Deck 12: Electronic Commerce Systems

Full screen (f)
exit full mode
Question
Business to consumer is the largest segment of Internet commerce.
Use Space or
up arrow
down arrow
to flip the card.
Question
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
Question
Cookies are files created by user computers and stored on Web servers.
Question
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
Question
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
Question
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Question
Sniffing is the unauthorized transmitting of information across an Intranet.
Question
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Question
The bus topology connects the nodes in parallel.
Question
A network topology is the physical arrangement of the components of the network.
Question
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
Question
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Question
Electronic commerce refers only to direct consumer marketing on the Internet.
Question
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance;and 2)to gain bragging rights for being able to do it.
Question
A bus topology is less costly to install than a ring topology.
Question
The client-server model can only be applied to ring and star topologies.
Question
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Question
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
Question
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Question
The rules that make it possible for users of networks to communicate are called protocols.
Question
The intermediary in a smurf attack is also a victim.
Question
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Question
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
Question
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
Question
EDI is the inter-company exchange of computer processible business information in standard format.
Question
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
Question
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
Question
Polling is one technique used to control data collisions.
Question
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
Question
In a star topology,when the central site fails

A) individual workstations can communicate with each other
B) individual workstations can function locally but cannot communicate with other workstations
C) individual workstations cannot function locally and cannot communicate with other workstations
D) the functions of the central site are taken over by a designated workstation
Question
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question
A virtual private network:

A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.
Question
A ping signal is used to initiate

A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true
Question
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
Question
The most frequent use of EDI is in making vendor payments.
Question
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Question
Which of the following statements is correct? The client-server model

A) is best suited to the token-ring topology because the random-access method used by this model detects data collisions.
B) distributes both data and processing tasks to the server's node.
C) is most effective used with a bus topology.
D) is more efficient than the bus or ring topologies.
Question
Packet switching

A) combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
Question
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
Question
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A) star topology
B) bus topology
C) ring topology
D) client/server topology
Question
An IP Address:

A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.
Question
NNTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.
Question
In a ring topology

A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other
Question
In a ring topology

A) all nodes are of equal status
B) nodes manage private programs and databases locally
C) shared resources are managed by a file server which is a node on the ring
D) all of the above
Question
A distributed denial of service (DDoS)attack

A) is more intensive that a Dos attack because it emanates from single source
B) may take the form of either a SYN flood or smurf attack
C) is so named because it effects many victims simultaneously, which are distributed across the internet
D) turns the target victim's computers into zombies that are unable to access the Internet
E) none of the above is correct
Question
Which of the following statements is correct? TCP/IP

A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.
Question
Which of the following statements is correct?

A) Packet switching combines the messages of multiple users into a "packet" for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B) The decision to partition a database assumes that no identifiable primary user exists in the organization.
C) Packet switching is used to establish temporary connections between network devices for the duration of a communication session.
D) A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users.
Question
HTTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.
Question
All of the following are true about the Open System Interface (OSI)protocol except

A) within one node different layers communicate with other layers at that node
B) one protocol is developed and applied to all the OSI layers
C) specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D) layers at each node communicate logically with their counterpart layers across nodes
Question
A digital signature is

A) the encrypted mathematical value of the message sender's name
B) derived from the digest of a document that has been encrypted with the sender's private key
C) the computed digest of the sender's digital certificate
D) allows digital messages to be sent over analog telephone lines
Question
Which method does not manage or control data collisions that might occur on a network?

A) multiplexing
B) polling
C) carrier sensing
D) token passing
Question
Which one of the following statements is correct?

A) Cookies always contain encrypted data.
B) Cookies are text files and never contain encrypted data.
C) Cookies contain the URLs of sites visited by the user.
D) Web browsers cannot function without cookies.
Question
The primary difference between a LAN and a WAN is

A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company
Question
FTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.
Question
A message that is made to look as though it is coming from a trusted source but is not is called

A) a denial of service attack
B) digital signature forging
C) Internet protocol spoofing
D) URL masquerading
Question
IP spoofing

A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.
Question
A star topology is appropriate

A) for a wide area network with a mainframe for a central computer
B) for centralized databases only
C) for environments where network nodes routinely communicate with each other
D) when the central database does not have to be concurrent with the nodes
Question
The client/server technology

A) increases the amount of data that is transmitted between the central file and the network node
B) eliminates the need for nodes to communicate with each other
C) reduces the number of records that must be locked by having the file server perform record searches
D) functions only with a ring and bus topology
Question
HTML

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet.
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.
Question
Sniffer software is

A) software used by malicious Web sites to sniff data from cookies stored on the user's hard drive
B) used by network administrators to analyze network traffic
C) used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions
D) illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers
Question
Define WAN,LAN,and VAN.
Question
Describe an advantage to the client/server topology.
Question
Name the three types of addresses used on the Internet.
Question
Discuss the private key encryption technique and its shortcomings.
Question
What is a ping?
Question
Explain the parts of an e-mail address and give an example (your own?).
Question
What is packet switching?
Question
What is spoofing?
Question
What is an extranet?
Question
List at least five top-level domain names used in the United States.
Question
Describe one primary advantage of polling as a network control method.
Question
What are cookies and why are they used?
Question
Describe one disadvantage to carrier sensing as a network control method.
Question
Why is network control needed? What tasks are performed?
Question
What are the five basic network architectures?
Question
What is an IP address?
Question
What is an IRC?
Question
When are a bridge and with a gateway used to connect networks?
Question
Name the three parties involved in a smurf attack.
Question
What is a URL?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/102
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 12: Electronic Commerce Systems
1
Business to consumer is the largest segment of Internet commerce.
False
2
Because of network protocols,users of networks built by different manufacturers are able to communicate and share data.
True
3
Cookies are files created by user computers and stored on Web servers.
False
4
IP spoofing is a form of masquerading to gain unauthorized access to a Web server.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
5
Business risk is the possibility of loss or injury that can reduce or eliminate an organization's ability to achieve its objectives.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
6
A factor that contributes to computer crime is the reluctance of many organizations to prosecute criminals for fear of negative publicity.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
7
Sniffing is the unauthorized transmitting of information across an Intranet.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
8
A smurf attack involves three participants: a zombie,an intermediary,and the victim.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
9
The bus topology connects the nodes in parallel.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
10
A network topology is the physical arrangement of the components of the network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
11
The phrase .com has become an Internet buzz word.It refers to a top-level domain name for communications organizations.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
12
A distributed denial of service (DDoS)attack may take the form of a SYN flood but not a smurf attack.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
13
Electronic commerce refers only to direct consumer marketing on the Internet.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
14
Only two types of motivation drive DoS attacks: 1)to punish an organization with which the perpetrator had a grievance;and 2)to gain bragging rights for being able to do it.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
15
A bus topology is less costly to install than a ring topology.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
16
The client-server model can only be applied to ring and star topologies.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
17
The standard format for an e-mail address is DOMAIN NAME@USER NAME.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
18
The network paradox is that networks exist to provide user access to shared resources while one of its most important objectives is to control access.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
19
A digital signature is a digital copy of the sender's actual signature that cannot be forged.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
20
The rules that make it possible for users of networks to communicate are called protocols.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
21
The intermediary in a smurf attack is also a victim.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
22
In a hierarchical topology,network nodes communicate with each other via a central host computer.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
23
The more individuals that need to exchange encrypted data,the greater the chance that the key will become known to an intruder.To overcome this problem,private key encryption was devised.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
24
To physically connect a workstation to a LAN requires a

A) file server
B) network interface card
C) multiplexer
D) bridge
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
25
EDI is the inter-company exchange of computer processible business information in standard format.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
26
What do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

A) LAN
B) decentralized network
C) multidrop network
D) Intranet
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
27
One advantage of network technology is

A) bridges and gateways connect one workstation with another workstation
B) the network interface card permits different networks to share data
C) file servers permit software and data to be shared with other network users
D) a universal topology facilitates the transfer of data among networks
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
28
Polling is one technique used to control data collisions.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
29
Network protocols fulfill all of the following objectives except

A) facilitate physical connection between network devices
B) provide a basis for error checking and measuring network performance
C) promote compatibility among network devices
D) result in inflexible standards
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
30
In a star topology,when the central site fails

A) individual workstations can communicate with each other
B) individual workstations can function locally but cannot communicate with other workstations
C) individual workstations cannot function locally and cannot communicate with other workstations
D) the functions of the central site are taken over by a designated workstation
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
31
A ping is an Internet maintenance tool that is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
32
A virtual private network:

A) is a password-controlled network for private users rather than the general public.
B) is a private network within a public network.
C) is an Internet facility that links user sites locally and around the world.
D) defines the path to a facility or file on the web.
E) none of the above is true.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
33
A ping signal is used to initiate

A) URL masquerading
B) digital signature forging
C) Internet protocol spoofing
D) a smurf attack
E) none of the above is true
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
34
A certification authority is an independent and trusted third party empowered with responsibility to vouch for the identity of organizations and individuals engaging in Internet commerce.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
35
The most frequent use of EDI is in making vendor payments.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
36
A ping is used to test the state of network congestion and determine whether a particular host computer is connected and available on the network.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following statements is correct? The client-server model

A) is best suited to the token-ring topology because the random-access method used by this model detects data collisions.
B) distributes both data and processing tasks to the server's node.
C) is most effective used with a bus topology.
D) is more efficient than the bus or ring topologies.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
38
Packet switching

A) combines the messages of multiple users into one packet for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B) is a method for partitioning a database into packets for easy access where no identifiable primary user exists in the organization.
C) is used to establish temporary connections between network devices for the duration of a communication session.
D) is a denial of service technique that disassembles various incoming messages to targeted users into small packages and then reassembles them in random order to create a useless garbled message.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
39
HTML tags are customized to delimit attributes,the content of which can be read and processed by computer applications.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
40
Which topology has a large central computer with direct connections to a periphery of smaller computers? Also in this topology,the central computer manages and controls data communications among the network nodes.

A) star topology
B) bus topology
C) ring topology
D) client/server topology
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
41
An IP Address:

A) defines the path to a facility or file on the web.
B) is the unique address that every computer node and host attached to the Internet must have.
C) is represented by a 64-bit data packet.
D) is the address of the protocol rules and standards that governing the design of internet hardware and software.
E) none of the above is true.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
42
NNTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level (HTTP) format.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
43
In a ring topology

A) the network consists of a central computer which manages all communications between nodes
B) has a host computer connected to several levels of subordinate computers
C) all nodes are of equal status; responsibility for managing communications is distributed among the nodes
D) information processing units rarely communicate with each other
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
44
In a ring topology

A) all nodes are of equal status
B) nodes manage private programs and databases locally
C) shared resources are managed by a file server which is a node on the ring
D) all of the above
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
45
A distributed denial of service (DDoS)attack

A) is more intensive that a Dos attack because it emanates from single source
B) may take the form of either a SYN flood or smurf attack
C) is so named because it effects many victims simultaneously, which are distributed across the internet
D) turns the target victim's computers into zombies that are unable to access the Internet
E) none of the above is correct
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following statements is correct? TCP/IP

A) is the basic protocol that permits communication between Internet sites.
B) controls Web browsers that access the WWW.
C) is the file format used to produce Web pages.
D) is a low-level encryption scheme used to secure transmissions in HTTP format.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
47
Which of the following statements is correct?

A) Packet switching combines the messages of multiple users into a "packet" for transmission. At the receiving end, the packet is disassembled into the individual messages and distributed to the intended users.
B) The decision to partition a database assumes that no identifiable primary user exists in the organization.
C) Packet switching is used to establish temporary connections between network devices for the duration of a communication session.
D) A deadlock is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the data needed by other users.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
48
HTTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
49
All of the following are true about the Open System Interface (OSI)protocol except

A) within one node different layers communicate with other layers at that node
B) one protocol is developed and applied to all the OSI layers
C) specific layers are dedicated to hardware tasks and other layers are dedicated to software tasks
D) layers at each node communicate logically with their counterpart layers across nodes
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
50
A digital signature is

A) the encrypted mathematical value of the message sender's name
B) derived from the digest of a document that has been encrypted with the sender's private key
C) the computed digest of the sender's digital certificate
D) allows digital messages to be sent over analog telephone lines
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
51
Which method does not manage or control data collisions that might occur on a network?

A) multiplexing
B) polling
C) carrier sensing
D) token passing
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
52
Which one of the following statements is correct?

A) Cookies always contain encrypted data.
B) Cookies are text files and never contain encrypted data.
C) Cookies contain the URLs of sites visited by the user.
D) Web browsers cannot function without cookies.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
53
The primary difference between a LAN and a WAN is

A) the geographical area covered by the network
B) the transmission technology used
C) the type of workstation used
D) the size of the company
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
54
FTP

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
55
A message that is made to look as though it is coming from a trusted source but is not is called

A) a denial of service attack
B) digital signature forging
C) Internet protocol spoofing
D) URL masquerading
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
56
IP spoofing

A) combines the messages of multiple users into a "spoofing packet" where the IP addresses are interchanged and the messages are then distributes randomly among the targeted users.
B) is a form of masquerading to gain unauthorized access to a web server.
C) is used to establish temporary connections between network devices with different IP addresses for the duration of a communication session.
D) is a temporary phenomenon that disrupts transaction processing. It will resolve itself when the primary computer completes processing its transaction and releases the IP address needed by other users.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
57
A star topology is appropriate

A) for a wide area network with a mainframe for a central computer
B) for centralized databases only
C) for environments where network nodes routinely communicate with each other
D) when the central database does not have to be concurrent with the nodes
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
58
The client/server technology

A) increases the amount of data that is transmitted between the central file and the network node
B) eliminates the need for nodes to communicate with each other
C) reduces the number of records that must be locked by having the file server perform record searches
D) functions only with a ring and bus topology
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
59
HTML

A) is the document format used to produce Web pages.
B) controls Web browsers that access the Web.
C) is used to connect to Usenet groups on the Internet.
D) is used to transfer text files, programs, spreadsheets, and databases across the Internet.
E) is a low-level encryption scheme used to secure transmissions in higher-level () format.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
60
Sniffer software is

A) software used by malicious Web sites to sniff data from cookies stored on the user's hard drive
B) used by network administrators to analyze network traffic
C) used by bus topology Intranets to sniff for a carrier before transmitting a message to avoid data collisions
D) illegal programs downloaded from the Net to sniff passwords from the encrypted data of Internet customers
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
61
Define WAN,LAN,and VAN.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
62
Describe an advantage to the client/server topology.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
63
Name the three types of addresses used on the Internet.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
64
Discuss the private key encryption technique and its shortcomings.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
65
What is a ping?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
66
Explain the parts of an e-mail address and give an example (your own?).
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
67
What is packet switching?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
68
What is spoofing?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
69
What is an extranet?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
70
List at least five top-level domain names used in the United States.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
71
Describe one primary advantage of polling as a network control method.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
72
What are cookies and why are they used?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
73
Describe one disadvantage to carrier sensing as a network control method.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
74
Why is network control needed? What tasks are performed?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
75
What are the five basic network architectures?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
76
What is an IP address?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
77
What is an IRC?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
78
When are a bridge and with a gateway used to connect networks?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
79
Name the three parties involved in a smurf attack.
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
80
What is a URL?
Unlock Deck
Unlock for access to all 102 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 102 flashcards in this deck.