rest of it fund

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/114

flashcard set

Earn XP

Description and Tags

6, 7, 8

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

115 Terms

1
New cards

TCP/IP introduced which of the following communication ideas?

  • All of the above

  • three-way network handshake

  • checksum for error detection

  • packet switching

  • collision detection

three-way network handshake

2
New cards

Morris’ Internet worm was an attempt to ...

  • ... damage the Internet so that he could avoid an assignment.

  • ... demonstrate his knowledge in an attempt to get hired by a security company.

  • ... demonstrate weaknesses in Unix security.

  • ... join the group Anonymous.

  • ... weaken US defense by attacking the Internet.

... demonstrate weaknesses in Unix security.

3
New cards

A checksum is used in network communication for which purpose?

  • Collision detection

  • Network handshake

  • Addressing

  • Encryption

  • Error checking

Error checking

4
New cards

Which level of the OSI model takes care of reliability?

  • Data link

  • Transport

  • Session

  • Application

  • Presentation

Transport

5
New cards

Each layer of the OSI model adds header information onto the message except for the ...

  • ... Physical layer.

  • ... Network layer.

  • ... Application layer.

  • ... Transport layer.

  • ... Session layer.

... Physical layer.

6
New cards

In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors?

  • 2

  • all computers in the network

  • 3

  • 4

  • 1

3

7
New cards

Which of the following technologies differentiates a normal extranet from a virtual private network?

  • multiplexing

  • use of routers instead of switches

  • use of TCP/IP

  • use of fiber optic cable

  • encryption

encryption

8
New cards

In a Linux system, the address(es) of your DNS servers will be stored in which file?

  • /etc/hosts.allow

  • /etc/dns

  • /etc/hosts

  • /etc/hosts.conf

  • /etc/hosts.equiv

/etc/hosts.conf

9
New cards

Twisted wire pair is most commonly used in which of the following?

  • For cable tv

  • For wired home networks

  • For cell phone networks

  • In the public telephone network in the US

  • For wireless home networks

In the public telephone network in the US

10
New cards

A network port ...

  • ... is the address of the connection (in the back of the computer) between the network card and the computer network.

  • ... indicates the message’s intended application software.

  • ... is a number used to determine if a message should make it through a firewall.

  • ... is the address of a network broadcast device.

  • ... is part of the IP address.

... indicates the message’s intended application software.

11
New cards

True or false. The Internet uses packet switching while local area networks use circuit switching.

False

12
New cards

As a network gets larger (has more computers connected to it), which of the following network topologies performance is most affected?

  • All are equally affected.

  • ring

  • full mesh

  • tree

  • star

ring

13
New cards

In which protocol can you use UDP type packets? IP, TCP, neither

TCP

14
New cards

The number of computers on the original ARPAnet was ...

4

15
New cards

Of the following network types (sizes or classifications), which is generally considered the smallest?

  • CAN

  • MAN

  • WAN

  • LAN

  • PAN

PAN (personal)

16
New cards

A network with a file server which services the local computers would be considered a(n) ...

  • ... intranet.

  • ... personal area network.

  • ... client-server network.

  • ... peer-to-peer network.

  • ... extranet.

... client-server network.

17
New cards

True or false. We view computer networks at a logical level while the operating system views the network at a physical level.

False.

18
New cards

True or false. In a circuit switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication.

True

19
New cards

The ability of a network to carry multiple messages at the same time is known as ...

  • ... none of the above: this is not possible.

  • ... multiprocessing.

  • ... modulating.

  • ... multitasking.

  • ... multiplexing.

... multiplexing.

20
New cards

Which level of the OSI model performs routing?

  • Transport

  • Session

  • Network

  • Data link

  • Physical

Network

21
New cards

Mapping an external IP address into an internal IP address is known as ...

  • ... network address translation.

  • ... IP spoofing.

  • ... modulation.

  • ... demodulation.

  • ... multiplexing.

... network address translation.

22
New cards

TCP/IP’s link layer is roughly equivalent to the OSI model’s ...

... physical and data link layers.

23
New cards

If a computer were to go off line in a network, which of the following topologies would most likely be impacted by this?

ring

24
New cards

Which of the following network topologies is generally considered the cheapest?

bus

25
New cards

Long distance communication (dozens, hundreds or thousands of miles) generally does not use which of the following?

fiber optic cable

26
New cards

IPv4 offers approximately how many unique IP addresses?

4 billion

27
New cards

Which of the following network programs sends information in clear text and so is not secure?

  • rlogin

  • ftp

  • ssh

  • All of the above except ssh

  • telnet

All of the above except ssh

28
New cards

Which of the following terms is used to denote a computer you wish to access over a network?

Remote computer

29
New cards

At which level of the OSI model are data units decomposed into packets? (Network, data link, application, physical, transport)

Data link

30
New cards

“T” connectors are used to join computers together in which type of network topology?

bus

31
New cards

A jam signal is used in an Ethernet network to ...

  • ... alert computers of an incoming message to be sent to all computers.

  • ... prevent intrusions by ignoring all incoming messages.

  • ... inform all computers on the network of a collision.

  • ... cause the network to reboot.

  • ... determine if a message is colliding with another.

... inform all computers on the network of a collision.

32
New cards

Which of the following services is used to map IP aliases to IP addresses? firewall, ftp, dns, ssh, http

dns

33
New cards

Switches use which of the following addresses to send a message to the proper device?

  • None of the above: a switch sends a copy of the message to every device connected to it.

  • IPv6 addresses

  • MAC addresses

  • telephone numbers

  • IP addresses

MAC addresses

34
New cards

An intranet LAN has which of the following properties?

  • The LAN uses IP to easily extend the network to the Internet.

  • All communication is encrypted.

  • All resources use wireless communication.

  • The network uses no routers.

  • The network uses one-to-many network address translation.

The LAN uses IP to easily extend the network to the Internet.

35
New cards

The first message broadcast on the Internet, in its earliest incarnation, was in which year?

  • 1983

  • 1969

  • 1996

  • 1946

  • 1973

1969

36
New cards

A Class C network has how many IP addresses available for the network?

256

37
New cards

True or false. We can think of the Internet and the World Wide Web interchangeably.

False

38
New cards

Which of the following devices deals with IP addresses? hub, switch, router, MODEM, fiber optic cable

router

39
New cards

In order to determine if another computer is available and accessible over your network, you might use which program to test it? ping, sendmail, https, ftp, http

ping

40
New cards

The full mesh network is seldom used because ...

… it costs the most.

41
New cards

True or false. In OSI, only header information is affixed at each layer but in TCP/IP, both header and footer information can be affixed.

True

42
New cards

Last mile technology is used to express the idea that ...

… some households still use low bandwidth telephone lines to access the Internet.

43
New cards

In streaming audio and video, which of TCP and UDP would be preferred as it would trade off speed for assurance of arrival?

TCP

44
New cards

The term used to describe the amount of data that can be transferred over a network over a unit of time, such as bits per second, is known as ...

… bandwidth.

45
New cards

SSL, the secure sockets layer, is an implementation of which level of the OSI model? Session, Transport, Presentation, Application, Network

Presentation

46
New cards

What noteworthy event happened to the APRANet in 1973?

The first international computer was added to the network.

47
New cards

To use the telephone network for computer communication, one must ...

… convert the analog information stored in the computer into a digital form.

48
New cards

Which of the following devices would transmit any message received on to all computers in its local area network?

  • hub

  • gateway

  • repeater

  • switch

  • router

repeater

49
New cards

Which mathematical operation is used to obtain the checksum once the sum of the bits is computed?

modulo

50
New cards

IPv4 addresses are _____ bits long.

32

51
New cards

True or false. Data mining, as a process, is not very computationally intensive and so it is highly attractive even if it cannot guarantee finding any information that is useful.

False

52
New cards

A company may draw upon multiple sources to build their data warehouse. Which of the following would not be one of those sources?

  • Marketing reports

  • Sales records

  • All of the above are possible sources.

  • Project reports

  • Enterprise resource planning systems

All of the above are possible sources.

53
New cards

True or false. The goal of availability often can conflict with the goals of confidentiality and integrity.

True

54
New cards

True or false. All information systems are stored on computer.

False

55
New cards

Symmetric key encryption is also known as ...

… private key encryption.

56
New cards

True or false. Data should not only be checked for accuracy as it is gathered but it should be checked for accuracy as it is entered (or after it has been entered) into an information system.

True

57
New cards

Some will refer to wisdom as an understanding of ...

… why.

58
New cards

In order to demonstrate that you are an authentic operator, your web site should use ...

  • ... non-repudiation.

  • ... RAID technology.

  • ... public key encryption.

  • ... self-signed digital certificates.

  • ... digital certificates signed by a certificate authority.

... digital certificates signed by a certificate authority.

59
New cards

True or false. To generate a decision tree, we need to convert numeric data into discretized or segmented groupings. For instance, we would not want to use age but instead categories of age like “youth”, “teen”, “young adult”, “adult”, “senior”.

True

60
New cards

Which of the following forms of secure communication protocol/software is used specifically for wireless communication? TLS, SSH, SSL, WPA2, HTTPS

WPA2

61
New cards

Which of the following forms of RAID is not used because the redundancy information is too time consuming to compute efficiently? 2, 0, 3, 1, 4

2

62
New cards

True or false. The Unix operating system has no security holes in it, unlike Windows.

False

63
New cards

Some organization are using biometrics in place of or in addition to passwords to support the idea of ...

… who you are.

64
New cards

The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup. measurable, timely, temporal, incremental, occasional

incremental

65
New cards

In OLAP, which of the following techniques allows you to move from a multi-dimensional view of the data to a single dimensional view of the data?

  • dicing

  • drilling down

  • pivoting

  • slicing

  • drilling up

slicing

66
New cards

In OLAP, which of the following techniques allows you to alter the perspective of the data records, for instance instead of focusing on yearly records, seeing the records broken down by products?

  • dicing

  • drilling down

  • pivoting

  • slicing

  • drilling up

pivoting

67
New cards

We should think of information as ...

  • ... interpreted data.

  • ... processed knowledge.

  • ... sorted data.

  • ... confidential data.

  • ... stored data.

… interpreted data.

68
New cards

An intranet LAN has which of the following properties?

  • All communication is encrypted.

  • The LAN uses IP to easily extend the network to the Internet.

  • All resources use wireless communication.

  • The network uses one-to-many network address translation.

  • The network uses no routers.

The LAN uses IP to easily extend the network to the Internet.

69
New cards

Of these RAID levels, which uses the smallest possible stripe sizes? 5, 1, 4, 3, 0

3

70
New cards

Projections, restrictions and joins collectively are forms of database ...

… queries.

71
New cards

Encryption supports ...

  • confidentiality

  • authenticity

  • integrity

  • availability

  • all of the above

confidentiality

72
New cards

The best way to protect the vulnerabilities of the human in IT is through ...

  • paying higher salaries

  • monitoring (such as camera)

  • strong passwords

  • training

  • ... access control

training

73
New cards

True or false. In rule association learning, a high frequency always means a useful rule.

False

74
New cards

RAID technology uses which of the following?

  • the Internet

  • encryption

  • cloud computing

  • hard disks

  • magnetic tape

hard disks

75
New cards

Which level of RAID provides redundancy in the form of a complete duplicate (mirror) of the data? 5, 0, 1, 6, 3

1

76
New cards

Of these forms of RAID, which one offers no redundancy at all?

  • 1

  • 0

  • 2

  • 3

  • none of these: they all offer redundancy.

0

77
New cards

What method is often used to determine closeness in clustering?

Euclidean distance formula

78
New cards

Which of the following is a form of protocol attack?

  • Phishing

  • TCP hijacking

  • Buffer overflow

  • They are all forms of protocol attacks.

  • SQL injection

TCP hijacking

79
New cards

True or false. A decision tree can be generated automatically from a database of records.

True

80
New cards

To support confidentiality of data stored in files, we might want to implement ...

  • All of the above.

  • ... physical security like guards and cameras.

  • ... access control (permissions).

  • ... redundancy.

  • ... backups.

... access control (permissions).

81
New cards

True or false. Law enforcement uses data mining to identify possible crime “hot spots” in their city to predict where future crimes might occur.

True

82
New cards

Why was Y2K an issue?

Early programmers used 2 digits to store the year.

83
New cards

A database projection returns _____ of a database relation.

  • specific fields of some records that match given criteria

  • all fields of some records that match given criteria

  • all fields of all records

  • None of the above: the projection modifies data, it does not return data.

  • specific fields of all records

specific fields of all records

84
New cards

database is commonly a collection of ...

  • ... relations.

  • ... data marts.

  • ... relationships.

  • ... fields.

  • ... records.

… relations.

85
New cards

Assume that we have 1000 store receipts and of those, we find 500 receipts include the purchase of beer. Of those 500, 400 indicate that the person also bought pretzels. The frequency of the rule “if someone buys beer they will also buy pretzels” is ...

80%

86
New cards

True or false. When generating goals of an organization, you might find that some goals contradict or conflict with other goals requiring that they be prioritized.

True

87
New cards

Which of the following encryption algorithms has been declared as insecure?

  • MD5

  • AES

  • SHA-1

  • None of the above: they are all secure forms.

  • DES

DES

88
New cards

The idea that collected data are correct and accurate is known as ...

  • availability

  • confidentiality

  • assurance

  • integrity

  • authenticity

integrity

89
New cards

Which of the following is not a threat that involves an individual in an organization but instead is a threat to the technology itself?

  • insider attack

  • protocol attack

  • phishing

  • They all involve individuals.

  • social engineering

protocol attack

90
New cards

When combining data from various databases into a data warehouse, which process might be required?

  • Data visualization

  • Data transformation

  • Data matching

  • Slicing

  • Data mining

Data transformation

91
New cards

True or false. As an IT person, you may be asked to write or help write organizational policies with respect to IT usage.

True

92
New cards

True or false. One learns as much with a 2-year technical degree as one does with a 4-year bachelor’s degree in IT.

False

93
New cards

Which of the following certifications would a system administrator pursue?

  • Novel CNA

  • MSCDA

  • CIW

  • Novel CNE

  • CCNA

Novel CNA

94
New cards

The lowest paying career in IT would probably fall on the ...

  • ... computer technician.

  • ... web administrator.

  • ... system administrator.

  • ... software engineer.

  • ... database administrator.

... computer technician.

95
New cards

Which of the following careers would benefit most from having a master’s degree?

  • Database administrator

  • Network administrator

  • Web administrator

  • IT Manager

  • System administrator

IT Manager

96
New cards

Of the various IT related professions, which one of the following is seeing jobs decline instead of grow?

  • database administrators

  • network administrators

  • computer programmers

  • software engineers

  • system administrators

computer programmers

97
New cards

True or false. Computer programmer and software engineering have the same roles and duties.

False

98
New cards

Which of the following is not a soft skill?

  • a good listener

  • ability to troubleshoot

  • ability to write

  • self-supervising

  • team player

ability to troubleshoot

99
New cards

True or false. It is the IT person’s responsibility to monitor employees of the organization with respect to their IT usage.

False

100
New cards

True or false. As an IT employee of an organization, you should expect your employer(s) to support your efforts in continuing education by paying for you to take classes or travel to conferences and trade shows.

True