Business Data Networks and Security, 11e (Panko). > Chapter 1 Core Network Concepts and Terminology>latest>Graded A+

Business Data Networks and Security, 11e (Panko).

Chapter 1 Core Network Concepts and Terminology.

Attempt Score:100%

1) Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack.

A) hacking

B) virus

C) malware

D) DoS

Answer: D

Difficulty: Basic

Question: 1a

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology

2) The KrebsOnSecurity.com attack ________.

A) was a denial of service attack.

B) used IoT devices to attack the site

C) both A and B

D) neither A nor B

Answer: C

Difficulty: Basic

Question: 1b

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology, Analytical Thinking

3) Internet communication that does not involve a human is referred to with the term ________.

A) World Wide Web

B) impersonal

C) anonymous

D) IoT

Answer: D

Difficulty: Difficult

Question: 1c

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology, Analytical Thinking

1

Copyright © 2019 Pearson Education, Inc.

 1 / 3

4) If a host cannot reach a DNS server, it ________.

A) cannot have a host name

B) will have to rely on host names

C) will need to use a DHCP server

D) is unlikely to be able to communicate with most server hosts

Answer: D

Difficulty: Difficult

Question: 1d

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology, Analytical Thinking

5) The Mirai bots in the KrebsOnSecurity.com attack were ________.

A) client hosts

B) server hosts

C) IoT devices

D) all of the above

Answer: C

Difficulty: Basic

Question: 1e

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology

6) ISPs ________.

A) carry traffic in the Internet

B) connect users to the Internet

C) both A and B

D) neither A nor B

Answer: C

Difficulty: Basic

Question: 3a

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology, Analytical Thinking

2

Copyright © 2019 Pearson Education, Inc.

 2 / 3

7) A packet sent from one host to another over the Internet will ALWAYS pass through

________.

A) a single ISP

B) more than 2 ISPs

C) exactly 2 ISPs

D) none of the above

Answer: D

Difficulty: Difficult

Question: 3c

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge

8) We call any device connected to the Internet a(n) ________.

A) IP

B) client

C) router

D) host

Answer: D

Difficulty: Basic

Question: 4a

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology

9) Which of the following is a host when it's on a network?

A) a client PC

B) a server

C) a mobile phone

D) all of the above

Answer: D

Difficulty: Basic

Question: 4b

Objective: Discuss how the Internet is changing and the security challenges these changes are

creating.

AACSB: Applying Information Technology

3

Copyright © 2019 Pearson Education, Inc.

Powered by qwivy(www.qwivy.org)

 3 / 3

No comments found.
Login to post a comment
This item has not received any review yet.
Login to review this item
No Questions / Answers added yet.
Version 2021
Category Exam (elaborations)
Pages 6
Language English
Comments 0
Sales 0
Recently viewed items

We use cookies to understand how you use our website and to improve your experience. This includes personalizing content and advertising. To learn more, please click Here. By continuing to use our website, you accept our use of cookies, Privacy policy and terms & conditions.

Processing