1/99
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
Which of the following devices would transmit any message received on to all computers in its local area network?
router
gateway
switch
hub
repeater
repeater
The term used to describe the amount of data that can be transferred over a network over a unit of time, such as bits per second, is known as ...
... bandwidth
... multilexing
... routing
... modulation
... switching
... bandwidth
We can think of the Internet and the World Wide Web interchangeably.
True
False
False
Of the following network types (sizes or classifications), which is generally considered the smallest?
WAN
LAN
PAN
MAN
CAN
PAN
Last mile technology is used to express the idea that ...
... most cell phones still use 3G networks, limiting bandwidth.
... some households still use low bandwidth telephone lines to access the Internet.
... repeaters are needed in local area networks that extend beyond 1 mile.
... local area networks cannot extend beyond 1 mile in size.
... third-world countries do not have access to the Internet.
... some households still use low bandwidth telephone lines to access the Internet.
At which level of the OSI model are data units decomposed into packets?
Data link
Application
Physical
Transport
Network
Data link
Which of the following technologies differentiates a normal extranet from a virtual private network?
use of fiber optic cable
encryption
use of TCP/IP
multiplexing
use of routers instead of switches
encryption
Twisted wire pair is most commonly used in which of the following?
For wireless home networks
For wired home networks
In the public telephone network in the US
For cell phone networks
For cable tv
In the public telephone network in the US
A Class C network has how many IP addresses available for the network?
65,536
16,777,216
16
1024
256
256
A network port ...
... is the address of a network broadcast device.
... indicates the message's intended application software.
... is a number used to determine if a message should make it through a firewall.
... is part of the IP address.
... is the address of the connection (in the back of the computer) between the network card and the computer network.
... indicates the message's intended application software.
Which of the following network programs sends information in clear text and so is not secure?
ssh
telnet
ftp
All of the above except ssh
rlogin
All of the above except ssh
Which level of the OSI model performs routing?
Transport
Network
Session
Data link
Physical
Network
Which of the following terms is used to denote a computer you wish to access over a network?
Server
Gateway
Remote computer
Hub
Local computer
Remote computer
The ability of a network to carry multiple messages at the same time is known as ...
... multiprocessing.
... multiplexing.
... none of the above: this is not possible.
... multitasking.
... modulating.
... multiplexing.
In a 3-D nearest neighbor network, a computer would directly connect to how many neighbors?
all computers in the network
2
1
3
4
3
A jam signal is used in an Ethernet network to ...
... inform all computers on the network of a collision.
... cause the network to reboot.
... prevent intrusions by ignoring all incoming messages.
... alert computers of an incoming message to be sent to all computers.
... determine if a message is colliding with another.
... inform all computers on the network of a collision.
In a Linux system, the address(es) of your DNS servers will be stored in which file?
/etc/hosts.allow
/etc/hosts
/etc/hosts.equiv
/etc/hosts.conf
/etc/dns
/etc/hosts.conf
Mapping an external IP address into an internal IP address is known as ...
... demodulation.
... multiplexing.
... IP spoofing.
... network address translation.
... modulation.
... network address translation.
Which of the following network topologies is generally considered the cheapest?
star
full mesh
bus
tree
ring
bus
We view computer networks at a logical level while the operating system views the network at a physical level.
True
False
False
TCP/IP introduced which of the following communication ideas?
packet switching
collision detection
three-way network handshake
All of the above
checksum for error detection
three-way network handshake
As a network gets larger (has more computers connected to it), which of the following network topologies performance is most affected?
star
tree
full mesh
All are equally affected.
ring
ring
Switches use which of the following addresses to send a message to the proper device?
IPv6 addresses
telephone numbers
None of the above: a switch sends a copy of the message to every device connected to it.
MAC addresses
IP addresses
MAC addresses
To use the telephone network for computer communication, one must ...
... group packets together into bundles to be sent using multiplexing.
None of the above: it is not possible to use the telephone network for computer communication.
... convert the analog information stored in the computer into a digital form.
... compress the information.
... convert the digital information stored in the computer into an analog form.
... convert the analog information stored in the computer into a digital form.
Each layer of the OSI model adds header information onto the message except for the ...
... Network layer.
... Physical layer.
... Application layer.
... Session layer.
... Transport layer.
... Physical layer.
The full mesh network is seldom used because ...
... it a computer were to go down, it would disconnect portions of the network.
... it requires a great deal of additional supporting hardware such as routers.
... it requires a dedicated central server.
... it costs the most.
... it has the worst performance of all network topologies.
... it costs the most.
A network with a file server which services the local computers would be considered a(n) ...
... extranet.
... intranet.
... client-server network.
... personal area network.
... peer-to-peer network.
... client-server network.
SSL, the secure sockets layer, is an implementation of which level of the OSI model?
Application
Transport
Presentation
Session
Network
Presentation
In OSI, only header information is affixed at each layer but in TCP/IP, both header and footer information can be affixed.
True
False
True
Which level of the OSI model takes care of reliability?
Session
Application
Transport
Presentation
Data link
Transport
In a circuit switched network, the pathway between devices is established before communication commences and is retained for the duration of the communication.
True
False
True
The number of computers on the original ARPAnet was ...
2
about 1,000
4
13
about 1 million
4
IPv4 addresses are _____ bits long.
8
64
32
128
16
32
A checksum is used in network communication for which purpose?
Encryption
Addressing
Collision detection
Error checking
Network handshake
Error checking
In order to determine if another computer is available and accessible over your network, you might use which program to test it?
http
sendmail
ftp
ping
https
ping
TCP/IP's link layer is roughly equivalent to the OSI model's ...
... data link layer.
... physical and data link layers.
... physical, data link and network layers combined.
... physical layer.
... network layer.
... physical and data link layers.
The first message broadcast on the Internet, in its earliest incarnation, was in which year?
1946
1983
1996
1969
1973
1969
Morris' Internet worm was an attempt to ...
... weaken US defense by attacking the Internet.
... join the group Anonymous.
... demonstrate weaknesses in Unix security.
... demonstrate his knowledge in an attempt to get hired by a security company.
... damage the Internet so that he could avoid an assignment.
... demonstrate weaknesses in Unix security.
In which protocol can you use UDP type packets?
Neither TCP nor IP
TCP
IP
TCP
Which mathematical operation is used to obtain the checksum once the sum of the bits is computed?
multiplication
a combination of division and multiplication
modulo
division
shift
modulo
If a computer were to go off line in a network, which of the following topologies would most likely be impacted by this?
full mesh
ring
star
bus
All of the above would be equally impacted.
ring
Which of the following devices deals with IP addresses?
hub
router
switch
MODEM
fiber optic cable
router
In streaming audio and video, which of TCP and UDP would be preferred as it would trade off speed for assurance of arrival?
UDP
TCP
TCP
Which of the following services is used to map IP aliases to IP addresses?
firewall
ssh
ftp
dns
http
dns
Long distance communication (dozens, hundreds or thousands of miles) generally does not use which of the following?
cell towers
fiber optic cable
satellite communication
microwave communication
All of the above are used.
fiber optic cable
IPv4 offers approximately how many unique IP addresses?
4 billion
100 million
100 billion
1 million
4 million
4 billion
What noteworthy event happened to the APRANet in 1973?
Email was implemented.
This is the year it was first started.
Electronic bulletin boards were added.
The first international computer was added to the network.
TCP/IP was implemented for the ARPAnet.
The first international computer was added to the network.
The Internet uses packet switching while local area networks use circuit switching.
True
False
False
"T" connectors are used to join computers together in which type of network topology?
full mesh
ring
bus
tree
star
bus
An intranet LAN has which of the following properties?
The network uses no routers.
All resources use wireless communication.
The network uses one-to-many network address translation.
The LAN uses IP to easily extend the network to the Internet.
All communication is encrypted.
The LAN uses IP to easily extend the network to the Internet.
Data should not only be checked for accuracy as it is gathered but it should be checked for accuracy as it is entered (or after it has been entered) into an information system.
True
False
True
Data mining, as a process, is not very computationally intensive and so it is highly attractive even if it cannot guarantee finding any information that is useful.
True
False
False
Some will refer to wisdom as an understanding of ...
... why
... when
... how
... what
... where
... why
In OLAP, which of the following techniques allows you to alter the perspective of the data records, for instance instead of focusing on yearly records, seeing the records broken down by products?
slicing
pivoting
dicing
drilling up
drilling down
pivoting
A database is commonly a collection of ...
... relations
... fields
... relationships
... records
... data marts
... relations
Of these RAID levels, which uses the smallest possible stripe sizes?
1
5
0
3
4
3
Symmetric key encryption is also known as ...
... message digest encryption
... dual usage encryption
... private key encryption
... public key encryption
... wireless encryption
... private key encryption
Which of the following forms of secure communication protocol/software is used specifically for wireless communication?
WPA2
HTTPS
SSH
TLS
SSL
WPA2
Law enforcement uses data mining to identify possible crime "hot spots" in their city to predict where future crimes might occur.
True
False
True
A company may draw upon multiple sources to build their data warehouse. Which of the following would not be one of those sources?
Project reports
Marketing reports
Sales records
Enterprise resource planning systems
All of the above are possible sources
All of the above are possible sources
A decision tree can be generated automatically from a database of records.
True
False
True
Which of the following is not a threat that involves an individual in an organization but instead is a threat to the technology itself?
They all involve individuals
phishing
social engineering
insider attack
protocol attack
protocol attack
In rule association learning, a high frequency always means a useful rule.
True
False
False
The goal of availability often can conflict with the goals of confidentiality and integrity.
True
False
True
An intranet LAN has which of the following properties?
All communication is encrypted
The network uses no routers
The network uses one-to-many network address translation
The LAN uses IP to easily extend the network to the Internet
All resources use wireless communication
The LAN uses IP to easily extend the network to the Internet
Which level of RAID provides redundancy in the form of a complete duplicate (mirror) of the data?
1
0
3
6
5
1
Encryption supports ...
... confidentiality
... integrity
... authenticity
All of the above
... availability
... confidentiality
We should think of information as ...
... confidential data
... interpreted data
... sorted data
... processed knowledge
... stored data
... interpreted data
To support confidentiality of data stored in files, we might want to implement ...
... physical security like guards and cameras
... backups
... access control (permissions)
... redundancy
All of the above
... access control (permissions)
In OLAP, which of the following techniques allows you to move from a multi-dimensional view of the data to a single dimensional view of the data?
slicing
drilling up
dicing
drilling down
pivoting
slicing
Assume that we have 1000 store receipts and of those, we find 500 receipts include the purchase of beer. Of those 500, 400 indicate that the person also bought pretzels. The frequency of the rule "if someone buys beer they will also buy pretzels" is ...
There is no way to compute this
50%
80%
90%
100%
80%
Of these forms of RAID, which one offers no redundancy at all?
None of these: they all offer redundancy
1
0
3
2
0
The Unix operating system has no security holes in it, unlike Windows.
True
False
False
When combining data from various databases into a data warehouse, which process might be required?
Data mining
Slicing
Data matching
Data transformation
Data visualization
Data transformation
A database projection returns _____ of a database relation.
specific fields of some records that match given criteria
all fields of some records that match given criteria
None of the above: the projection modifies data, it does not return data
specific fields of all records
all fields of all records
specific fields of all records
Which of the following encryption algorithms has been declared as insecure?
None of the above: they are all secure forms
DES
SHA-1
MD5
AES
DES
In order to demonstrate that you are an authentic operator, your web site should use ...
... non-repudiation
... self-signed digital certificates
... RAID technology
... public key encryption
... digital certificates signed by a certificate authority
... digital certificates signed by a certificate authority
To generate a decision tree, we need to convert numeric data into discretized or segmented groupings. For instance, we would not want to use age but instead categories of age like "youth", "teen", "young adult", "adult", "senior".
True
False
True
Which of the following is a form of protocol attack?
They are all forms of protocol attacks
Phishing
SQL injection
TCP hijacking
Buffer overflow
TCP hijacking
Some organization are using biometrics in place of or in addition to passwords to support the idea of ...
All of the above
... where you are
... who you are
... what you can do
... what you know
... who you are.
Which of the following forms of RAID is not used because the redundancy information is too time consuming to compute efficiently?
0
3
2
4
1
2
The best way to protect the vulnerabilities of the human in IT is through ...
... access control
strong passwords
paying higher salaries
training
monitoring (such as camera)
training
The idea of only backing up files that have changed since the last backup is known as a(n) ____ backup.
timely
occasional
temporal
measurable
incremental
incremental
Projections, restrictions and joins collectively are forms of database ...
... unions
... intersections
... queries
... updates
... inserts
... queries
RAID technology uses which of the following?
encryption
the Internet
cloud computing
magnetic tape
hard disks
hard disks
When generating goals of an organization, you might find that some goals contradict or conflict with other goals requiring that they be prioritized.
True
False
True
Why was Y2K an issue?
Early programmers used 2 digits to store the year
A computer virus was unleashed on January 1, 2000
It was predicted by the Mayan calendar
Early programmers did not test their code
Early programmers used GO TO statements in their code
Early programmers used 2 digits to store the year
The idea that collected data are correct and accurate is known as ...
... integrity
... availability
... assurance
... confidentiality
... authenticity
... integrity
All information systems are stored on computer.
True
False
False
What method is often used to determine closeness in clustering?
Euclidean distance formula
rule association
pivoting
computing averages of all of the fields
encryption
Euclidean distance formula
The web administrator and the web developer have the same roles and duties.
True
False
False
Which of the following certifications would a system administrator pursue?
CCNA
CIW
Novel CNE
MSCDA
Novel CNA
Novel CNA
It is the IT person's responsibility to ensure that all employees of the organization act ethically when using computers.
True
False
False
Which of the following IT roles would most likely work at the help desk?
Computer programmer
Web administrator
Network administrator
Computer support specialist
Computer technician
Computer support specialist
Which of the following careers would require knowledge of criminal justice?
IT manager
computer forensics
computer technician
system administrator
software engineer
computer forensics
Which of these IT roles would most need knowledge of VoIP and trunking protocols?
Web administrator
System administrator
Network administrator
Software engineer
Database administrator
Network administrator
Which of the following terms applies to the idea that the company ensures the integrity of their collected data and the computer systems?
privacy
ownership
control
accuracy
security
security
Which of these IT roles would be in charge of securing a computer network?
System administrator
Web administrator
Network administrator
All of the above would have this role
Network architect
Network administrator
Computer programmer and software engineering have the same roles and duties.
True
False
False
Someone in information systems (IS) would learn which of the following skills that differ from most other IT areas?
business practices
scripting/programming
computer hardware
operating systems
None of the above: the IS person learns the same things that other IT areas learn.
business practices