AP CSP Chapter 15, 16, & 17 Study Guide

¡Supera tus tareas y exámenes ahora con Quizwiz!

The Internet _________ refers to a set of high-capacity, high-speed networks that carry Internet traffic, provided by various companies such as AT&T and Verizon.

Backbone

Which of the following describes a set of high-speed networks on the Internet, sponsored by companies such as AT&T and Verizon?

Backbone

Data transfer rate is also referred to as _________.

Bandwidth

Which of the following terms is synonymous with the term data transfer rate?

Bandwidth

The word _________ was declared the word of the year by the Merriam-Webster Dictionary in 2004.

Blog

In an HTML document, the information to be displayed is put in the _________ section of the document.

Body

Both DSL and cable connections are called _________ connections, indicating data transfer speeds greater than 128K bits per second.

Broadband

A Web _________ retrieves and displays Web pages

Browser

A LAN using a(n) _________ topology connects all nodes to a single communication line that carries messages in both directions.

Bus

In which of the following LAN configurations do all nodes share a single communication line that carries messages in both directions?

Bus Topology

Which of the following are NOT user authentication credentials?

CAPTCHA phrases

Which of the following is used to ensure that information provided through a web form has been filled in by a person?

CAPTCHA software

A(n) _________ is a small text file that a Web server stores on your local computer's hard disk.

Cookie

Which of the following is a text file used to store a small amount of information on your computer regarding your Web activities?

Cookie

Which of the following is accurate about cookies?

Cookies can be used to implement shopping carts that can be maintained from visit to visit.

Which of the following is NOT part of information security risk analysis?

Countermeasures.

A(n) _________ uses regular copper phone lines to transfer data digitally using different frequencies than voice communications.

DSL(digital subscriber line)

Which of the following would correspond to an organization, such as a university or company?

Domain Name

_________ is an industry standard for local-area networks, based on a bus topology.

Ethernet

True or False? A Caesar cipher is an example of a route cipher.

False

True or False? A Transposition cipher substitutes one character with another.

False

True or False? A Web server generates Uniform Resource Locators (URL).

False

True or False? A cookie can execute code on your computer.

False

True or False? A digital certificate is an authenticated public key kept for trusted sources in order to minimize forgeries.

False

True or False? A firewall is a barrier that protects network equipment from physical damage.

False

True or False? A link in an HTML document allows an image to be displayed.

False

True or False? A network's topology determines how many file servers need to be installed in the network.

False

True or False? A node on a computer network must be a computer.

False

True or False? A ring topology is a LAN configuration in which a central node controls all message traffic.

False

True or False? A star topology is a LAN configuration in which all nodes are connected in a closed loop.

False

True or False? A top-level domain uniquely identifies a particular computer among all others on the Internet.

False

True or False? A wiki is a web site whose goal is to disseminate secret and classified information to the public.

False

True or False? An HTML document is divided into five primary sections.

False

True or False? An Internet backbone is a company that provides other companies or individuals with access to the Internet.

False

True or False? Antivirus software is only effective against viruses.

False

True or False? Because good passwords are hard to remember, users should memorize just a few and use them for all of their accounts.

False

True or False? Biometrics include physical credentials such as smart cards and barcodes.

False

True or False? Ethernet is based on a ring topology.

False

True or False? For national security, the U.S. government enforces a national access control policy for Internet traffic.

False

True or False? Google and Yahoo! are examples of Web search engines.

False

True or False? HTML is case sensitive.

False

True or False? In the client/server model, a user may only access files stored on his/her own computer.

False

True or False? Malware known as a Trojan horse uses a system-oriented event to determine when it launches its attack.

False

True or False? Only computers can be connected to a computer network.

False

True or False? Password guessing and back door attacks are both examples of spoofing.

False

True or False? Public-key cryptography and transposition ciphers are examples of modern computer encryption.

False

True or False? Retrieving data from an Internet resource to your computer is called uploading.

False

True or False? The Internet is a metropolitan-area network (MAN).

False

True or False? The requirement that the sender and receiver must share the cipher key is a major drawback of public-key cryptography.

False

True or False? WikiLeaks is a wiki.

False

True or False? The World Wide Web was developed in the 1970s.

False - 1990s

A(n) _________ is a computer dedicated to storing and managing files for network users.

File Server

A(n) _________ is a network device that directs a packet between networks toward its final destination.

Firewall

Which of the following deals with the routing of packets through the maze of the Internet to their final destinations?

Firewall

Which of the following is the term used to describe a machine and software that protects a network from inappropriate access?

Firewall

Which feature of a cell phone has been in the news because it is being exploited by some organizations to collect data about the user?

GPS capabilities

A(n) _________ is a special node on a LAN set up to handle all communication with other networks.

Gateway

Which of the following is a computer on a LAN that handles all communication between that network and others?

Gateway

Which of the following is the primary mechanism for representing the content of a Web page?

HTML

The primary language used to represent a Web page is _________.

HTML (Hypertext Markup Language)

In an HTML document, information about the document itself is put in the Head section of the document.

Head

Which of the following is generally made up of readable words and uniquely identifies a particular computer among all the computers on the Internet?

Hostname

Which of the following provides a way to uniquely identify a single computer among all others on the Internet?

Hostname

A(n) _________ is a connection between one Web page and another that a user can follow with the click of the mouse.

Hyperlink

The word _________ refers to the fact that information is not organized in a linear fashion.

Hypertext

Which of the following refers to the fact that the information on the Web is not organized in a linear fashion?

Hypertext

HTML stands for _________.

Hypertext Markup Language (HTML)

Which of the following is made up of 128 bits?

IPV6 Address

A(n) _________ is a company that provides other companies or individuals with access to the Internet.

ISP(Internet service provider)

Which of the following ensures that data can be modified only by appropriate mechanisms?

Information integrity

_________ allows a user to send short messages in real time.

Instant Messaging

A(n) _________ system, in contrast to an open system, uses private technologies controlled by a commercial vendor.

Proprietary

A(n) _________ is a set of rules that defines how data is formatted and processed on a network.

Protocol

Which of the following is a network device that strengthens and propagates a signal along a long communication line?

Repeater

A LAN using a(n) _________ topology connects all nodes in a closed loop on which messages travel in one direction.

Ring

Which of the following LAN configurations connects all nodes in a closed loop?

Ring Topology

Which of the following is a network device that directs a packet toward its final destination?

Router

Which of the following is a high-level protocol used to specify the transfer of electronic mail?

SMTP(Simple Mail Transfer Protocol)

Which of the following is a small piece of code that is embedded directly into the HTML of a Web page?

Scriptlet

A(n) _________ is a website that helps you find other websites.

Search Engine

When a user requests a Web resource, a computer called a Web _________ responds to the request.

Server

A LAN using a(n) _________ topology uses a central node that controls all message traffic.

Star

In which of the following LAN configurations is there a center node to which all others are connected?

Star Topology

Which of the following breaks messages into packets, hands them off for delivery, and then orders and reassembles them at their destination?

TCP(Transmission Control Protocol)

Which of the following is a suite of protocols and programs that support low-level network communication?

TCP/IP

Which of the following indicates the general type of an organization or a country of origin?

TLD(top-level domain)

A(n) _________ is a syntactic notation in HTML used to annotate the content of a Web page.

Tag

Which of the following is a notation that uses a name in angle brackets to annotate a piece of Web page information?

Tag

Which of the following is a high-level protocol used to log into a computer system from a remote computer?

Telenet

Which of the following are NOT part of the CIA triad?

The CIA triad includes confidentiality, integrity, and availability.

True or False? A Caesar cipher that shifts characters 3 to the right would produce the same codes as one that shifts them 23 to the left.

True

True or False? A Java applet is a program that is designed to be executed via the World Wide Web.

True

True or False? A Web browser is a software tool that retrieves and displays Web pages.

True

True or False? A browser ignores extra spaces and blank lines in an HTML document.

True

True or False? A browser will usually number an ordered list and use bullets for unordered lists.

True

True or False? A bus topology is a LAN configuration in which all nodes share a common line.

True

True or False? A computer network is a collection of connected computing devices that may communicate and share resources.

True

True or False? A computer virus and a computer worm are both self-replicating programs.

True

True or False? A digital signature is a way to "sign" a document by appending extra data that is both unique to the sender and very difficult to forge.

True

True or False? A digital signature is a way to "sign" a document such that the recipient can verify that it came from the originator and has not been altered during transmission.

True

True or False? A file server is a computer dedicated to storing and managing files for network users.

True

True or False? A file's MIME type indicates the format of files that are attached to email messages.

True

True or False? A hostname uniquely identifies a particular computer among all others on the Internet.

True

True or False? A local-area network (LAN) connects a small number of nodes in a building or close geographic area.

True

True or False? A password should never be sent in an email message.

True

True or False? A top-level domain helps users identify the host's type of organization or country of origin.

True

True or False? A username is not sufficient for user authentication.

True

True or False? A weblog allows users to publish periodic articles on a website.

True

True or False? A website might use a cookie to determine the number of unique visitors the site has had.

True

True or False? A wide-area network (WAN) connects two or more local-area networks.

True

True or False? An IPv4 address is stored in 32 bits, and an IPv6 address is stored in 128 bits.

True

True or False? An Internet service provider (ISP) is a company that provides other companies or individuals with access to the Internet.

True

True or False? An image can be a link to another Web page in an HTML document

True

True or False? Bandwidth is a synonym for data transfer rate.

True

True or False? Both DSL and cable connections are broadband connections.

True

True or False? Both DSL and cable modems generally provide data transfer speeds in the range of 1.5 to 3 megabits per second

True

True or False? Broadband connections often provide more rapid downloads than uploads.

True

True or False? Computer networks may be connected without the use of physical wires.

True

True or False? Cryptanalysis is the process of "breaking" a cryptographic code.

True

True or False? Cryptanalysis is the process of figuring out the plaintext version of a message without knowing the cipher or its key.

True

True or False? Data transfer rate is the speed with which data is moved from one place on the network to another.

True

True or False? Depending on the request, a peer may act as a client or a server.

True

True or False? Encryption is the process of converting plaintext into ciphertext.

True

True or False? Ethernet has become the industry standard for local-area networks.

True

True or False? GPS and other location data available on cell phones are sometimes collected by corporate agencies and/or used by law enforcement to aid criminal investigations.

True

True or False? HTML documents can be created using a regular text editor.

True

True or False? HTML has a predefined set of tags and XML does not.

True

True or False? HTML includes six predefined heading elements for creating titles and subtitles in documents.

True

True or False? HTML is considered to be a markup language.

True

True or False? IPv6 operates in parallel with IPv4 addressing, creating essentially two parallel networks.

True

True or False? Information security experts embrace the principle that no single individual should have the authority to have a significant impact on the system.

True

True or False? Integrity is ensuring that data can be modified only by appropriate mechanisms.

True

True or False? Messages sent over some shared communication lines are divided into fixed-size, numbered pieces called packets.

True

True or False? Multimedia components such as audio and video are large contributors to increased computer network traffic.

True

True or False? Network communications were possible before the development of the Web.

True

True or False? Password management software should be evaluated and used with care, but may provide a good solution for the active user.

True

True or False? Phishing is a technique that uses a fake web page to collect information such as usernames and passwords.

True

True or False? Printers can be connected directly to a computer network.

True

True or False? Some connections in a network may be made using radio waves or infrared signals.

True

True or False? Sometimes multiple network protocols at the same level provide the same service, but do so in different ways.

True

True or False? TCP/IP is the suite of protocols and programs that support low-level network communication.

True

True or False? Tags are used in a markup language to annotate the information stored in a document.

True

True or False? The Internet backbone is a set of high-capacity, high-speed networks that carry Internet traffic.

True

True or False? The companies that make antivirus software are constantly updating their databases of signatures and heuristics to detect new malware.

True

True or False? The last block of IPv4 addresses has been assigned.

True

True or False? The more a firewall can determine about the network traffic it is filtering, the more able it is to protect its users.

True

True or False? To send a message to Bob using public-key cryptography, Alice uses Bob's public key, which he makes readily available.

True

True or False? Two organizations can have computers with identical names because the domain name makes it clear which one is being referenced.

True

True or False? Users should beware of any situation in which they are contacted and requested to provide security information.

True

True or False? Wireless networks are more prone to electromagnetic interference than wired networks, and they must cope with access control challenges that wired connections do not.

True

True or False? XML is a metalanguage, used to define other markup languages.

True

True or False? XML stands for Extensible Markup Language

True

Which of the following contains the address for accessing a Web page?

URL

A(n) _________ uniquely identifies a resource among others on the Web.

URL (Uniform Resource Locator)

A(n) _________ network connects two or more local-area networks over a potentially large geographic area.

WAN

_________ is the collection and analysis of data regarding website usage.

Web Analytics

Which of the following is a software tool that retrieves and displays Web pages?

Web Browser

A(n) _________ is a computer dedicated to responding to requests for Web pages.

Web Server

Which of the following is a computer dedicated to responding to requests for a Web page?

Web Server

A(n) _________ is a website (or part of a website) that provides a mechanism for publishing periodic articles.

Weblog

A(n) _________ is a collection of related Web pages.

Website

Devices on a(n) _________ network often communicate using radio waves or infrared signals.

Wireless

Which of the following has no predefined set of tags?

XML

logic bomb

a malicious program that is triggered when a logical condition is met

back door

a malware type that negates normal authentication procedures to access a system.

man-in-the-middle

a type of eavesdropping attack, where attackers interrupt an existing conversation or data transfer.

Trojan horse

a type of malware that conceals its true content to fool a user into thinking it's a harmless file.

virus

a type of malware that often takes the form of a piece of code inserted in an application, program, or system and they're deployed by victims themselves.

worm

a type of malware that spreads copies of itself from computer to computer.

phishing

a type of social engineering attack often used to steal user data, including login credentials and credit card numbers.

Caesar cipher

a type of substitution cipher

denial of service

an attack meant to shut down a machine or network, making it inaccessible to its intended users.

public-key cryptography

asymmetric cryptography

Which of the following is an example of biometrics?

fingerprint analysis

route cipher

is a transposition cipher

Which of the following malware programs might launch its attack on the next April Fool's Day?

logic bomb

Which of the following is the LEAST significant challenge in the use of fingerprint analysis for user authentication?

user complaints about inconvenience

Which of the following is NOT a reasonable password management guideline?

using a password that is easy for you to remember, like your dog's name.

Which of the following malware programs embeds a copy of itself in another program?

virus

Which of the following is a mechanism for publishing periodic articles on the Web?

weblog

Which of the following are NOT used for user authentication?

what the user sees

According to a 2010 report, what percentage of Facebook users don't use its privacy controls or know they exist?

25%

A Caesar cipher that shifts characters 4 positions to the right would encode the word LADDER as which of the following?

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z W X Y Z A B C D E F G H I J K L M N O P Q R S T U V PEHHIV

A Caesar cipher that shifts characters 3 positions to the right would encode the word BUBBLE as which of the following?

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z X Y Z A B C D E F G H I J K L M N O P Q R S T U V W EXEEOH

Which of the following is a Java program designed to be embedded into a Web page and executed in a browser?

Applet

Which of the following cryptography techniques requires two separate keys to encrypt and decrypt messages?

Asymmetric cryptography

Which of the following is part of an HTML tag and provides additional information about the element?

Attribute

A search engine may rely on _________ that have been indexed about a Web page to determine the results of a search.

Keywords

A(n) _________ network connects a relatively small number of machines in a close geographical area.

LAN

A(n) _________ network is a large network that covers a college campus, business campus, or city.

MAN

A(n) _________ language is any language that annotates the content of a document.

Markup

Which of the following is a device for converting an analog signal to a digital signal and back again?

Modem

A computer _________ allows computing devices to communicate and share resources.

Network

Which of the following is a generic term used for any device on a network?

Node

A _________ network is decentralized, with nodes that share both resources and the responsibility for making those resources available to other peers.

P2P model

Which of the following describes the process of dividing a message into small pieces and sending those pieces separately to the destination?

Packet Switching

Which of the following is an IP program that can be used to test whether a particular network computer is active and reachable?

Ping

Which of the following is a numeric designation that corresponds to a particular high-level protocol?

Port

Which of the following is the LEAST likely consequence if the process of user authentication is compromised?

Proceeds from Spanish lottery deposited in user's bank account

Which of the following malware programs is disguised as a benevolent program?

Trojan horse

Which of the following is the degree to which authorized users can access information for legitimate purposes?

availability

Which of the following security attacks is based on a feature written into a program or operating system?

back door.

Which of the following security attacks exploits a flaw in a program that could cause a system to crash and leave the user with increased authority levels?

buffer overflow

Which of the following indicates the format of a file attached to an email message?

mime TYPE

A phone _________ converts digital data into an analog signal so that it can be transferred over a telephone line.

modem

In order to connect to the Internet using your home's cable TV lines, you must have a cable _________.

modem

A message sent over some shared communication lines is divided into fixed-size, numbered pieces called _________.

packets

Which of the following security attacks collects key information like your password using a fake web page?

phishing

digital certificate

the vehicle that SSL(Secure Sockets Layer) uses for public-key cryptography.

A route cipher is an example of what category of encryption?

transposition cipher.


Conjuntos de estudio relacionados

Economics Unit 1 Lesson 2 Part 3

View Set

Saunders Chapter 65: Crisis Theory and Interventions

View Set

Chapter 10 Network Segmentation and Virtualization

View Set

Chapter 1 The profession of Nursing

View Set

Chapter 6-10 Networking Exam Answers

View Set

The Study of Minorities (chap 1) #36-70

View Set

Maryland Property & Casualty Insurance Practice Questions

View Set