Business Data Communications Chapter 13 , 14 & 15
____ scanning works by recognizing the unique pattern of a virus. a.Frequency-based b.Amplitude-based c.Signature-based d.Time-based
c.Signature-based
Many certificates conform to the ____ standard. a.X.409 b.X.309 c.X.609 d.X.509
d.X.509
A ____ map can show how individual workstations or groups of workstations are clustered with switches, routers, hubs, and server farms.
local area detailed connectivity
When a company is evaluating a project's ____ feasibility, the company must ask: Can the proposed system be designed, built, tested, and installed in an amount of time that all parties find reasonable and to which they can agree?
operational
The intent of SDLC is for ____ not to be disjointed steps in a big plan, but overlapping layers of activity.
phases
If e-mail messages have a return address of someone other than the person actually sending the e-mail, then the sender is ____. a.spoofing b.firewalling c.e-mail bombing d.smurfing
a.spoofing
____ involves electronically monitoring data flow and system requests into and out of their systems. a.Routers b.Intrusion detection c.Firewalls d.Worms
b.Intrusion detection
The concept of two keys, public and private, is called ____ cryptography. a.symmetric b.public key c.secret key d.private key
b.public key
A ____ cipher is different from a substitution-based cipher in that the order of the plaintext is not preserved. a.monoalphabetic b.transposition-based c.polyalphabetic d.multialphabetic
b.transposition-based
To learn new skills and demonstrate proficiency within a particular area, the network administrator can obtain ____.
certification
____ is the name of a particularly nasty automated program that attacks a network by exploiting Internet Protocol (IP) broadcast addressing and other aspects of Internet operation. a.Spoofing b.E-mail bombing c.Firewalling d.Smurfing
d.Smurfing
____ usually involves having a software program that monitors every transaction within a system. a.Computer auditing b.Firewalling c.Routing d.Access rights
a. Computer auditing
