DC Exam 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

​A(n) ____ is a service from local telephone companies in which up-to-date telephone facilities at the telephone company's central (local) office are offered to business users, so that they don't need to purchase their own facilities.

​central office exchange service

A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.​

​digital signature

​A ____ is a security procedure that uses public key cryptography to assign to a document a code for which you alone have the key.​

​digital signature

A ____ substitution-based cipher replaces a character or group of characters with a different character or group of characters.​

​monoalphabetic

A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved.​

​transposition-based

​A ____ is a data network connection that makes use of the public telecommunications infrastructure but maintains privacy through the use of a tunneling protocol and security procedures.

​virtual private network (VPN)

The TCP header ____________________ field contains a sliding window value that provides flow control between the two endpoints.

Window

​____ is capable of sending traffic that may experience bursts of data, but there are no promises as to when the data may be sent.

​Unspecified bit rate (UBR)

In computer terminology, a(n) ____________________ is a trap that is set by network personnel in order to detect unauthorized use of a network resource.​

honeypot

The ____________________ is the telephone line that leaves your house or business.

local loop

____________________ techniques that observe and record some aspect of the user, such as voiceprints, fingerprints, eyeprints, and faceprints, appear to be the wave of the future to replace passwords.​

Biometric

The ____________________ contains the equipment that generates a dial tone, interprets the telephone number dialed, checks for special services, and connects the incoming call to the next point.

Central Office

The most popular protocol that handles dynamic assignment of IP addresses is ________________________________________.

DHCP

In a payback analysis, the ____ Cost is a one-time cost that occurs in Year 0.​

Development

​_________________________ is a technology that allows existing twisted pair telephone lines to transmit multimedia materials and high-speed data.

Digital subscriber line

​____ is the computerized version of writing a letter and mailing it at the local post office.

Electronic mail

A packet filter firewall is a computer running proxy server software, whose function is much like that of a librarian who controls access to books in a library's rare books room.​

F

A reliability of exactly 1.0 means the network or device is reliable 1 percent of the time.

F

All system attacks need a user to open an e-mail or Web page.​

F

Frame relay is called a layer 6 protocol.

F

If you exclusive-OR a 0 and a 0, as is done with certain spread spectrum techniques, the result is 1.​

F

The National Institute of Standards and Technology selected the algorithm Lucifer in October 2000 as the basis for AES.​

F

The systems development life cycle is a one-time only process

F

WAP has been replaced by a new standard, Wired Equivalency Protocol (WEP).​

F

When calculating a computer system benefits, you do not need to include intangible benefits.​

F

​Current estimates suggest that there are more than 40 million hosts (computer sites that store and deliver Web pages) connected to the Internet.

F

​Subscriber loops usually transmit digital signals, which require amplifiers every few kilometers.

F

​The Internet recognizes URLs directly.

F

​When they were originally introduced many years ago, dial-up modems were capable of data transfer speeds of merely 15 to 30 bits per second.

F

____ is actually a set of protocols named packet-based multimedia protocols, and it was designed for a wide range of applications (audio and video).

H.323

_________________________ allows a user to see if people are currently logged in on the network and, if they are, to send them short messages in real time.

IM

____ is the capability of a network server to transmit a data stream to more than one host at a time.

IP multicasting

____ is a set of protocols created to support the secure transfer of data at the IP layer.​

IPsec

____ is a set of protocols developed by the Internet Engineering Task Force to support the secure exchange of data packets at the IP layer.

IPsec

Real-Time Streaming Protocol (RTSP) is a(n) ____ layer protocol.

application

The ____ allows the customer to exceed the committed information rate by a fixed amount for brief moments of time.

burst rate

A(n) ____________________ is a high-speed communications service that allows high-speed access to wide area networks such as the Internet via a cable television connection.

cable modem

​On the other end of the local loop is the local telephone company's ____.

central office

____________________ is the study of creating and using encryption and decryption techniques.​

cryptography

IP ____________________ is essentially another name for a data packet

datagram

The ____________________ portion of the URL specifies a particular server at a particular site that contains the requested item.

domain name

The local loop commonly consists of either four or ____ wires.

eight

Perhaps the most common form of protection from unauthorized use of a computer system is the ____.​

password

When hackers will even go so far as to create an application that appears to be legitimate and prompts users for an ID and password, the type of attack is termed ____________________.​

phishing

A ____ is a common Internet tool used to verify if a particular IP address of a host exists and to see if the particular host is currently available.​

ping

When no splitter is used to separate the DSL signal from the POTS signal, then the service is called ____.

splitterless DSL

If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____.​

spoofing

The opposite of asymmetric encryption is ____ encryption, in which one key is used to encrypt and decrypt.​

symmetric

A professional called a(n) ____________________ typically is responsible for managing a project and following the SDLC phases.​

systems analyst

When performing a payback analysis calculation, you should show all dollar amounts using the ____.​

time values of money

​The telephone network consists of two basic types of telephone lines: a subscriber loop, or standard telephone line, and a ____.

trunk

A computer ____________________ is a small program that alters the way a computer operates without the knowledge of the computer's users and often does various types of damage.​

virus

Many people consider the Trojan horse to be a form of computer ____.​

virus

In order to create a(n) ____________________ connectivity map, the modeler begins by identifying each site or location in which the company has an office.​

wide area

A computer ____________________ is a program that copies itself from one system to another over a network, without the assistance of a human being.​

worm

​The IPv6 address 6A3E:BA99:0:0:0:87BA:0123:FFEF can be abbreviated as:

​6A3E:BA99::87BA:0123:FFEF

IEEE ____ addresses both weaknesses of WEP by allowing the keys, encryption algorithms, and negotiation to be dynamically assigned, and by adopting the AES encryption based on the Rijndael algorithm with 128-, 192-, or 256-bit keys.​

​802.11i

​____ takes an IP address in an IP datagram and translates it into the appropriate medium access control layer address for delivery on a local area network.

​Address Resolution Protocol (ARP)

During the late 1960s, a branch of the U.S. government titled the ____ created one of the country's first wide area packet-switched networks.

​Advanced Research Projects Agency (ARPA)

​____ is a popular format that transmits the downstream data at a faster rate than the upstream rate.

​Asymmetric digital subscriber line (ADSL)

​____ is the most expensive ATM class of service.

​Constant bit rate (CBR)

In a payback analysis, the ____ values are the running sums of the Time-Adjusted Benefits over all the years.​

​Cumulative Time-Adjusted Benefits

The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site.

​File Transfer Protocol (FTP)

​The primary functions of ____ are to allow a user to download a file from a remote site to the user's computer and to upload a file from the user's computer to a remote site.

​File Transfer Protocol (FTP)

​____ is the capability of a network server to transmit a data stream to more than one host at a time.

​IP multicasting

​____ means that a user calling into a company telephone system provides some form of data by speaking into the telephone, and a database query is performed using this spoken information.

​Integrated voice recognition and response

​____ is the gathering and use of the browsing habits of potential and current customers, which is important data for many companies.

​Micro-marketing

____ scanning works by recognizing the unique pattern of a virus.​

​Signature-based

A(n) ____ uniquely identifies files, Web pages, images, or any other types of electronic documents that reside on the Internet.

​Uniform Resource Locator (URL)

A(n) ______________________________ is a large, computerized, self-contained telephone system that sits in a telephone room on a company's premises.

PBX

____ are used to select unique documents from anywhere in the world.

​Uniform Resource Locators (URLs)

Cable modem connections are typically symmetric.

F

​A ____ is a bundle of VCCs that have the same endpoints.

VPC

____ may be considered a form of physical protection.​

Surveillance

​The ATM _________________________ class of service is used for traffic that may experience bursts of data, and whose bandwidth range is roughly known, such as that of a corporate collection of leased lines.

ABR

During the late 1960s, ARPA created one of the country's first wide area packet-switched networks, the ____________________.

ARPANET

When the user wants to send an e-mail message, the e-mail program takes the e-mail message and passes it to the transport layer of the software.

T

​Home and small business local area networks often use NAT to conserve IP addresses.

T

​One of the primary functions of Kerberos is to authenticate users.

T

​Only two wires are required to complete a telephone circuit.

T

____ is an authentication protocol designed to work on client/server networks that use secret or symmetric cryptography.​

Kerberos

​A(n) ___________________________________ is a geographic area such as a large metropolitan area or part of a large state and determines whether a telephone call is local or long distance.

LATA

In a wide area connectivity map, mobile or wireless sites are indicated by circles containing the letter ____.​

M

In 1983, the Department of Defense broke the ARPANET into two similar networks: the original ARPANET and ____.

MILNET

A ____ service is an all-digital connection that can transfer either voice or data at speeds up to 1.544 Mbps.

T-1

____________________ lines and tie lines are leased telephone lines that require no dialing.

Private

____ is a protocol that allows a network administrator to monitor, analyze, and troubleshoot a group of remotely managed elements.​

RMON

A company that wishes to have its own in-house telephone system will often buy or lease a PBX.

T

A popular attack method is to abuse or take advantage of valid user accounts and the permissions associated with those accounts.​

T

Convergence has had a particularly noticeable impact on the telecommunications market.

T

Frame relay was originally designed and used to transfer packets of data between two sites more cost effectively than leased lines could.

T

IP multicasting suffers from a lack of security.

T

It is possible to become certified on a particular type of network operating system.​

T

Some computer systems generate random passwords that are very difficult to guess, but are also hard to remember.​

T

The Internet can transfer conventional data and voice data.

T

The Time to Live field indicates how long a particular datagram is allowed to live.

T

The UDP header contains only four fields—Source Port, Destination Port, Length, and Checksum.

T

To make IPv4 addresses a little easier for human beings to understand, the 32-bit binary addresses are represented by dotted decimal notation.

T

Types of listserv software include mailserv, majordomo, and almanac.

T

​____ are permanent direct connections between two specified points.

Tie lines


Kaugnay na mga set ng pag-aaral

(1.1) Types of Changes and Accounting Approaches

View Set

Performance by chapter What's this? Chapter 61: Management of Patients with Dermatologic Disorders

View Set

Organizational Behavior: Ch 4 Emotions & Moods, Quiz 4, MGMT Test 1, BUAD309 Ch. 4, OB - Chapter 4, Ch3 Attitudes and job Satisfaction, Quiz 3, OB Ch. 3, Chapter 3: Attitudes & Job Satisfaction, MGMT 3750 Chapter 3: Job Attitudes and Job Satisfaction...

View Set

SIE CHAPTER 9 Securities Industry Regulations

View Set