BTM 481 Study Guide - Quiz Guide: Https, Logic Bomb, Server-Side

33 views11 pages

For unlimited access to Study Guides, a Grade+ subscription is required.

CS Chapter 7 Study Guide
_
MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.
1)
Throughput, the actual speed of data transfer that is achieved in a network, is usually
A)
more than the data transfer rate.
B)
the same as the data transfer rate.
C)
D)
less than the data transfer rate.
1)
2)
One can thwart most hacking problems by installing a
A)
security policy.
B)
firewall.
C)
hub.
D)
network.
2)
3)
All of the following are reasons for using a power
-
line network instead of an Ethernet network
EXCEPT
A)
you are experiencing interference with a wireless Ethernet network.
B)
you don't need to run new wires with a power
-
line network.
C)
power
-
line networks cost less.
D)
power
-
line networks can be easier to install.
3)
4)
The most likely method a hacker would use to access a computer is
A)
entering through the Internet.
B)
entering through a company intranet.
C)
sitting down at a computer and installing hacking software.
D)
overhearing your password and/or log
-
on information.
4)
5)
A network that has ten or more nodes is usually configured as a
A)
peer
-
to
-
peer network.
B)
client/server network.
C)
WAN.
D)
home network.
5)
6)
Most __________ allow you to connect wireless and wired computers to the same network.
A)
servers
B)
transceivers
C)
wireless routers
D)
modems
6)
7)
Which of the following is formally defined as any criminal action perpetrated primarily through
the use of a computer?
A)
social networking
B)
hacking
C)
phishing
D)
cybercrime
7)
8)
If you frequently transfer large data files between nodes on a network, which of the following
networks would be the best choice?
A)
dial
-
up
B)
wireless
C)
Ethernet
D)
power
-
line
8)
9)
What is the best thing a company can do to prevent its electronic data from being stolen?
A)
disconnect employees' computers from the Internet
B)
install hidden cameras
C)
establish detailed security policies
D)
shut off access on computers to flash drives
9)
1
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 11 pages and 3 million more documents.

Already have an account? Log in
10)
Sophisticated networks generally use which of the following hardware devices to ease the flow of
data packets throughout the network?
A)
network interface cards (NICs)
B)
firewalls
C)
routers and switches
D)
USB ports
10)
11)
How many viruses and virus variants exist today?
A)
thousands
B)
hundreds
C)
tens
D)
millions
11)
12)
A computer network is defined as two or more computers connected with __________ so that they
can communicate with each other.
A)
software and hardware
B)
the Internet
C)
hardware
D)
software
12)
13)
In a client/server network, there are usually many more __________ than __________.
A)
servers, clients
B)
printers, computers
C)
clients, computers
D)
clients, servers
13)
14)
A(n) __________ allows sharing of a broadband Internet connection.
A)
adapter
B)
hub
C)
router
D)
phone cord
14)
15)
Network adapters
A)
are built into the motherboard on each node.
B)
enable nodes in a network to communicate with each other.
C)
are always Ethernet NICs.
D)
are necessary only on servers in a client/server network.
15)
16)
Which of the following is a program that appears to be something useful or desirable but at the
same time does something malicious in the background?
A)
a Trojan horse
B)
a virus
C)
a zombie
D)
a worm
16)
17)
Which of the following is NOT an example of a network node?
A)
an NOS
B)
a computer
C)
a modem
D)
a printer
17)
18)
Networks allow users to share
A)
flash drives.
B)
phones.
C)
peripherals.
D)
paper.
18)
19)
Due to the expansion of media files on home computers, __________ options are now being
marketed; however, they are not as full featured as their business-world counterparts.
A)
external hard drive
B)
mega flash drives
C)
home server
D)
online storage
19)
20)
Most computers today contain network adapters installed inside as expansion cards. Such adapters
are referred to as
A)
ethernet cards.
B)
network expansion cards.
C)
network adapter cards.
D)
network interface cards.
20)
2
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 11 pages and 3 million more documents.

Already have an account? Log in
21)
The purpose of Network Address Translation is to
A)
hide user IP addresses from the Internet.
B)
dynamically assign IP addresses via an ISP.
C)
convert logical ports to physical port configurations.
D)
translate IP addresses from the Internet.
21)
22)
Maximum cable run (length) for Ethernet networks using UTP cable is approximately:
A)
50 feet.
B)
1,100 feet.
C)
550 feet.
D)
328 feet.
22)
23)
Distributed denial of service (DDoS) attacks have been associated with
A)
theft of financial data at the IRS.
B)
attacks on famous blogs, eBay, and Amazon.com.
C)
identity theft.
D)
misuse of credit card information.
23)
24)
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT
A)
use your debit card information to purchase items illegally.
B)
launch a denial of service (DoS) attack on your computer.
C)
assume your identity.
D)
steal your logon and passwords for various accounts.
24)
25)
Which of the following devices translates electronic data into radio waves?
A)
a transceiver
B)
a receiver
C)
a fiber
-
optic cable
D)
a modem
25)
26)
Which transmission medium is able to transmit data the fastest?
A)
wireless
B)
twisted
-
pair cable
C)
fiber
-
optic cable
D)
coaxial cable
26)
27)
Manufacturers such as Linksys, D
-
Link, and Netgear make which of the following devices that can
double as firewalls?
A)
networks
B)
modems
C)
NICs
D)
routers
27)
28)
Rules for creating passwords include all of the following EXCEPT
A)
keep your password written down, and put it in your wallet.
B)
create a hard
-
to
-
guess password, with a combination of letters and numbers.
C)
change your password frequently.
D)
keep your password a secret.
28)
29)
Network architectures are classified according to
A)
the bandwidth supplied by the connection.
B)
the speed at which the processor runs.
C)
the way they are controlled and the distance between their nodes.
D)
the distance between the hub and the router.
29)
30)
__________ makes broadband users more vulnerable to attacks..
A)
IP addressing
B)
Dynamic addressing
C)
Greater bandwidth
D)
Static addressing
30)
3
Unlock document

This preview shows pages 1-3 of the document.
Unlock all 11 pages and 3 million more documents.

Already have an account? Log in

Get access

Grade+
$10 USD/m
Billed $120 USD annually
Homework Help
Class Notes
Textbook Notes
40 Verified Answers
Study Guides
1 Booster Class