MIS Test 3 Cronk

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A salesperson clicks repeatedly on the online ads of a competitor in order to drive the competitor's advertising costs up. This is an example of: A.click fraud. B.pharming. C.spoofing. D.phishing. E.evil twins.

A.click fraud.

Bluetooth can be used to link up to ________ devices within a 10-meter area using low-power, radio-based communication. A.eight B.twenty C.fifteen D.two E.five

A.eight

Most computer viruses deliver a: A.driveby download. B.payload. C.Trojan horse. D.worm. E.keylogger.

B.payload.

Wireless sensor networks (WSNs) are used for the following tasks except: A.protecting property. B.processing consumer transactions. C.detecting radioactive materials. D.identifying vehicles for trucking firms. E.monitoring machines.

B.processing consumer transactions.

Together, a protocol prefix, a domain name, a directory path, and a document name, are called a(n): A.IP address. B.uniform resource locator. C.child domain. D.third-level domain. E.root domain.

B.uniform resource locator.

Which process is used to protect transmitted data in a VPN? A.PPP B.Chaining C.Tunneling D.VOIP E.Packet-switching

C.Tunneling

Which of the following statements about Internet security is not true? A.The use of P2P networks can expose a corporate computer to outsiders. B.A corporate network without access to the Internet is more secure than one that provides access. C.VoIP is more secure than the switched voice network. D.Instant messaging can provide hackers access to an otherwise secure network. E.Smartphones have the same security weaknesses as other Internet devices.

C.VoIP is more secure than the switched voice network.

The 802.11 set of standards is known as: A.WiMax. B.WSN. C.Wi-Fi. D.WLAN. E.WAN.

C.Wi-Fi.

Client/server computing is a: A.network that connects sensors to desktop computers. B.network where centralized mainframe computers serve local devices. C.distributed computing model where clients are linked to one another through a network that is controlled by a network server computer. D.centralized computing model where local computers are connected to one another by a network. E.centralized model of computing for large corporations.

C.distributed computing model where clients are linked to one another through a network that is controlled by a network server computer.

Shopping bots use ________ software for searching the Internet. A.Web 2.0 B.SEO C.intelligent agent D.Web 3.0 E.comparison

C.intelligent agent

A VPN: A.is a proprietary networking service technology developed by individual corporations. B.is an Internet-based service for delivering voice communications. C.is an encrypted private network configured within a public network. D.is more expensive than a dedicated network. E.provides secure, encrypted communications using Telnet.

C.is an encrypted private network configured within a public network.

The backbone networks of the Internet are typically owned by long-distance telephone companies called: A.internet bulk providers. B.enhanced service providers. C.network service providers. D.regional network providers. E.backbone providers.

C.network service providers.

What service converts IP addresses into more recognizable alphanumeric names? A.DNS B.IP C.HTTP D.HTML E.FTP

A.DNS

Which of the following is not one of the top five search engines? A.Facebook B.Google C.Microsoft Bing D.Yahoo E.Baidu

A.Facebook

Macy's Pick to the Last Unit system, described in the chapter-opening case, is an example of which of the following? A.IoT application B.RFID application C.BLE application D.GPS application E.Web 3.0 application

A.IoT application

4G networks use which of the following standards? A.LTE and WiMax B.CDMA and PAN C.GSM and LTD D.LTE and LTD E.T-Mobile and AT&T

A.LTE and WiMax

Which of the following is not a characteristic of packet switching? A.Packet switching requires point-to-point circuits. B.Packets are routed through many different paths. C.Packets are reassembled into the original message when they reach their destinations. D.Packets travel independently of each other. E.Packets include data for checking transmission errors.

A.Packet switching requires point-to-point circuits.

Which of the following refers to policies, procedures, and technical measures used to prevent unauthorized access, alteration, theft, or physical damage to information systems? A.Security B.Identity management C.Controls D.Benchmarking E.Algorithms

A.Security

In TCP/IP, IP is responsible for which of the following? A.Sequencing the transfer of packets B.Breaking messages down into packets C.Moving packets over the network D.Establishing an Internet connection between two computers E.Disassembling and reassembling packets during transmission

A.Sequencing the transfer of packets

Instant messaging is a type of ________ service. A.chat B.wireless C.email D.network E.cellular

A.chat

All of the following are specific security challenges that threaten corporate servers in a client/server environment except: A.sniffing. B.vandalism. C.denial-of-service attacks. D.malware. E.hacking.

A.sniffing.

The most common web servers today are: A.WebSTAR and Netscape Server. B.Apache HTTP Server and Microsoft IIS. C.IBM HTTP Server and Apache HTTP Server. D.Netscape Server and Apache HTTP. E.Microsoft IIS and IBM HTTP Server.

B.Apache HTTP Server and Microsoft IIS.

The most appropriate wireless networking standard for creating PANs is: A.IEEE 802.11b. B.Bluetooth. C.I-mode. D.RFID. E.Wi-Fi.

B.Bluetooth.

A(n) ________ is a commercial organization with a permanent connection to the Internet that sells temporary connections to retail subscribers. A.WAN B.ISP C.RSS D.FTP E.NFP

B.ISP

Based on your reading of the examples in the chapter, which of the following would be the best use of RFID for a business? A.Lowering network costs B.Managing the supply chain C.Improving employee engagement D.Logging transactions E.Enabling client communication

B.Managing the supply chain

Which of the following is a device that sends packets of data through different networks assuring they go to the correct address? A.Switch B.Router C.Hub D.Modem E.NIC

B.Router

Which of the following is not a defining feature of Web 2.0? A.User-generated content B.Semantic search C.Social participation (sharing) D.Interactivity E.Real-time user control

B.Semantic search

IPv6 has been developed in order to: A.support Internet2. B.create more IP addresses. C.reduce excess IP addresses. D.update the packet transmission protocols for higher bandwidth. E.allow for different levels of service.

B.create more IP addresses.

One or more access points positioned on a ceiling, wall, or other strategic spot in a public place to provide maximum wireless coverage for a specific area are referred to as: A.netcenters. B.hotspots. C.touch points. D.hot points. E.wireless hubs.

B.hotspots.

Digital subscriber lines: A.are assigned to every computer on the Internet. B.operate over existing telephone lines to carry voice, data, and video. C.are very-high-speed data lines typically leased from long-distance telephone companies. D.operate over coaxial cable lines to deliver Internet access. E.have up to twenty-four 64-Kbps channels.

B.operate over existing telephone lines to carry voice, data, and video.

A network that spans a college or corporate facility is called a: A.LAN. B.WAN. C.CAN. D.WSN. E.MAN.

C.CAN.

Which of the following is a virus that uses flaws in Windows software to take over a computer remotely? A.ILOVEYOU B.Zeus C.Conficker D.Cryptolocker E.Sasser

C.Conficker

Which signal types are represented by a binary waveform? A.Analog B.Optical C.Digital D.RFID E.Laser

C.Digital

Which organization manages the domain name system of the Internet? A.W3C B.IAB C.ICANN D.none (no one "owns" the Internet) E.The Department of Commerce (U.S.)

C.ICANN

Which of the following statements about botnets is not true? A.Botnets are often used for click fraud. B.Ninety percent of the world's spam is delivered by botnets. C.It is not possible to make a smartphone part of a botnet. D.Botnets are often used to perpetrate DDoS attacks. E.Eighty percent of the world's malware is delivered by botnets.

C.It is not possible to make a smartphone part of a botnet.

Which type of network is used to connect digital devices within a city or metropolitan area? A.WAN B.LAN C.MAN D.Wi-Fi E.SAN

C.MAN

Which of the following statements about RFID is not true? A.RFIDs transmit only over a short range. B.RFID tags and antennas come in a variety of shapes and sizes. C.RFIDs require line-of-sight contact to be read. D.RFIDs use an antenna to transmit data. E.Microchips embedded in RFIDs are used to store data.

C.RFIDs require line-of-sight contact to be read.

Which of the following pulls content from websites and feeds it automatically to a user's computers? A.FTP B.IPv6 C.RSS D.Bluetooth E.HTTP

C.RSS

________ monetizes the value of the data stored by search engines. A.RSS B.TCP/IP C.Search Engine Marketing D.IoT E.WiMax

C.Search Engine Marketing

On which of the following protocols is the Internet based? A.FTP B.DNS C.TCP/IP D.IMAP E.HTTP

C.TCP/IP

Which of the following statements is not true about search engines? A.They are arguably the Internet's "killer app." B.Users are increasingly using search engines on mobile devices. C.There are hundreds of search engines vying for user attention, with no clear leader having yet emerged. D.They have solved the problem of how users instantly find information on the Internet. E.They are monetized almost exclusively by search engine marketing.

C.There are hundreds of search engines vying for user attention, with no clear leader having yet emerged.

The total amount of digital information that can be transmitted through any telecommunications medium is measured in: A.gigaflops. B.baud. C.bps. D.Hertz. E.RPMs.

C.bps.

The telephone system is an example of a ________ network. A.wireless B.packet-switched C.circuit-switched D.client/server E.peer-to-peer

C.circuit-switched

Bandwidth is the: A.geographical distance spanned by a network. B.total number of bytes that can be sent through a medium per second. C.difference between the highest and lowest frequencies that can be accommodated on a single channel. D.number of frequencies that can be broadcast through a medium. E.number of cycles per second that can be sent through a medium.

C.difference between the highest and lowest frequencies that can be accommodated on a single channel.

All of the following are specific security challenges that threaten corporate systems in a client/server environment except: A.theft of data. B.alteration of data. C.radiation. D.hardware failure. E.copying of data.

C.radiation.

The concept of a future web in which it is commonplace for everyday objects to be connected, controlled, or monitored over the Internet is called: A.Internet2. B.a 3-D Web. C.the Internet of Things. D.Web 2.0. E.the Semantic Web.

C.the Internet of Things.

The domain .gov is a(n): A.third level domain. B.network domain. C.top-level domain. D.host domain. E.Internet root domain.

C.top-level domain.

________ is spyware that logs and transmits everything a user types. A.A sniffer B.A worm C.A Trojan horse D.A keylogger E.Spyware

D.A keylogger

Which of the following is the best description of a protocol in a telecommunications network architecture? A.A device that handles the switching of voice and data in a local area network B.The main computer in a telecommunications network C.A pathway through which packets are routed D.A standard set of rules and procedures for control of communications in a network E.A communications service for microcomputer users

D.A standard set of rules and procedures for control of communications in a network

The Internet is based on which three key technologies? A.Client/server computing, packet switching, and HTTP B.Email, instant messaging, and newsgroups C.TCP/IP, HTML, and HTTP D.Client/server computing, packet switching, and the development of communications standards for linking networks and computers E.TCP/IP, HTTP, and packet switching

D.Client/server computing, packet switching, and the development of communications standards for linking networks and computers

Using numerous computers to inundate and overwhelm the network from numerous launch points is called a(n) ________ attack. A.SQL injection B.DoS C.botnet D.DDoS E.phishing

D.DDoS

Which of the following involves slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations? A.Multiplexing B.Packet routing C.ATM D.Packet switching E.Packet shifting

D.Packet switching

Which type of network treats all processors equally and allows peripheral devices to be shared without going to a separate server? A.MAN B.Wireless C.LAN D.Peer-to-peer E.Windows domain network

D.Peer-to-peer

A(n) ________ is a box consisting of a radio receiver/transmitter and antennas that links to a wired network, router, or hub. A.hub B.RFID receiver C.WiMax receiver D.access point E.hotspot

D.access point

T1 lines: A.have up to twenty-four 64-Kbps channels. B.do not provide guaranteed service levels, but simply "best effort." C.operate over coaxial lines to deliver Internet access. D.are high-speed, leased data lines providing guaranteed service levels. E.operate over existing telephone lines to carry voice, data, and video.

D.are high-speed, leased data lines providing guaranteed service levels.

All of the following are physical components of an RFID system except: A.antennas. B.tags. C.radio transmitters. D.bar codes. E.a stationary or handheld device.

D.bar codes.

All of the following are specific security challenges that threaten the communications lines in a client/server environment except: A.radiation. B.sniffing. C.tapping. D.errors. E.theft and fraud.

D.errors.

Predictive search in Google's search engine: A.uses a tracking service and cookies on your browser to predict search results. B.uses a semantic approach to predict what you are looking for. C.uses a knowledge graph of what similar people searched on to predict your search interests. D.predicts what you are looking for as you enter words into the query box. E.maintains a history of your searches and then predicts what you will search on next.

D.predicts what you are looking for as you enter words into the query box.

A network that covers entire geographical regions is most commonly referred to as a(n): A.local area network. B.metropolitan area network. C.peer-to-peer network. D.wide area network. E.intranet.

D.wide area network.

The WiMax standard can transmit up to a distance of approximately: A.5 miles. B.70 miles. C.30 meters. D.500 meters. E.30 miles.

E.30 miles.

Which of the following statements about wireless security is not true? A.Intruders can force a user's NIC to associate with a rogue access point. B.SSIDs are broadcast multiple times and can be picked up fairly easily by sniffer programs. C.An intruder who has associated with an access point by using the correct SSID is capable of accessing other resources on the network. D.Radio frequency bands are easy to scan. E.Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

E.Bluetooth is the only wireless technology that is not susceptible to hacking by eavesdroppers.

Which of the following refers to all of the methods, policies, and organizational procedures that ensure the safety of the organization's assets, the accuracy and reliability of its accounting records, and operational adherence to management standards? A.Security policy B.Vulnerabilities C.SSID standards D.Legacy systems E.Controls

E.Controls

Which digital cellular standard is used widely throughout the world except the United States? A.4G B.WLAN C.CDMA D.LTD E.GSM

E.GSM

Web browser software requests web pages from the Internet using which of the following protocols? A.HTML B.URL C.FTP D.DNS E.HTTP

E.HTTP

Which of the following is a device that makes possible the translation of digital signals to analog sound signals used by a computer network? A.DSL B.TCP/IP C.Local area network D.Twisted wire E.Modem

E.Modem

Which type of network would be most appropriate for a business comprised of three employees and a manager located in the same office space, whose primary need is to share documents? A.SAN B.MAN C.WAN D.Domain-based LAN E.Peer-to-peer network

E.Peer-to-peer network

CryptoLocker is an example of which of the following? A.Worm B.Sniffer C.Evil twin D.SQL injection attack E.Ransomware

E.Ransomware

________ is malware that hijacks a user's computer and demands payment in return for giving back access. A.A virus B.An evil twin C.A Trojan horse D.Spyware E.Ransomware

E.Ransomware

Which of the following can be used to help a website achieve a higher ranking with the major search engines? A.IAB B.VPN C.SEM D.RSS E.SEO

E.SEO

________ integrate disparate channels for voice communications, data communications, instant messaging, email, and electronic conferencing into a single experience. A.Modems B.Intranets C.Wireless networks D.Virtual private networks E.Unified communications

E.Unified communications

In the domain name "http://books.azimuth-interactive.com", which element is the second-level domain? A.books B.none; there is no second-level domain in this name C.com D.books.azimuth-interactive E.azimuth-interactive.com

E.azimuth-interactive.com

A(n) ________ signal is a discrete, binary waveform that transmits data coded into two discrete states such as 1-bits and 0-bits. A.broadband B.analog C.modulated D.T1 E.digital

E.digital

A Trojan horse: A.is a type of sniffer used to infiltrate corporate networks. B.is malware named for a breed of fast-moving Near-Eastern horses. C.installs spyware on users' computers. D.is a virus that replicates quickly. E.is software that appears to be benign but does something other than expected.

E.is software that appears to be benign but does something other than expected.

A(n) ________ is software for locating and managing stored web pages. A.modem B.net server C.hub D.router E.web server

E.web server

T/F:A NOS must reside on all the local computers in a network.

F

T/F:Computer networks are based on the same principles as telephone networks.

F

T/F:NFC tags are always passive.

F

T/F:RFID technology is being gradually replaced by less costly technologies such as WSNs.

F

T/F:A computer network consists of at least two computers.

T

T/F:A hub is a networking device that sends packets of data to all other devices on the network.

T

T/F:Apple Pay uses an RFID-related technology called near field communication.

T

T/F:Bandwidth refers to the range of frequencies that can be transmitted by a telecommunications channel.

T

T/F:By 2018, it is estimated that more than 200 million Americans will use mobile search.

T

T/F:Client/server computing has largely replaced centralized mainframe computing.

T

T/F:Coaxial cable is similar to that used for cable television and consists of thickly insulated copper wire.

T

T/F:Computer networks that use packet switching are much more efficient than telephone networks that use circuit switching.

T

T/F:Digital rights activists believe differentiated pricing violates net neutrality principles.

T

T/F:Fiber-optic cable is more expensive and harder to install than wireless media.

T

T/F:In a client/server network, a network server sets the rules of communication for the network.

T

T/F:In a large company today, you will often find an infrastructure that includes hundreds of small LANs linked to each other as well as to corporate-wide networks.

T

T/F:In addition to being an online retailer, Amazon is also a powerful product search engine.

T

T/F:Mobile search makes up more than 50% of all Internet searches.

T

T/F:TCP/IP was developed during the early 1970s to support efforts to help scientists transmit data among different types of computers over long distances.

T

T/F:The "Internet of Things" refers to a vision of a pervasive Web, in which common objects are connected to and controlled over the Internet.

T

T/F:The Domain Name System (DNS) converts domain names to IP addresses.

T

T/F:The Internet of Things is based on billions of Internet-connected sensors throughout the physical world.

T

T/F:Two computers using TCP/IP can communicate even if they are based on different hardware and software platforms.

T

T/F:VoIP technology delivers voice information in digital form using packet switching.

T

T/F:Web 3.0 is an effort to add a layer of meaning to the existing web in order to reduce the amount of human involvement in searching for and processing web information.

T

T/F:Wikis allow visitors to change or add to the original posted material.

T


Kaugnay na mga set ng pag-aaral

Chapter 18 group health insurance

View Set

Forensics exam on Chapters 14, 15, 16, and 17 (Chapter 16)

View Set

Intro to Physical Anthropology Study Guide Test 2

View Set

Folklore of the Middle East Final

View Set

AA Ch. 4, AA Ch. 3, AA Ch.2, AA Ch. 1, Ch 4 AA CONSOLIDATED FINANCIAL STATEMENTS AND OUTSIDE OWNERSHIP: Problems, Ch 3 AA Consolidations-Subsequent to the Date of Acquisition: Problems, Ch 2 AA Consolidation of Financial Information: Problems, accoun...

View Set