Filters
Question type

Study Flashcards

Discuss the transactional risks associated with online business. Include in your answer definitions of the following terms: encryption, certification authority (CA), public key, private key, digital certificate, and public-key infrastructure.

Correct Answer

verifed

verified

When a company conducts business transac...

View Answer

Public peering involves exchanging Internet traffic at a public connection, such as an IXP.

Correct Answer

verifed

verified

A peer-to-peer LAN consists of a small number of computers and devices (generally 10 or fewer) linked together.

Correct Answer

verifed

verified

A network's _________________________ method specifies how data travels from node to node across the network.

Correct Answer

verifed

verified

Critical Thinking Questions Case 6-2 You are the secretary to the president of a small company that makes custom furniture. The president wants to set up a website and asks you to research the domain name registration process. Which of the following websites can you use to handle the registration of your domain name?


A) eBay
B) Network Solutions
C) Skype
D) Amazon.com

Correct Answer

verifed

verified

A special kind of virus that spreads across a network, such as the Internet, by replicating itself is called a computer ____.


A) Trojan horse
B) worm
C) hoax
D) payload

Correct Answer

verifed

verified

Modified Multiple Choice Which of the following are external network security threats?


A) Worms
B) Hackers
C) Natural disasters
D) Trojan horses
E) None of above

Correct Answer

verifed

verified

Virus protection ____ and apps require continual updates with information on recently discovered viruses.


A) manuals
B) presentations
C) software
D) hardware

Correct Answer

verifed

verified

A network supporting users in a small geographical area, such as a home, an office, a single building, or several buildings, is called a ____.


A) LAN
B) MAN
C) WAN
D) TAN

Correct Answer

verifed

verified

____ business services typically include a PBX (private branch exchange) switching service that manages incoming and outgoing calls and calls between extensions.


A) PSTN
B) VoIP
C) HTML
D) NSP

Correct Answer

verifed

verified

A hacker can create a rogue WLAN by installing a wireless router that uses network resources and exposes the network to security threats.

Correct Answer

verifed

verified

Bluetooth is an example of a short-range _________________________ technology that sends and receives wireless transmissions between devices, such as computers, smartphones, tablets, and headsets.

Correct Answer

verifed

verified

Modified True/False Linux®, Novell® NetWare®, and UNIX® are all examples of network operating systems . ______________________

Correct Answer

verifed

verified

Google Drive and Microsoft One Drive are examples of ____ services.


A) storm
B) smart
C) cloud
D) sun

Correct Answer

verifed

verified

A proxy server compares information contained in an IP packet header, such as a packet's source and destination IP addresses, with a set of predetermined filtering rules.

Correct Answer

verifed

verified

____ network is another name for a network running TCP/IP.


A) HTTP
B) TCP
C) UDP
D) IP

Correct Answer

verifed

verified

A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.


A) access method
B) physical topology
C) logical topology
D) throughput

Correct Answer

verifed

verified

At the top of the DNS server hierarchy are the ____ servers that publish a directory of the next level of DNS servers.


A) local caching
B) authoritative
C) root name
D) namespace

Correct Answer

verifed

verified

Each node on a network has a unique physical address called its _________________________ address.

Correct Answer

verifed

verified

   As shown in the accompanying figure, a(n) _________________________ transmission uses radio waves to connect devices that are touching or nearby (generally within 10 centimeters). As shown in the accompanying figure, a(n) _________________________ transmission uses radio waves to connect devices that are touching or nearby (generally within 10 centimeters).

Correct Answer

verifed

verified

near field...

View Answer

Showing 61 - 80 of 103

Related Exams

Show Answer