1/113
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
In order to determine if another computer is available and accessible over your network, you might use which program to test it?
ping
Which network topology is generally considered the cheapest?
bus
Which service is used to map IP aliases to IP addresses?
DNS
Switches use which type of addresses to send a message to the proper device?
MAC addresses
The ability of a network to carry multiple messages at the same time is known as…
multiplexing
Which technology differentiates a normal extranet from a virtual private network?
encryption
The term used to describe the amount of data that can be transferred of a network over a unit of time, such as bits per second, is known as…
bandwidth
A network port…
…indicates the message’s intended application software.
In streaming audio and video, would TCP or UDP be preferred to trade off speed for assurance of arrival?
TCP
“T” connectors are used to join computers together in which network topology?
bus
Last mile technology is used to express the idea that…
…some households still use low-bandwidth telephone lines to access the Internet.
At which layer of the OSI model are data units decomposed into packets?
data link layer
If a computer were to go offline in a network, which topology would most likely be impacted by this?
ring
A jam signal is used in an Ethernet network to…
…inform all computers on the network of a collision.
IPv4 offers approximately how many unique IP addresses?
4 billion
Long-distance communication (dozens, hundreds or thousands of miles) generally does not use what?
fiber optic cable
A network with a file server which services the local computers would be considered a(n) ...
client-server network
Which layer of the OSI model takes care of reliability?
transport layer
In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors?
3
True or False: We can think of the Internet and the World Wide Web interchangeably.
False
True or False: We view computer networks at a logical level while the operating system views the network at a physical level.
False
Which layer of the OSI model performs routing?
network layer
What term is used to denote a computer you wish to access over a network?
remote computer
In which protocol can you use UDP type packets?
TCP
What mathematical operation is used to obtain the checksum once the sum of the bits is computed?
modulo
As a network gets larger (has more computers connected to it), which network topology performance is most affected?
ring
An intranet LAN has what property?
LAN uses IP to easily extend the network to the Internet.
True or False: In a circuit-switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication.
True
Mapping an external IP address into an internal IP address is known as ...
network address translation
What device deals with IP addresses?
router
What device would transmit any message received on to all computers in its local area network?
repeater
A checksum is used in network communication for what purpose?
error-checking
Each layer of the OSI model adds header information onto the message, except for the ...
physical layer
The full mesh network is seldom used because ...
…it costs the most.
Morris’ Internet worm was an attempt to ...
…demonstrate weaknesses in Unix security.
TCP/IP introduced what communication idea?
three-way network handshake
True or False: In OSI, only header information is affixed at each layer but in TCP/IP, both header and footer information can be affixed.
True
To use the telephone network for computer communication, one must ...
... convert the analog information stored in the computer into a digital form.
A Class C network has how many IP addresses available for the network?
256
The first message broadcast on the Internet, in its earliest incarnation, was in which year?
1969
Twisted wire pair is most commonly used in what?
The public telephone network in the US
In a Linux system, the address(es) of your DNS servers will be stored in which file?
/etc/hosts.conf
Which network type (sizes or classifications) is generally considered the smallest?
PAN
Which network programs send information in clear text and so are not secure?
rlogin, telnet, ftp, not ssh
IPv4 addresses are ____ bits long.
32
True or False: The Internet uses packet switching while local area networks use circuit switching.
False
What noteworthy event happened to the ARPANet in 1973?
The first international computer was added to the network.
How many computers were on the original ARPAnet?
4
TCP/IP’s link layer is roughly equivalent to the OSI model’s ...
physical and data link layers
SSL, the secure sockets layer, is an implementation of which layer of the OSI model?
presentation layer
A database is commonly a collection of…
relations
True or False: Data should not only be checked for accuracy as it is gathered but it should be checked for accuracy as it is entered (or after it has been entered) into an information system.
True
Symmetric key encryption is also known as ...
private key encryption
A company may draw upon multiple sources to build their data warehouse. What are some possible sources?
- Enterprise resource planning systems
- Marketing reports
- Project reports
- Sales records
What method is often used to determine closeness in clustering?
Euclidean distance formula
True or False: The goal of availability can often conflict with the goals of confidentiality and integrity.
True
Some will refer to wisdom as an understanding of…
…why.
When combining data from various databases into a data warehouse, what process might be required?
data transformation
What is not a threat that involves an individual in an organization but instead is a threat to the technology itself?
protocol attack
True or False: In rule association learning, a high frequency always means a useful rule.
False
In OLAP, what technique allows you to move from a multi-dimensional view of the data to a single dimensional view of the data?
slicing
RAID technology uses what?
hard disks
Of these RAID levels, which uses the smallest possible stripe sizes?
RAID 3
Projections, restrictions and joins collectively are forms of database ...
queries
Why was Y2K an issue?
Early programmers used 2 digits to store the year.
True or False: All information systems are stored on computer.
False
True or False: The Unix operating system has no security holes in it, unlike Windows.
False
The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup.
incremental
What is a form of protocol attack?
TCP hijacking
True or False: Law enforcement uses data mining to identify possible crime “hot spots” in their city to predict where future crimes might occur.
True
The idea that collected data are correct and accurate is known as ...
integrity
Which level of RAID provides redundancy in the form of a complete duplicate (mirror) of the data?
RAID 1
A database projection returns _____ of a database relation.
specific fields of all records
True or False: A decision tree can be generated automatically from a database of records.
True
What form of RAID is not used because the redundancy information is too time consuming to compute efficiently?
RAID 2
True or False: To generate a decision tree, we need to convert numeric data into discretized or segmented groupings. For instance, we would not want to use age but instead categories of age like “youth”, “teen”, “young adult”, “adult”, “senior”.
True
We should think of information as…
interpreted data
True or False: Data mining, as a process, is not very computationally intensive and so it is highly attractive even if it cannot guarantee finding any information that is useful.
False
What form of secure communication protocol/software is used specifically for wireless communication?
WPA2
Which form of RAID offers no redundancy at all?
RAID 0
In OLAP, what technique allows you to alter the perspective of the data records, for instance instead of focusing on yearly records, seeing the records broken down by products?
pivoting
Some organization are using biometrics in place of or in addition to passwords to support the idea of…
…who you are.
The best way to protect the vulnerabilities of the human in IT is through…
training
True or False: When generating goals of an organization, you might find that some goals contradict or conflict with other goals, requiring that they be prioritized.
True
Assume that we have 1000 store receipts and of those, we find 500 receipts include the purchase of beer. Of those 500, 400 indicate that the person also bought pretzels. The frequency of the rule “if someone buys beer they will also buy pretzels” is…
80%
In order to demonstrate that you are an authentic operator, your website should use…
…digital certificates signed by a certificate authority.
Encryption supports…
confidentiality
What encryption algorithm has been declared as insecure?
DES
To support confidentiality of data stored in files, we might want to implement…
access control (permissions)
What IT role would most need knowledge of such software as MySQL and Oracle?
Database administrator
What IT role would most need knowledge of VoIP and trunking protocols?
Network administrator
Of the various IT related professions, which is seeing jobs decline instead of grow?
Computer programmer
True or False: Most IT people will stay abreast to changes in the IT field by reading technical journals published by such organizations as ACM and IEEE.
False
True or False: Computer programmer and software engineering have the same roles and duties.
False
Which is not part of the 10 Commandments of computer ethics?
Thou shalt not use work computers for personal purposes.
What career would benefit most from having a master’s degree?
IT manager
What IT role would be in charge of securing a computer network?
Network administrator
What career would require knowledge of criminal justice?
Computer forensics
What is not an example of a soft skill?
ability to troubleshoot
True or False: As an IT employee of an organization, you should expect your employer(s) to support your efforts in continuing education by paying for you to take classes or travel to conferences and trade shows.
True