MIS 3000 Ch 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following is true about a​ VPN? A. The actual internal LAN addresses are sent in the VPN messages on the Internet. B. It appears as a secure​ connection, though it is not. C. It uses private networks instead of the public network. D. It does not provide users with remote access. E. It encrypts messages to ensure secure transmissions.

E. It encrypts messages to ensure secure transmissions.

Which of the following is the distinguishing feature of a LAN as compared to a​ WAN? A. Network hardware B. Bandwidth C. Communication capacity D. Number of users E. Single location

E. Single location

A common protocol that enables files to be moved from one computer to another over the Internet is​ _________. A. FTP Your answer is correct.B. SMTP C. SNMP D. XML E. HTTPS

A. FTP

Among the​ following, which is NOT likely to be a way for Falcon Security to use the​ cloud? A. Use Rackspace for hardware and load whatever operating system they want. Your answer is correct.B. Use Google Mail and Google Drive. C. Obtain data storage services from​ Amazon.com's S3 product. D. Use Windows Servers with SQL Server already installed from the Microsoft Azure cloud offerings. E. Use a CDN to distribute its content worldwide.

A. Use Rackspace for hardware and load whatever operating system they want.

Communication carriers are unhappy with the regulations that impose​ ________ and are currently engaged in legal battles to eliminate the concept. A. net neutrality Your answer is correct.B. bandwidth limits C. wide area networks D. maximum transmission speeds E. hop restrictions

A. net neutrality

In order to get on the Internet from a location such as a coffee​ shop, your device uses your​ __________, which is then substituted with the shop​ LAN's _________. A. private IP​ address; public IP address This is the correct answer.B. local IP​ address; public IP address Your answer is not correct.C. public IP​ address; private IP address D. private IP​ address; global IP address E. local IP​ address; global IP address

A. private IP​ address; public IP address

An important cloud design philosophy that defines all interactions among computing devices as services in a formal standardized way is termed the​ ________. A. ​service-oriented architecture Your answer is correct.B. ​service-options available C. ​seamless-operations architecture D. ​standard-operational access E. ​simple-option access

A. ​service-oriented architecture

Since companies do not know precisely how much demand will be placed on their computing resources in the​ future, an attractive element of using the cloud is the fact that it is​ ________. A. unpredictable B. elastic Your answer is correct.C. dynamic D. variable E. flexible

B. elastic

A computer​ ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. A. farm B. network Your answer is correct.C. database D. application E. server

B. network

The most likely reason that an organization should not consider using the cloud is​ ______. A. the organization faces too much competition in its industry segment B. the organization is legally prohibited from losing physical control over its data Your answer is correct.C. the organization wants to wait for the cloud to mature D. the organization is not technically sophisticated E. the organization feels the clouds benefits are unclear

B. the organization is legally prohibited from losing physical control over its data

The following are all disadvantages of​ in-house hosting compared to use of the​ cloud, except​ ______. A. capital investment B. visibility of security measures Your answer is correct.C. development effort D. flexibility and adaptability to fluctuating demand E. obsolescence risk

B. visibility of security measures

The computers in two separated company sites must be connected using​ a(n) ________. A. local area network​ (LAN) B. wide area network​ (WAN) Your answer is correct.C. protocol D. Internet E. intranet

B. wide area network​ (WAN)

Suppose Falcon Security wished to utilize a​ vendor's application software in the cloud. It would need to obtain​ ________ cloud resources. A. IaaS​ (Infrastructure as a​ Service) B. WaaS​ (Web as a​ Service) C. SaaS​ (Software as a​ Service) Your answer is correct.D. PaaS​ (Platform as a​ Service) E. DaaS​ (Data as a​ Service)

C. SaaS​ (Software as a​ Service)

A wireless protocol that is becoming ever more common as everyday objects become​ "smart" devices is​ _________. A. Jetblack B. Greenline C. Whitehot D. Bluetooth Your answer is correct.E. Redhat

D. Bluetooth

Which of the following is the most accurate and complete definition of the​ cloud? A. A bubble on a network diagram B. Computers somewhere out there C. Easily accessible data storage D. Elastic leasing of pooled computer resources over the Internet Your answer is correct.E. Computing resources available to anyone

D. Elastic leasing of pooled computer resources over the Internet

The method of obtaining​ cloud-based services that includes hardware​ infrastructure, operating​ system, and possibly a DBMS is termed​ _______. A. WaaS​ (Web as a​ Service) B. IaaS​ (Infrastructure as a​ Service) C. DaaS​ (Data as a​ Service) D. PaaS​ (Platform as a​ Service) This is the correct answer.E. SaaS​ (Software as a​ Service)

D. PaaS​ (Platform as a​ Service)

_______ agreements ensure that communications carriers exchange traffic on their networks freely. A. Exchange B. Neutral Your answer is not correct.C. Free use D. Peering This is the correct answer.E. Hopping

D. Peering

A negative consequence of the expanding use of the cloud will be​ ______. A. higher costs of cloud services B. reduced availability of cloud services C. slower performance of​ cloud-based services D. fewer local jobs that focus on the installation and support of email and other servers Your answer is correct.E. large increases in cloud vendor data center job openings

D. fewer local jobs that focus on the installation and support of email and other servers

Advantages of content delivery networks​ (CDNs) include all of the following except​ ________. A. increased reliability B. protection from DOS attacks C. faster load times D. higher costs to mobile users Your answer is correct.E. ​pay-as-you-go

D. higher costs to mobile users

A network that relies primarily on wireless connection of devices located near to a single person is a​ ___________. A. local area network B. wide area network C. limited area network D. personal area network Your answer is correct.E. private area network

D. personal area network

A​ ________ is a set of rules that programs on two communicating devices follow. A. signal B. packet C. filter D. protocol Your answer is correct.E. language

D. protocol

The sharing of physical hardware by many organizations in the​ cloud, termed​ pooling, is accomplished with​ ____________. A. provisioning B. segmentation C. visualization D. virtualization Your answer is correct.E. separation

D. virtualization

Which of the following statements is NOT correct for private​ clouds? A. Private clouds provide security within the organizational infrastructure. B. They create a farm of servers managed with elastic load balancing. C. Private clouds can possibly provide secure access from outside that infrastructure. Your answer is not correct.D. They are built on top of public cloud infrastructure using VPN tunneling. E. They enable the business to maintain physical control over its stored data.

E. They enable the business to maintain physical control over its stored data.

Your Internet Service Provider serves all of the following functions except​ _________. A. collects money from its customers for its services B. pays access fees to communication carriers to help pay for the Internet C. provides you a gateway to the Internet D. provides you with a legitimate Internet address E. allows you to access a personal area network​ (PAN)

E. allows you to access a personal area network​ (PAN)

On a typical​ e-commerce Web​ site, a component called the​ ________ contains programs that obtain product data from a​ database, manage the shopping​ cart, and coordinate the checkout process. A. database management system B. Web server C. Web browser D. Internet server E. commerce server

E. commerce server


Conjuntos de estudio relacionados

Public Relations Final Exam Junker

View Set

Criminal Investigation Review: Chapters 5-7

View Set

Live Virtual Machine Lab 5.4: Module 05 Troubleshooting Cable Connectivity for Network+

View Set

C. Consolidated Financial Statements

View Set

2.4 Reading: Apply Information Literacy Skills to Web Searches

View Set

Ch.8: Survey Research, an overview

View Set