Deck 6: Understanding Internet Technologies and Security

Full screen (f)
exit full mode
Question
Network firewalls can monitor and report suspicious network traffic, but are unable to filter out or block incoming or outgoing network traffic.
Use Space or
up arrow
down arrow
to flip the card.
Question
War driving a website occurs when hackers redirect a URL to an alternate website.
Question
Public peering involves exchanging Internet traffic at a public connection, such as an IXP.
Question
How an organization deals with a natural or man-made disaster to ensure the organization's viability is covered by their disaster recovery plan.
Question
A virtual conversation is a virtual meeting conducted using a browser and the web.
Question
The tracert utility can test the path to a destination Internet site and see if any problems exist with making a connection at a particular point along the route.
Question
Most virus protection software programs perform automatic virus definition updates through downloads over the Internet.
Question
At the top of the DNS hierarchy are the DNS authoritative servers that publish a directory of the root zone file.
Question
A smart card, a plastic card the size of a credit card, contains memory chips that can store special access codes or biometric information.
Question
Twisted-pair cable, which contains glass fibers surrounded by a layer of glass cladding and a protective outer jacket, is used to carry voice, video, and data transmissions over very long distances.
Question
A physical topology is a network's access method in the way in which data travels between nodes.
Question
A distributed denial of service (DDos) involves sending a continuous stream of server requests that ultimately overload a server's capacity to respond.
Question
Spoofing is the act of driving around with a laptop, antenna, and wireless card, looking for unsecured wireless networks to access.
Question
A token ring is a program that appears to do something useful or fun, but actually does something destructive, including destroying files, creating a way for a hacker to breach network security, and stealing passwords.
Question
A proxy server compares information contained in an IP packet header, such as a packet's source and destination IP addresses, with a set of predetermined filtering rules.
Question
A hacker can create a rogue WLAN by installing a wireless router that uses network resources and exposes the network to security threats.
Question
Businesses should test data storage procedures periodically to ensure that backed up data is correct and complete, and that the storage media or cloud-based storage service works properly.
Question
A peer-to-peer LAN consists of a small number of computers and devices (generally 10 or fewer) linked together.
Question
A transceiver is a single component that both sends and receives transmissions.
Question
Geosocial networking is a term used to describe the combination of location-based services with social networking providers.
Question
A security audit may result in a revision of security policies and procedures, improved employee training, and making necessary updates to the network's hardware and software.
Question
A ____ topology connects each node to a central device, such as a hub or switch.

A) bus
B) triangle
C) star
D) ring
Question
The two most common network access methods are ____ and token ring.

A) Ethernet
B) bus
C) star
D) peer-to-peer
Question
A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.

A) access method
B) physical topology
C) logical topology
D) throughput
Question
<strong>  A client/server LAN, as shown in the accompanying figure, uses a network ____ to manage data storage, printer access, communications, Internet connections, security, and network administration.</strong> A) bus B) host C) card D) operating system <div style=padding-top: 35px>
A client/server LAN, as shown in the accompanying figure, uses a network ____ to manage data storage, printer access, communications, Internet connections, security, and network administration.

A) bus
B) host
C) card
D) operating system
Question
Cloud computing involves using devices to measure biological data to identify a user.
________________________
Question
Data restore procedures should be tested periodically to ensure that the backed up data is correct and complete, and that the storage media or cloud-based storage service works properly.
Question
A network supporting users in a small geographical area, such as a home, an office, a single building, or several buildings, is called a ____.

A) LAN
B) MAN
C) WAN
D) TAN
Question
A(n) ____ cannot determine how to direct a packet; it simply sends the same signal to all of its connected nodes or segments.

A) bridge
B) intelligent hub
C) data switch
D) passive hub
Question
Personal VPNs exist wherein mobile or wireless users can establish a private, secure network connection.
Question
External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures.
_______________________
Question
The primary tools used to provide transaction authentication, integrity, nonrepudiation, and confidentiality are encryption and dynamic routing.
Question
A hardware device or software connecting two or more networks or network segments that use different packet formatting, different communication protocols, and different access methods is called a ____.

A) gateway
B) router
C) hub
D) data switch
Question
A credit card is a plastic card containing memory chips that can store special access codes or biometric information.
______________________
Question
Modified True/False
Linux®, Novell® NetWare®, and UNIX® are all examples of network operating systems .
______________________
Question
An example of a short-range RF technology that sends and receives wireless transmissions between devices such as computers, smartphones, tablets, and headsets is ____.

A) geosocial networking
B) IP telephony
C) Bluetooth
D) encryption
Question
A(n) ____ is a specialized computer that can connect LAN segments, two LANs, or multiple LANs on a WAN - all transmitting at different speeds and using different protocols.

A) data switch
B) intelligent hub
C) router
D) segment
Question
<strong>  As shown in the accompanying figure, ____ cable is commonly used in LAN transmissions because it is easier to install than other types of cable and can handle the faster transmissions speeds required by modern networks.</strong> A) twisted-pair B) coaxial C) fiber-optic D) microwave <div style=padding-top: 35px>
As shown in the accompanying figure, ____ cable is commonly used in LAN transmissions because it is easier to install than other types of cable and can handle the faster transmissions speeds required by modern networks.

A) twisted-pair
B) coaxial
C) fiber-optic
D) microwave
Question
A private key infrastructure is the combination of organizations or individuals sending and receiving encrypted data, their public and private keys, and the certification authorities that issue the keys and digital certificates.
Question
LAN jacking is a process that encapsulates one protocol inside another protocol.
Question
At the top of the DNS server hierarchy are the ____ servers that publish a directory of the next level of DNS servers.

A) local caching
B) authoritative
C) root name
D) namespace
Question
A(n)____ attack involves sending a continuous stream of server requests that ultimately overloads a server's capacity to respond.

A) DDoS
B) MDoS
C) SSoS
D) PPoS
Question
____ provide the public and private network infrastructure for the Internet that enables wireless, cellular, and other capabilities.

A) ISPs
B) MAEs
C) NSPs
D) NAPs
Question
Originally, a classful routing system assigned IP addresses by classifying networks as ____ to maximize the number of available IP addresses for each network.

A) Class 1 through Class 6
B) Class 1 through Class 10
C) Class A through Class E
D) Class A through Class J
Question
<strong>  The ____ System is a navigation system that consists of one or more Earth-based receivers, such as those shown in the accompanying figure, that accept and analyze signals sent by small satellites orbiting approximately 11,000 miles above Earth.</strong> A) Microwave Listening B) Global Positioning C) Wireless Registration D) Text Messaging <div style=padding-top: 35px>
The ____ System is a navigation system that consists of one or more Earth-based receivers, such as those shown in the accompanying figure, that accept and analyze signals sent by small satellites orbiting approximately 11,000 miles above Earth.

A) Microwave Listening
B) Global Positioning
C) Wireless Registration
D) Text Messaging
Question
Each octet in an IPv6 IP address is separated by a ____.

A) colon
B) comma
C) period
D) semicolon
Question
____ network is another name for a network running TCP/IP.

A) HTTP
B) TCP
C) UDP
D) IP
Question
The current IP standard lengthens IP addresses from ____.

A) 16 bits to 32 bits
B) 32 bits to 128 bits
C) 64 bits to 128 bits
D) 128 bits to 256 bits
Question
An IPv6 address includes ____ 8-bit numbers.

A) six
B) eight
C) nine
D) ten
Question
<strong>  ____ involves using devices, such as the one shown in the accompanying figure, to measure biological data to identify a user.</strong> A) Biometrics B) Biographies C) Biosystems D) Bioexercises <div style=padding-top: 35px>
____ involves using devices, such as the one shown in the accompanying figure, to measure biological data to identify a user.

A) Biometrics
B) Biographies
C) Biosystems
D) Bioexercises
Question
____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.

A) Maskers
B) Hackers
C) Stoppers
D) Networkers
Question
Google Drive and Microsoft One Drive are examples of ____ services.

A) storm
B) smart
C) cloud
D) sun
Question
____ networks allow voice, data, and video to be delivered simultaneously across the same network using a combination of computers and devices, telephones, and television.

A) Imminent
B) Duplicate
C) Converged
D) Hosted
Question
A(n) ____ meeting allows collaboration between participants, such as a group of employees, over a network.

A) in office
B) virtual
C) realworld
D) biometric
Question
A special kind of virus that spreads across a network, such as the Internet, by replicating itself is called a computer ____.

A) Trojan horse
B) worm
C) hoax
D) payload
Question
The process of resolving a domain name to an IP address begins with a(n) ____ server.

A) authoritative
B) local caching
C) mail
D) root name
Question
____ business services typically include a PBX (private branch exchange) switching service that manages incoming and outgoing calls and calls between extensions.

A) PSTN
B) VoIP
C) HTML
D) NSP
Question
____ involves real-time transmission of video and audio between two locations.

A) Video conferencing
B) Interactive television
C) Internet telephony
D) TV Internet service
Question
A ____ service is a wireless service offered to customers based on their physical location.

A) Location-based
B) GPS-based
C) Wireless-based
D) Web-based
Question
The ____ allows private companies to handle the registration of domain names.

A) Shared Registration System
B) Alternative Root System
C) IP Registration System
D) Accredited Registration System
Question
Modified Multiple Choice
Which of the following are components of the TCP/IP stack set of standard Internet protocols on which communications across the Internet and many private IP networks rely?

A) TCP
B) IP
C) HTTP
D) FTP
Question
A(n) ____ server is a computer or software application that hides an internal IP address from the outside world by substituting its own IP address for a source computer's IP address before sending outgoing email or webpage requests.

A) proxy
B) mail
C) HTTP
D) FTP
Question
Modified Multiple Choice
Internet telephony is also called _____.

A) VPN telephony
B) IP telephony
C) VoIP
D) teleconferencing
Question
Each computer or other device on a LAN is called a(n) _________________________.
Question
A(n) ____ is the combination of organizations or individuals sending and receiving encrypted data, their public and private keys, and the CAs that issue the keys and digital certificates.

A) private peering agreement
B) VPN
C) public key infrastructure
D) NSP
Question
The ability of a(n) _________________________ LAN to support shared data storage, provide network maintenance tools, and promote more efficient data backups offers advantages over a peer-to-peer LAN.
Question
A network's _________________________ method specifies how data travels from node to node across the network.
Question
A(n) ____ private network uses tunneling to hide encrypted data, IP addresses, and a tunneling protocol inside IP packets routed over the public network using the IP protocol.

A) tunneling
B) virtual
C) packet-filtering
D) IP
Question
When an organization wants to use encryption, it requests a set of associated public and private keys from a ____.

A) proxy server
B) network administrator
C) network firewall
D) certification authority
Question
An organization may outgrow a(n) _________________________ LAN quickly, as more computers and devices need to be added or file- and device-sharing becomes more complex.
Question
Virus protection ____ and apps require continual updates with information on recently discovered viruses.

A) manuals
B) presentations
C) software
D) hardware
Question
A network ____ is a combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.

A) cable
B) firewall
C) hub
D) data switch
Question
False warnings about viruses are called virus ____.

A) stories
B) myths
C) hoaxes
D) ports
Question
Modified Multiple Choice
Which of the following are network classifications for the assignment of IP addresses under the original classful routing system?

A) A
B) E
C) F
D) G
Question
Modified Multiple Choice
Which of the following are external network security threats?

A) Worms
B) Hackers
C) Natural disasters
D) Trojan horses
Question
Network administrators and IT managers use network ____ to expose network vulnerabilities.

A) service providers
B) operating systems
C) interface cards
D) security audits
Question
A(n) _________________________ is an internal expansion card that enables a computer or other device to access a network.
Question
Modified Multiple Choice
Which of the following are examples of services used in holding virtual conversations?

A) Google Hangouts
B) Foursquare
C) FaceTime
D) Network Solutions
Question
A(n) ____ electronically authenticates an organization's or individual's identity.

A) HTTP server
B) digital certificate
C) encryption server
D) firewall
Question
____ involves security audit personnel trying to hack into a network.

A) Distributed denial of service
B) Private peering
C) Penetration testing
D) Tunneling
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/103
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 6: Understanding Internet Technologies and Security
1
Network firewalls can monitor and report suspicious network traffic, but are unable to filter out or block incoming or outgoing network traffic.
False
2
War driving a website occurs when hackers redirect a URL to an alternate website.
False
3
Public peering involves exchanging Internet traffic at a public connection, such as an IXP.
True
4
How an organization deals with a natural or man-made disaster to ensure the organization's viability is covered by their disaster recovery plan.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
5
A virtual conversation is a virtual meeting conducted using a browser and the web.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
6
The tracert utility can test the path to a destination Internet site and see if any problems exist with making a connection at a particular point along the route.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
7
Most virus protection software programs perform automatic virus definition updates through downloads over the Internet.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
8
At the top of the DNS hierarchy are the DNS authoritative servers that publish a directory of the root zone file.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
9
A smart card, a plastic card the size of a credit card, contains memory chips that can store special access codes or biometric information.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
10
Twisted-pair cable, which contains glass fibers surrounded by a layer of glass cladding and a protective outer jacket, is used to carry voice, video, and data transmissions over very long distances.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
11
A physical topology is a network's access method in the way in which data travels between nodes.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
12
A distributed denial of service (DDos) involves sending a continuous stream of server requests that ultimately overload a server's capacity to respond.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
13
Spoofing is the act of driving around with a laptop, antenna, and wireless card, looking for unsecured wireless networks to access.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
14
A token ring is a program that appears to do something useful or fun, but actually does something destructive, including destroying files, creating a way for a hacker to breach network security, and stealing passwords.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
15
A proxy server compares information contained in an IP packet header, such as a packet's source and destination IP addresses, with a set of predetermined filtering rules.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
16
A hacker can create a rogue WLAN by installing a wireless router that uses network resources and exposes the network to security threats.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
17
Businesses should test data storage procedures periodically to ensure that backed up data is correct and complete, and that the storage media or cloud-based storage service works properly.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
18
A peer-to-peer LAN consists of a small number of computers and devices (generally 10 or fewer) linked together.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
19
A transceiver is a single component that both sends and receives transmissions.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
20
Geosocial networking is a term used to describe the combination of location-based services with social networking providers.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
21
A security audit may result in a revision of security policies and procedures, improved employee training, and making necessary updates to the network's hardware and software.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
22
A ____ topology connects each node to a central device, such as a hub or switch.

A) bus
B) triangle
C) star
D) ring
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
23
The two most common network access methods are ____ and token ring.

A) Ethernet
B) bus
C) star
D) peer-to-peer
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
24
A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.

A) access method
B) physical topology
C) logical topology
D) throughput
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
25
<strong>  A client/server LAN, as shown in the accompanying figure, uses a network ____ to manage data storage, printer access, communications, Internet connections, security, and network administration.</strong> A) bus B) host C) card D) operating system
A client/server LAN, as shown in the accompanying figure, uses a network ____ to manage data storage, printer access, communications, Internet connections, security, and network administration.

A) bus
B) host
C) card
D) operating system
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
26
Cloud computing involves using devices to measure biological data to identify a user.
________________________
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
27
Data restore procedures should be tested periodically to ensure that the backed up data is correct and complete, and that the storage media or cloud-based storage service works properly.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
28
A network supporting users in a small geographical area, such as a home, an office, a single building, or several buildings, is called a ____.

A) LAN
B) MAN
C) WAN
D) TAN
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
29
A(n) ____ cannot determine how to direct a packet; it simply sends the same signal to all of its connected nodes or segments.

A) bridge
B) intelligent hub
C) data switch
D) passive hub
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
30
Personal VPNs exist wherein mobile or wireless users can establish a private, secure network connection.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
31
External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures.
_______________________
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
32
The primary tools used to provide transaction authentication, integrity, nonrepudiation, and confidentiality are encryption and dynamic routing.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
33
A hardware device or software connecting two or more networks or network segments that use different packet formatting, different communication protocols, and different access methods is called a ____.

A) gateway
B) router
C) hub
D) data switch
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
34
A credit card is a plastic card containing memory chips that can store special access codes or biometric information.
______________________
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
35
Modified True/False
Linux®, Novell® NetWare®, and UNIX® are all examples of network operating systems .
______________________
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
36
An example of a short-range RF technology that sends and receives wireless transmissions between devices such as computers, smartphones, tablets, and headsets is ____.

A) geosocial networking
B) IP telephony
C) Bluetooth
D) encryption
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
37
A(n) ____ is a specialized computer that can connect LAN segments, two LANs, or multiple LANs on a WAN - all transmitting at different speeds and using different protocols.

A) data switch
B) intelligent hub
C) router
D) segment
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
38
<strong>  As shown in the accompanying figure, ____ cable is commonly used in LAN transmissions because it is easier to install than other types of cable and can handle the faster transmissions speeds required by modern networks.</strong> A) twisted-pair B) coaxial C) fiber-optic D) microwave
As shown in the accompanying figure, ____ cable is commonly used in LAN transmissions because it is easier to install than other types of cable and can handle the faster transmissions speeds required by modern networks.

A) twisted-pair
B) coaxial
C) fiber-optic
D) microwave
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
39
A private key infrastructure is the combination of organizations or individuals sending and receiving encrypted data, their public and private keys, and the certification authorities that issue the keys and digital certificates.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
40
LAN jacking is a process that encapsulates one protocol inside another protocol.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
41
At the top of the DNS server hierarchy are the ____ servers that publish a directory of the next level of DNS servers.

A) local caching
B) authoritative
C) root name
D) namespace
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
42
A(n)____ attack involves sending a continuous stream of server requests that ultimately overloads a server's capacity to respond.

A) DDoS
B) MDoS
C) SSoS
D) PPoS
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
43
____ provide the public and private network infrastructure for the Internet that enables wireless, cellular, and other capabilities.

A) ISPs
B) MAEs
C) NSPs
D) NAPs
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
44
Originally, a classful routing system assigned IP addresses by classifying networks as ____ to maximize the number of available IP addresses for each network.

A) Class 1 through Class 6
B) Class 1 through Class 10
C) Class A through Class E
D) Class A through Class J
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
45
<strong>  The ____ System is a navigation system that consists of one or more Earth-based receivers, such as those shown in the accompanying figure, that accept and analyze signals sent by small satellites orbiting approximately 11,000 miles above Earth.</strong> A) Microwave Listening B) Global Positioning C) Wireless Registration D) Text Messaging
The ____ System is a navigation system that consists of one or more Earth-based receivers, such as those shown in the accompanying figure, that accept and analyze signals sent by small satellites orbiting approximately 11,000 miles above Earth.

A) Microwave Listening
B) Global Positioning
C) Wireless Registration
D) Text Messaging
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
46
Each octet in an IPv6 IP address is separated by a ____.

A) colon
B) comma
C) period
D) semicolon
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
47
____ network is another name for a network running TCP/IP.

A) HTTP
B) TCP
C) UDP
D) IP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
48
The current IP standard lengthens IP addresses from ____.

A) 16 bits to 32 bits
B) 32 bits to 128 bits
C) 64 bits to 128 bits
D) 128 bits to 256 bits
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
49
An IPv6 address includes ____ 8-bit numbers.

A) six
B) eight
C) nine
D) ten
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
50
<strong>  ____ involves using devices, such as the one shown in the accompanying figure, to measure biological data to identify a user.</strong> A) Biometrics B) Biographies C) Biosystems D) Bioexercises
____ involves using devices, such as the one shown in the accompanying figure, to measure biological data to identify a user.

A) Biometrics
B) Biographies
C) Biosystems
D) Bioexercises
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
51
____ often exploit well-known security vulnerabilities in popular software to spread destructive programs such as viruses, worms, and Trojan horses.

A) Maskers
B) Hackers
C) Stoppers
D) Networkers
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
52
Google Drive and Microsoft One Drive are examples of ____ services.

A) storm
B) smart
C) cloud
D) sun
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
53
____ networks allow voice, data, and video to be delivered simultaneously across the same network using a combination of computers and devices, telephones, and television.

A) Imminent
B) Duplicate
C) Converged
D) Hosted
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
54
A(n) ____ meeting allows collaboration between participants, such as a group of employees, over a network.

A) in office
B) virtual
C) realworld
D) biometric
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
55
A special kind of virus that spreads across a network, such as the Internet, by replicating itself is called a computer ____.

A) Trojan horse
B) worm
C) hoax
D) payload
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
56
The process of resolving a domain name to an IP address begins with a(n) ____ server.

A) authoritative
B) local caching
C) mail
D) root name
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
57
____ business services typically include a PBX (private branch exchange) switching service that manages incoming and outgoing calls and calls between extensions.

A) PSTN
B) VoIP
C) HTML
D) NSP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
58
____ involves real-time transmission of video and audio between two locations.

A) Video conferencing
B) Interactive television
C) Internet telephony
D) TV Internet service
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
59
A ____ service is a wireless service offered to customers based on their physical location.

A) Location-based
B) GPS-based
C) Wireless-based
D) Web-based
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
60
The ____ allows private companies to handle the registration of domain names.

A) Shared Registration System
B) Alternative Root System
C) IP Registration System
D) Accredited Registration System
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
61
Modified Multiple Choice
Which of the following are components of the TCP/IP stack set of standard Internet protocols on which communications across the Internet and many private IP networks rely?

A) TCP
B) IP
C) HTTP
D) FTP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
62
A(n) ____ server is a computer or software application that hides an internal IP address from the outside world by substituting its own IP address for a source computer's IP address before sending outgoing email or webpage requests.

A) proxy
B) mail
C) HTTP
D) FTP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
63
Modified Multiple Choice
Internet telephony is also called _____.

A) VPN telephony
B) IP telephony
C) VoIP
D) teleconferencing
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
64
Each computer or other device on a LAN is called a(n) _________________________.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
65
A(n) ____ is the combination of organizations or individuals sending and receiving encrypted data, their public and private keys, and the CAs that issue the keys and digital certificates.

A) private peering agreement
B) VPN
C) public key infrastructure
D) NSP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
66
The ability of a(n) _________________________ LAN to support shared data storage, provide network maintenance tools, and promote more efficient data backups offers advantages over a peer-to-peer LAN.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
67
A network's _________________________ method specifies how data travels from node to node across the network.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
68
A(n) ____ private network uses tunneling to hide encrypted data, IP addresses, and a tunneling protocol inside IP packets routed over the public network using the IP protocol.

A) tunneling
B) virtual
C) packet-filtering
D) IP
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
69
When an organization wants to use encryption, it requests a set of associated public and private keys from a ____.

A) proxy server
B) network administrator
C) network firewall
D) certification authority
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
70
An organization may outgrow a(n) _________________________ LAN quickly, as more computers and devices need to be added or file- and device-sharing becomes more complex.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
71
Virus protection ____ and apps require continual updates with information on recently discovered viruses.

A) manuals
B) presentations
C) software
D) hardware
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
72
A network ____ is a combination of hardware and software that filters traffic between private networks or between a private network and a public network, such as the Internet.

A) cable
B) firewall
C) hub
D) data switch
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
73
False warnings about viruses are called virus ____.

A) stories
B) myths
C) hoaxes
D) ports
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
74
Modified Multiple Choice
Which of the following are network classifications for the assignment of IP addresses under the original classful routing system?

A) A
B) E
C) F
D) G
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
75
Modified Multiple Choice
Which of the following are external network security threats?

A) Worms
B) Hackers
C) Natural disasters
D) Trojan horses
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
76
Network administrators and IT managers use network ____ to expose network vulnerabilities.

A) service providers
B) operating systems
C) interface cards
D) security audits
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
77
A(n) _________________________ is an internal expansion card that enables a computer or other device to access a network.
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
78
Modified Multiple Choice
Which of the following are examples of services used in holding virtual conversations?

A) Google Hangouts
B) Foursquare
C) FaceTime
D) Network Solutions
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
79
A(n) ____ electronically authenticates an organization's or individual's identity.

A) HTTP server
B) digital certificate
C) encryption server
D) firewall
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
80
____ involves security audit personnel trying to hack into a network.

A) Distributed denial of service
B) Private peering
C) Penetration testing
D) Tunneling
Unlock Deck
Unlock for access to all 103 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 103 flashcards in this deck.