Business Data Communications Chapter 13 , 14 & 15

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

____ scanning works by recognizing the unique pattern of a virus.​ a.​Frequency-based b.​Amplitude-based c.​Signature-based d.​Time-based

c.​Signature-based

Many certificates conform to the ____ standard.​ a.​X.409 b.​X.309 c.​X.609 d.​X.509

d.​X.509

A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms.

local area detailed connectivity

When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree?​

operational

The intent of SDLC is for ____ not to be disjointed steps in a big plan, but overlapping layers of activity.​

phases

If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.​ a.​spoofing b.​firewalling c.​e-mail bombing d.​smurfing

a.​spoofing

____ involves electronically monitoring data flow and system requests into and out of their systems.​ a.​Routers b.​Intrusion detection c.​Firewalls d.​Worms

b.​Intrusion detection

The concept of two keys, public and private, is called ____ cryptography.​ a.​symmetric b.​public key c.​secret key d.​private key

b.​public key

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.​ a.​monoalphabetic b.​transposition-based c.​polyalphabetic d.​multialphabetic

b.​transposition-based

To learn new skills and demonstrate proficiency within a particular area, the network administrator can obtain ____.​

certification

____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation.​ a.​Spoofing b.​E-mail bombing c.​Firewalling d.​Smurfing

d.​Smurfing

____ usually involves having a software program that monitors every transaction within a system.​ a.​Computer auditing b.​Firewalling c.​Routing d.​Access rights

a. Computer auditing


Kaugnay na mga set ng pag-aaral

Chemistry (Chapter 1 & 2) Practice HW Questions

View Set

Microbiology MediaLab Exam Simulator

View Set

Business law and Ethics Final Review 2.0

View Set

13.3 The Survey Research Design

View Set

Chapter 20 (Diseases of the Endocrine systems)

View Set

Unit 88: Containers and contents

View Set