IT Fundamentals 6-7-8

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/99

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

100 Terms

1
New cards

Which of the following devices would transmit any message received on to all computers in its local area network?

router

gateway

switch

hub

repeater

repeater

2
New cards

The term used to describe the amount of data that can be transferred over a network over a unit of time, such as bits per second, is known as ...

... bandwidth

... multilexing

... routing

... modulation

... switching

... bandwidth

3
New cards

We can think of the Internet and the World Wide Web interchangeably.

True

False

False

4
New cards

Of the following network types (sizes or classifications), which is generally considered the smallest?

WAN

LAN

PAN

MAN

CAN

PAN

5
New cards

Last mile technology is used to express the idea that ...

... most cell phones still use 3G networks, limiting bandwidth.

... some households still use low bandwidth telephone lines to access the Internet.

... repeaters are needed in local area networks that extend beyond 1 mile.

... local area networks cannot extend beyond 1 mile in size.

... third-world countries do not have access to the Internet.

... some households still use low bandwidth telephone lines to access the Internet.

6
New cards

At which level of the OSI model are data units decomposed into packets?

Data link

Application

Physical

Transport

Network

Data link

7
New cards

Which of the following technologies differentiates a normal extranet from a virtual private network?

use of fiber optic cable

encryption

use of TCP/IP

multiplexing

use of routers instead of switches

encryption

8
New cards

Twisted wire pair is most commonly used in which of the following?

For wireless home networks

For wired home networks

In the public telephone network in the US

For cell phone networks

For cable tv

In the public telephone network in the US

9
New cards

A Class C network has how many IP addresses available for the network?

65,536

16,777,216

16

1024

256

256

10
New cards

A network port ...

... is the address of a network broadcast device.

... indicates the message's intended application software.

... is a number used to determine if a message should make it through a firewall.

... is part of the IP address.

... is the address of the connection (in the back of the computer) between the network card and the computer network.

... indicates the message's intended application software.

11
New cards

Which of the following network programs sends information in clear text and so is not secure?

ssh

telnet

ftp

All of the above except ssh

rlogin

All of the above except ssh

12
New cards

Which level of the OSI model performs routing?

Transport

Network

Session

Data link

Physical

Network

13
New cards

Which of the following terms is used to denote a computer you wish to access over a network?

Server

Gateway

Remote computer

Hub

Local computer

Remote computer

14
New cards

The ability of a network to carry multiple messages at the same time is known as ...

... multiprocessing.

... multiplexing.

... none of the above: this is not possible.

... multitasking.

... modulating.

... multiplexing.

15
New cards

In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors?

all computers in the network

2

1

3

4

3

16
New cards

A jam signal is used in an Ethernet network to ...

... inform all computers on the network of a collision.

... cause the network to reboot.

... prevent intrusions by ignoring all incoming messages.

... alert computers of an incoming message to be sent to all computers.

... determine if a message is colliding with another.

... inform all computers on the network of a collision.

17
New cards

In a Linux system, the address(es) of your DNS servers will be stored in which file?

/etc/hosts.allow

/etc/hosts

/etc/hosts.equiv

/etc/hosts.conf

/etc/dns

/etc/hosts.conf

18
New cards

Mapping an external IP address into an internal IP address is known as ...

... demodulation.

... multiplexing.

... IP spoofing.

... network address translation.

... modulation.

... network address translation.

19
New cards

Which of the following network topologies is generally considered the cheapest?

star

full mesh

bus

tree

ring

bus

20
New cards

We view computer networks at a logical level while the operating system views the network at a physical level.

True

False

False

21
New cards

TCP/IP introduced which of the following communication ideas?

packet switching

collision detection

three-way network handshake

All of the above

checksum for error detection

three-way network handshake

22
New cards

As a network gets larger (has more computers connected to it), which of the following network topologies performance is most affected?

star

tree

full mesh

All are equally affected.

ring

ring

23
New cards

Switches use which of the following addresses to send a message to the proper device?

IPv6 addresses

telephone numbers

None of the above: a switch sends a copy of the message to every device connected to it.

MAC addresses

IP addresses

MAC addresses

24
New cards

To use the telephone network for computer communication, one must ...

... group packets together into bundles to be sent using multiplexing.

None of the above: it is not possible to use the telephone network for computer communication.

... convert the analog information stored in the computer into a digital form.

... compress the information.

... convert the digital information stored in the computer into an analog form.

... convert the analog information stored in the computer into a digital form.

25
New cards

Each layer of the OSI model adds header information onto the message except for the ...

... Network layer.

... Physical layer.

... Application layer.

... Session layer.

... Transport layer.

... Physical layer.

26
New cards

The full mesh network is seldom used because ...

... it a computer were to go down, it would disconnect portions of the network.

... it requires a great deal of additional supporting hardware such as routers.

... it requires a dedicated central server.

... it costs the most.

... it has the worst performance of all network topologies.

... it costs the most.

27
New cards

A network with a file server which services the local computers would be considered a(n) ...

... extranet.

... intranet.

... client-server network.

... personal area network.

... peer-to-peer network.

... client-server network.

28
New cards

SSL, the secure sockets layer, is an implementation of which level of the OSI model?

Application

Transport

Presentation

Session

Network

Presentation

29
New cards

In OSI, only header information is affixed at each layer but in TCP/IP, both header and footer information can be affixed.

True

False

True

30
New cards

Which level of the OSI model takes care of reliability?

Session

Application

Transport

Presentation

Data link

Transport

31
New cards

In a circuit switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication.

True

False

True

32
New cards

The number of computers on the original ARPAnet was ...

2

about 1,000

4

13

about 1 million

4

33
New cards

IPv4 addresses are _____ bits long.

8

64

32

128

16

32

34
New cards

A checksum is used in network communication for which purpose?

Encryption

Addressing

Collision detection

Error checking

Network handshake

Error checking

35
New cards

In order to determine if another computer is available and accessible over your network, you might use which program to test it?

http

sendmail

ftp

ping

https

ping

36
New cards

TCP/IP's link layer is roughly equivalent to the OSI model's ...

... data link layer.

... physical and data link layers.

... physical, data link and network layers combined.

... physical layer.

... network layer.

... physical and data link layers.

37
New cards

The first message broadcast on the Internet, in its earliest incarnation, was in which year?

1946

1983

1996

1969

1973

1969

38
New cards

Morris' Internet worm was an attempt to ...

... weaken US defense by attacking the Internet.

... join the group Anonymous.

... demonstrate weaknesses in Unix security.

... demonstrate his knowledge in an attempt to get hired by a security company.

... damage the Internet so that he could avoid an assignment.

... demonstrate weaknesses in Unix security.

39
New cards

In which protocol can you use UDP type packets?

Neither TCP nor IP

TCP

IP

TCP

40
New cards

Which mathematical operation is used to obtain the checksum once the sum of the bits is computed?

multiplication

a combination of division and multiplication

modulo

division

shift

modulo

41
New cards

If a computer were to go off line in a network, which of the following topologies would most likely be impacted by this?

full mesh

ring

star

bus

All of the above would be equally impacted.

ring

42
New cards

Which of the following devices deals with IP addresses?

hub

router

switch

MODEM

fiber optic cable

router

43
New cards

In streaming audio and video, which of TCP and UDP would be preferred as it would trade off speed for assurance of arrival?

UDP

TCP

TCP

44
New cards

Which of the following services is used to map IP aliases to IP addresses?

firewall

ssh

ftp

dns

http

dns

45
New cards

Long distance communication (dozens, hundreds or thousands of miles) generally does not use which of the following?

cell towers

fiber optic cable

satellite communication

microwave communication

All of the above are used.

fiber optic cable

46
New cards

IPv4 offers approximately how many unique IP addresses?

4 billion

100 million

100 billion

1 million

4 million

4 billion

47
New cards

What noteworthy event happened to the APRANet in 1973?

Email was implemented.

This is the year it was first started.

Electronic bulletin boards were added.

The first international computer was added to the network.

TCP/IP was implemented for the ARPAnet.

The first international computer was added to the network.

48
New cards

The Internet uses packet switching while local area networks use circuit switching.

True

False

False

49
New cards

"T" connectors are used to join computers together in which type of network topology?

full mesh

ring

bus

tree

star

bus

50
New cards

An intranet LAN has which of the following properties?

The network uses no routers.

All resources use wireless communication.

The network uses one-to-many network address translation.

The LAN uses IP to easily extend the network to the Internet.

All communication is encrypted.

The LAN uses IP to easily extend the network to the Internet.

51
New cards

Data should not only be checked for accuracy as it is gathered but it should be checked for accuracy as it is entered (or after it has been entered) into an information system.

True

False

True

52
New cards

Data mining, as a process, is not very computationally intensive and so it is highly attractive even if it cannot guarantee finding any information that is useful.

True

False

False

53
New cards

Some will refer to wisdom as an understanding of ...

... why

... when

... how

... what

... where

... why

54
New cards

In OLAP, which of the following techniques allows you to alter the perspective of the data records, for instance instead of focusing on yearly records, seeing the records broken down by products?

slicing

pivoting

dicing

drilling up

drilling down

pivoting

55
New cards

A database is commonly a collection of ...

... relations

... fields

... relationships

... records

... data marts

... relations

56
New cards

Of these RAID levels, which uses the smallest possible stripe sizes?

1

5

0

3

4

3

57
New cards

Symmetric key encryption is also known as ...

... message digest encryption

... dual usage encryption

... private key encryption

... public key encryption

... wireless encryption

... private key encryption

58
New cards

Which of the following forms of secure communication protocol/software is used specifically for wireless communication?

WPA2

HTTPS

SSH

TLS

SSL

WPA2

59
New cards

Law enforcement uses data mining to identify possible crime "hot spots" in their city to predict where future crimes might occur.

True

False

True

60
New cards

A company may draw upon multiple sources to build their data warehouse. Which of the following would not be one of those sources?

Project reports

Marketing reports

Sales records

Enterprise resource planning systems

All of the above are possible sources

All of the above are possible sources

61
New cards

A decision tree can be generated automatically from a database of records.

True

False

True

62
New cards

Which of the following is not a threat that involves an individual in an organization but instead is a threat to the technology itself?

They all involve individuals

phishing

social engineering

insider attack

protocol attack

protocol attack

63
New cards

In rule association learning, a high frequency always means a useful rule.

True

False

False

64
New cards

The goal of availability often can conflict with the goals of confidentiality and integrity.

True

False

True

65
New cards

An intranet LAN has which of the following properties?

All communication is encrypted

The network uses no routers

The network uses one-to-many network address translation

The LAN uses IP to easily extend the network to the Internet

All resources use wireless communication

The LAN uses IP to easily extend the network to the Internet

66
New cards

Which level of RAID provides redundancy in the form of a complete duplicate (mirror) of the data?

1

0

3

6

5

1

67
New cards

Encryption supports ...

... confidentiality

... integrity

... authenticity

All of the above

... availability

... confidentiality

68
New cards

We should think of information as ...

... confidential data

... interpreted data

... sorted data

... processed knowledge

... stored data

... interpreted data

69
New cards

To support confidentiality of data stored in files, we might want to implement ...

... physical security like guards and cameras

... backups

... access control (permissions)

... redundancy

All of the above

... access control (permissions)

70
New cards

In OLAP, which of the following techniques allows you to move from a multi-dimensional view of the data to a single dimensional view of the data?

slicing

drilling up

dicing

drilling down

pivoting

slicing

71
New cards

Assume that we have 1000 store receipts and of those, we find 500 receipts include the purchase of beer. Of those 500, 400 indicate that the person also bought pretzels. The frequency of the rule "if someone buys beer they will also buy pretzels" is ...

There is no way to compute this

50%

80%

90%

100%

80%

72
New cards

Of these forms of RAID, which one offers no redundancy at all?

None of these: they all offer redundancy

1

0

3

2

0

73
New cards

The Unix operating system has no security holes in it, unlike Windows.

True

False

False

74
New cards

When combining data from various databases into a data warehouse, which process might be required?

Data mining

Slicing

Data matching

Data transformation

Data visualization

Data transformation

75
New cards

A database projection returns _____ of a database relation.

specific fields of some records that match given criteria

all fields of some records that match given criteria

None of the above: the projection modifies data, it does not return data

specific fields of all records

all fields of all records

specific fields of all records

76
New cards

Which of the following encryption algorithms has been declared as insecure?

None of the above: they are all secure forms

DES

SHA-1

MD5

AES

DES

77
New cards

In order to demonstrate that you are an authentic operator, your web site should use ...

... non-repudiation

... self-signed digital certificates

... RAID technology

... public key encryption

... digital certificates signed by a certificate authority

... digital certificates signed by a certificate authority

78
New cards

To generate a decision tree, we need to convert numeric data into discretized or segmented groupings. For instance, we would not want to use age but instead categories of age like "youth", "teen", "young adult", "adult", "senior".

True

False

True

79
New cards

Which of the following is a form of protocol attack?

They are all forms of protocol attacks

Phishing

SQL injection

TCP hijacking

Buffer overflow

TCP hijacking

80
New cards

Some organization are using biometrics in place of or in addition to passwords to support the idea of ...

All of the above

... where you are

... who you are

... what you can do

... what you know

... who you are.

81
New cards

Which of the following forms of RAID is not used because the redundancy information is too time consuming to compute efficiently?

0

3

2

4

1

2

82
New cards

The best way to protect the vulnerabilities of the human in IT is through ...

... access control

strong passwords

paying higher salaries

training

monitoring (such as camera)

training

83
New cards

The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup.

timely

occasional

temporal

measurable

incremental

incremental

84
New cards

Projections, restrictions and joins collectively are forms of database ...

... unions

... intersections

... queries

... updates

... inserts

... queries

85
New cards

RAID technology uses which of the following?

encryption

the Internet

cloud computing

magnetic tape

hard disks

hard disks

86
New cards

When generating goals of an organization, you might find that some goals contradict or conflict with other goals requiring that they be prioritized.

True

False

True

87
New cards

Why was Y2K an issue?

Early programmers used 2 digits to store the year

A computer virus was unleashed on January 1, 2000

It was predicted by the Mayan calendar

Early programmers did not test their code

Early programmers used GO TO statements in their code

Early programmers used 2 digits to store the year

88
New cards

The idea that collected data are correct and accurate is known as ...

... integrity

... availability

... assurance

... confidentiality

... authenticity

... integrity

89
New cards

All information systems are stored on computer.

True

False

False

90
New cards

What method is often used to determine closeness in clustering?

Euclidean distance formula

rule association

pivoting

computing averages of all of the fields

encryption

Euclidean distance formula

91
New cards

The web administrator and the web developer have the same roles and duties.

True

False

False

92
New cards

Which of the following certifications would a system administrator pursue?

CCNA

CIW

Novel CNE

MSCDA

Novel CNA

Novel CNA

93
New cards

It is the IT person's responsibility to ensure that all employees of the organization act ethically when using computers.

True

False

False

94
New cards

Which of the following IT roles would most likely work at the help desk?

Computer programmer

Web administrator

Network administrator

Computer support specialist

Computer technician

Computer support specialist

95
New cards

Which of the following careers would require knowledge of criminal justice?

IT manager

computer forensics

computer technician

system administrator

software engineer

computer forensics

96
New cards

Which of these IT roles would most need knowledge of VoIP and trunking protocols?

Web administrator

System administrator

Network administrator

Software engineer

Database administrator

Network administrator

97
New cards

Which of the following terms applies to the idea that the company ensures the integrity of their collected data and the computer systems?

privacy

ownership

control

accuracy

security

security

98
New cards

Which of these IT roles would be in charge of securing a computer network?

System administrator

Web administrator

Network administrator

All of the above would have this role

Network architect

Network administrator

99
New cards

Computer programmer and software engineering have the same roles and duties.

True

False

False

100
New cards

Someone in information systems (IS) would learn which of the following skills that differ from most other IT areas?

business practices

scripting/programming

computer hardware

operating systems

None of the above: the IS person learns the same things that other IT areas learn.

business practices