloud, and then access them later from any Internet-connected device. Google Docs is an example of a. Software-as-a-Service (SaaS) b. Infrastructure-as-a-Service (IaaS) c. Platform-as-a-Service (PaaS) d Global Reach 25. A site developer declares, "We should ensure that all of our images come with descriptive alt tags that can be read aloud by specialized software. That way, even blind users can easily understand what the images on our site are meant to convey." This is an example of a(n): a. Accessibility rule. b. Personalization tool. c. Hybrid app d. Physical design

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

AWS Certified Database Study Guide Specialty DBS-C01 Exam

Authors: Matheus Arrais, Rene Martinez Bravet, Leonardo Ciccone, Angie Nobre Cocharero, Erika Kurauchi, Hugo Rozestraten

1st Edition

1119778956, 978-1119778950

More Books

Students also viewed these Databases questions

Question

Identify and discuss learning style differences across cultures

Answered: 1 week ago