Deck 12: Electronic Commerce Systems

ملء الشاشة (f)
exit full mode
سؤال
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Electronic commerce refers only to direct consumer marketing on the Internet.
سؤال
Sniffing is the unauthorized transmitting of information across an Intranet.
سؤال
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
سؤال
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
سؤال
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
سؤال
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
سؤال
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
سؤال
Cookies are files created by user computers and stored on Web servers.
سؤال
The client-server model can only be applied to ring and star topologies.
سؤال
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
سؤال
A network topology is the physical arrangement of the components of the network.
سؤال
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
سؤال
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
سؤال
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
سؤال
The rules that make it possible for users of networks to communicate are called protocols.
سؤال
Business to consumer is the largest segment of Internet commerce.
سؤال
The bus topology connects the nodes in parallel.
سؤال
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
سؤال
A bus topology is less costly to install than a ring topology.
سؤال
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
سؤال
Polling is one technique used to control data collisions.
سؤال
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
سؤال
Cloud computing is the technology that has unleashed virtualization.
سؤال
A virtual private network:

A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.
سؤال
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
سؤال
The most frequent use of EDI is in making vendor payments.
سؤال
In a hierarchical topology,network nodes communicate with each other via a central host computer.
سؤال
EDI is the inter-company exchange of computer processible business information in standard format.
سؤال
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
سؤال
The intermediary in a smurf attack is also a victim.
سؤال
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
سؤال
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
سؤال
A ping signal is used to initiate

A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true
سؤال
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
سؤال
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A) star topology
B) bus topology
C) ring topology
D) client/server topology
سؤال
Packet switching

A) combines the messages of multiple users into one packet for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
سؤال
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
سؤال
Cloud computing is decreasing as hardware resources become cheaper because acquisition of resources is slow and not scalable.
سؤال
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
سؤال
An IP Address:

A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.
سؤال
NNTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level (HTTP)format.
سؤال
All of the following are true about the Open System Interface (OSI)protocol except

A) within one node different layers communicate with other layers at that node
B) one protocol is developed and applied to all the OSI layers
C) specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D) layers at each node communicate logically with their counterpart layers across nodes
سؤال
Which method does not manage or control data collisions that might occur on a network?

A) multiplexing
B) polling
C) carrier sensing
D) token passing
سؤال
IP spoofing

A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.
سؤال
A message that is made to look as though it is coming from a trusted source but is not is called

A) a denial of service attack
B) digital signature forging
C) Internet protocol spoofing
D) URL masquerading
سؤال
The client/server technology

A) increases the amount of data that is transmitted between the central file and the network node
B) eliminates the need for nodes to communicate with each other
C) reduces the number of records that must be locked by having the file server perform record searches
D) functions only with a ring and bus topology
سؤال
Which one of the following statements is correct?

A) Cookies always contain encrypted data.
B) Cookies are text files and never contain encrypted data.
C) Cookies contain the URLs of sites visited by the user.
D) Web browsers cannot function without cookies.
سؤال
Sniffer software is

A) software used by malicious Web sites to sniff data from cookies stored on the user's hard drive
B) used by network administrators to analyze network traffic
C) used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions
D) illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers
سؤال
A digital signature is

A) the encrypted mathematical value of the message sender's name
B) derived from the digest of a document that has been encrypted with the sender's private key
C) the computed digest of the sender's digital certificate
D) allows digital messages to be sent over analog telephone lines
سؤال
In a ring topology

A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other
سؤال
In a ring topology

A) all nodes are of equal status
B) nodes manage private programs and databases locally
C) shared resources are managed by a file server which is a node on the ring
D) all of the above
سؤال
A distributed denial of service (DDoS)attack

A) is more intensive that a Dos attack because it emanates from single source
B) may take the form of either a SYN flood or smurf attack
C) is so named because it effects many victims simultaneously,which are distributed across the internet
D) turns the target victim's computers into zombies that are unable to access the Internet
E) none of the above is correct
سؤال
Which of the following statements is correct? The client-server model

A) is best suited to the token-ring topology because the random-access method used by this model detects data collisions.
B) distributes both data and processing tasks to the server's node.
C) is most effective used with a bus topology.
D) is more efficient than the bus or ring topologies.
سؤال
FTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
سؤال
The primary difference between a LAN and a WAN is

A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company
سؤال
A star topology is appropriate

A) for a wide area network with a mainframe for a central computer
B) for centralized databases only
C) for environments where network nodes routinely communicate with each other
D) when the central database does not have to be concurrent with the nodes
سؤال
Which of the following statements is correct? TCP/IP

A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.
سؤال
HTML

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet.
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
سؤال
In a star topology,when the central site fails

A) individual workstations can communicate with each other
B) individual workstations can function locally but cannot communicate with other workstations
C) individual workstations cannot function locally and cannot communicate with other workstations
D) the functions of the central site are taken over by a designated workstation
سؤال
Describe an advantage to the client/server topology.
سؤال
What is an extranet?
سؤال
When are a bridge and with a gateway used to connect networks?
سؤال
What is a URL?
سؤال
The provision of computing power and disk space to client firms who access it from desktop PCs is known as

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
سؤال
What is spoofing?
سؤال
Describe one primary advantage of polling as a network control method.
سؤال
What is a ping?
سؤال
List at least five top-level domain names used in the United States.
سؤال
What are cookies and why are they used?
سؤال
This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor.

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
سؤال
Which of the following statements is correct?

A) Packet switching combines the messages of multiple users into a "packet" for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) The decision to partition a database assumes that no identifiable primary user exists in the organization.
C) Packet switching is used to establish temporary connections between network devices for the duration of a communication session.
D) A deadlock is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users.
سؤال
HTTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
سؤال
Which of the following is not a key feature of cloud computing?

A) Acquisition of resources is rapid and infinitely scalable.
B) Client firms can acquire IT resources from vendors on demand and as needed.
C) Computing resources are pooled to meet the needs of multiple client firms.
D) Individual clients have control over the physical location of the service being provided.
سؤال
Explain the parts of an e-mail address and give an example (your own?).
سؤال
What is an IRC?
سؤال
What is packet switching?
سؤال
Name the three parties involved in a smurf attack.
سؤال
What is an IP address?
سؤال
Name the three types of addresses used on the Internet.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/111
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 12: Electronic Commerce Systems
1
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
True
2
Electronic commerce refers only to direct consumer marketing on the Internet.
False
3
Sniffing is the unauthorized transmitting of information across an Intranet.
False
4
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance; and 2)to gain bragging rights for being able to do it.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
5
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
6
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
7
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
8
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
9
Cookies are files created by user computers and stored on Web servers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
10
The client-server model can only be applied to ring and star topologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
11
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
12
A network topology is the physical arrangement of the components of the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
13
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
14
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
15
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
16
The rules that make it possible for users of networks to communicate are called protocols.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
17
Business to consumer is the largest segment of Internet commerce.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
18
The bus topology connects the nodes in parallel.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
19
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
20
A bus topology is less costly to install than a ring topology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
21
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
22
Polling is one technique used to control data collisions.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
23
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
24
Cloud computing is the technology that has unleashed virtualization.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
25
A virtual private network:

A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
26
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
27
The most frequent use of EDI is in making vendor payments.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
28
In a hierarchical topology,network nodes communicate with each other via a central host computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
29
EDI is the inter-company exchange of computer processible business information in standard format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
30
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
31
The intermediary in a smurf attack is also a victim.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
32
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
33
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
34
A ping signal is used to initiate

A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
35
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
36
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A) star topology
B) bus topology
C) ring topology
D) client/server topology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
37
Packet switching

A) combines the messages of multiple users into one packet for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
38
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
39
Cloud computing is decreasing as hardware resources become cheaper because acquisition of resources is slow and not scalable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
40
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
41
An IP Address:

A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
42
NNTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level (HTTP)format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
43
All of the following are true about the Open System Interface (OSI)protocol except

A) within one node different layers communicate with other layers at that node
B) one protocol is developed and applied to all the OSI layers
C) specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D) layers at each node communicate logically with their counterpart layers across nodes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
44
Which method does not manage or control data collisions that might occur on a network?

A) multiplexing
B) polling
C) carrier sensing
D) token passing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
45
IP spoofing

A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
46
A message that is made to look as though it is coming from a trusted source but is not is called

A) a denial of service attack
B) digital signature forging
C) Internet protocol spoofing
D) URL masquerading
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
47
The client/server technology

A) increases the amount of data that is transmitted between the central file and the network node
B) eliminates the need for nodes to communicate with each other
C) reduces the number of records that must be locked by having the file server perform record searches
D) functions only with a ring and bus topology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
48
Which one of the following statements is correct?

A) Cookies always contain encrypted data.
B) Cookies are text files and never contain encrypted data.
C) Cookies contain the URLs of sites visited by the user.
D) Web browsers cannot function without cookies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
49
Sniffer software is

A) software used by malicious Web sites to sniff data from cookies stored on the user's hard drive
B) used by network administrators to analyze network traffic
C) used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions
D) illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
50
A digital signature is

A) the encrypted mathematical value of the message sender's name
B) derived from the digest of a document that has been encrypted with the sender's private key
C) the computed digest of the sender's digital certificate
D) allows digital messages to be sent over analog telephone lines
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
51
In a ring topology

A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
52
In a ring topology

A) all nodes are of equal status
B) nodes manage private programs and databases locally
C) shared resources are managed by a file server which is a node on the ring
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
53
A distributed denial of service (DDoS)attack

A) is more intensive that a Dos attack because it emanates from single source
B) may take the form of either a SYN flood or smurf attack
C) is so named because it effects many victims simultaneously,which are distributed across the internet
D) turns the target victim's computers into zombies that are unable to access the Internet
E) none of the above is correct
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following statements is correct? The client-server model

A) is best suited to the token-ring topology because the random-access method used by this model detects data collisions.
B) distributes both data and processing tasks to the server's node.
C) is most effective used with a bus topology.
D) is more efficient than the bus or ring topologies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
55
FTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
56
The primary difference between a LAN and a WAN is

A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
57
A star topology is appropriate

A) for a wide area network with a mainframe for a central computer
B) for centralized databases only
C) for environments where network nodes routinely communicate with each other
D) when the central database does not have to be concurrent with the nodes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following statements is correct? TCP/IP

A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
59
HTML

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet.
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
60
In a star topology,when the central site fails

A) individual workstations can communicate with each other
B) individual workstations can function locally but cannot communicate with other workstations
C) individual workstations cannot function locally and cannot communicate with other workstations
D) the functions of the central site are taken over by a designated workstation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
61
Describe an advantage to the client/server topology.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
62
What is an extranet?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
63
When are a bridge and with a gateway used to connect networks?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
64
What is a URL?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
65
The provision of computing power and disk space to client firms who access it from desktop PCs is known as

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
66
What is spoofing?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
67
Describe one primary advantage of polling as a network control method.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
68
What is a ping?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
69
List at least five top-level domain names used in the United States.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
70
What are cookies and why are they used?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
71
This class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor.

A) Computing-as-a-Service
B) Infrastructure-as-a-Service
C) Platform-as-a-Service
D) Software-as-a-Service
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
72
Which of the following statements is correct?

A) Packet switching combines the messages of multiple users into a "packet" for transmission.At the receiving end,the packet is disassembled into the individual messages and distributed to the intended users.
B) The decision to partition a database assumes that no identifiable primary user exists in the organization.
C) Packet switching is used to establish temporary connections between network devices for the duration of a communication session.
D) A deadlock is a temporary phenomenon that disrupts transaction processing.It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
73
HTTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files,programs,spreadsheets,and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level ()format.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
74
Which of the following is not a key feature of cloud computing?

A) Acquisition of resources is rapid and infinitely scalable.
B) Client firms can acquire IT resources from vendors on demand and as needed.
C) Computing resources are pooled to meet the needs of multiple client firms.
D) Individual clients have control over the physical location of the service being provided.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
75
Explain the parts of an e-mail address and give an example (your own?).
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
76
What is an IRC?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
77
What is packet switching?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
78
Name the three parties involved in a smurf attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
79
What is an IP address?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
80
Name the three types of addresses used on the Internet.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 111 في هذه المجموعة.