Business Data Networks and Security, 11e (Panko).
Chapter 1 Core Network Concepts and Terminology.
Attempt Score:100%
1) Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack.
A) hacking
B) virus
C) malware
D) DoS
Answer: D
Difficulty: Basic
Question: 1a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
2) The KrebsOnSecurity.com attack ________.
A) was a denial of service attack.
B) used IoT devices to attack the site
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 1b
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
3) Internet communication that does not involve a human is referred to with the term ________.
A) World Wide Web
B) impersonal
C) anonymous
D) IoT
Answer: D
Difficulty: Difficult
Question: 1c
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
1
Copyright © 2019 Pearson Education, Inc.
1 / 3
4) If a host cannot reach a DNS server, it ________.
A) cannot have a host name
B) will have to rely on host names
C) will need to use a DHCP server
D) is unlikely to be able to communicate with most server hosts
Answer: D
Difficulty: Difficult
Question: 1d
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
5) The Mirai bots in the KrebsOnSecurity.com attack were ________.
A) client hosts
B) server hosts
C) IoT devices
D) all of the above
Answer: C
Difficulty: Basic
Question: 1e
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
6) ISPs ________.
A) carry traffic in the Internet
B) connect users to the Internet
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 3a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
2
Copyright © 2019 Pearson Education, Inc.
2 / 3
7) A packet sent from one host to another over the Internet will ALWAYS pass through
________.
A) a single ISP
B) more than 2 ISPs
C) exactly 2 ISPs
D) none of the above
Answer: D
Difficulty: Difficult
Question: 3c
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
8) We call any device connected to the Internet a(n) ________.
A) IP
B) client
C) router
D) host
Answer: D
Difficulty: Basic
Question: 4a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
9) Which of the following is a host when it's on a network?
A) a client PC
B) a server
C) a mobile phone
D) all of the above
Answer: D
Difficulty: Basic
Question: 4b
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
3
Copyright © 2019 Pearson Education, Inc.
Powered by qwivy(www.qwivy.org)
3 / 3
Version | 2021 |
Category | Exam (elaborations) |
Pages | 6 |
Language | English |
Comments | 0 |
Sales | 0 |
{{ userMessage }}