Computer Science - Networking/ Internet
Which of the following makes sure that each request is forwarded to its intended recipient? a. Network b. Router c. Bits d. Computer Systems
b
Tracking how long network users spend on FaceBook or Instagram is an example of: a. Authentication b. Authorization c. Accounting d. Accessibility
c
A company's server is flooded with data until it can no longer cope with the volume, rendering the server unreachable. What type of attack is this? a. Man in the Middle Attack b. IP Address Spoofing c. Packet Sniffing d. (Distributed) Denial of Service
d
According to the Domain Name System (DNS), which of the following is a subdomain of the domain example.com? a. example.com/home b. example.org c. example.com.org d. about.example.com
d
a
Consider the following network diagram: Each box represents a device connected to the network, each line represents a direct connection between two devices. Which of the following statements are true about this network: I - The network is fault tolerant. If one connection fails, any two devices can still communicate. II - Computers C and E need to first communicate with at least one other device in order to communicate with each other. a. I only b. II only c. I and II d. Neither I nor II
True or False: The Internet is non-existent in the developing world. a. True b. False
b
A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user? a. The file is broken into packets and sent over a network. The packets must be reassembled by the user's computer when they are received. If any packets are missing, the browser re-requests the missing packets. b. The file is broken into packets and sent over a network. The user's browser must request each packet, in order, until all packets are received. c. The server repeatedly attempts to connect directly to the user's computer until a connection is made. Once the connection is made, the entire file is sent. d. The server attempts to connect directly to the user's computer. If the connection is successful, the entire file is sent at once. If the connection is unsuccessful, an error message is sent to the user.
a
How is the bandwidth of a network measured? a. Bitrate. Higher bitrate means higher bandwidth. b. Voltage. Higher voltage means higher bandwidth. c. Frequency of waves. Higher frequency means higher bandwidth. d. Light. More light means higher bandwidth.
a
IP addresses are hierarchical. This means: a. The information in an IP address goes from broad to specific. b. Addresses can be expressed in 32 bits. c. Protocols are used to standardize communication between machines. d. Only certain machines employ IP addresses to send and receive data.
a
True or False: All data sent over the Internet is broken down into several packets and sent over the network. a. True b. False
a
True or False: The Internet is a network connecting individual networks. a. True b. False
a
What does redundancy mean in the context of Internet routing? a. Multiple paths exist between any two points b. For any two points on the Internet, there exists only one path between them c. Data sent over the Internet is sent to the router with the lowest cost. d. If a single router on a network breaks, the entire network fails.
a
Which of the following does not demonstrate a harmful consequence of increased anonymity on the Internet? a. Users can avoid targeted discrimination in an online forum. b. People can create avatars to interact inappropriately with other users in a forum. c. People can post hate speech in video comments without consequences. d. People can easily create fake profiles to impersonate others online.
a
Which of the following refers to a widely agreed upon set of rules that standardize communication between machines? a. Protocol b.Internet c. Network d. Copyright
a
Which of the following statements about Internet Protocols is true? a. TCP/IP, DNS, Routing, all work together to send packets over the internet HTTP makes sure the information inside the packets can be understood b. HTTP/IP and Routing work together to send packets over the internet TCP and DNS make sure the information inside the packets can be understood c. Routing sends packets over the internet HTTP/IP, TCP and DNS all work together to make sure the information inside the packets can be understood d. Routing and DNS send packets over the internet HTTP/IP and TCP work together to make sure the information inside the packets can be understood
a
What is the bitrate of a system? a. The number of bits used to encode a single letter b. The amount of data (in bits) that can be sent in a fixed amount of time c. The strength of the network connection d. The distance that data needs to travel in a network
b
AAA in network security is a protocol that stands for: a. American Automobile Association b. Authorization, Authentication, Accounting c. Access All Areas d. Advanced Accelerator Applications
b
Allowing network users to delete certain files from a directory is an example of: a. Authentication b. Authorization c. Accounting d. Availability
b
Social engineering is one of the most effective ways to attack a network. a. True b. False
b
True or False: If packets arrive out of order, all of the packets need to be sent again so they can be pieced together correctly. a. True b. False
b
What is the function of the Domain Name System (DNS)? a. To sell website names to web developers b. To translate domain names into IP addresses c. To make sure that each IP address has only one corresponding domain name d. To assign a unique domain name to every computer
b
What is the purpose of packet metadata? a. Metadata contains information about the protocols a specific computer uses to create and send packets. b. Metadata helps route the data to the correct destination, and helps piece the data together at the destination c. Metadata helps humans understand what type of data they are receiving over a network d. Metadata helps calculate the best route for a packet to take to its destination
b
Which of the following is a benefit of the fault-tolerant nature of Internet routing? a. The ability to use a hierarchical naming system to avoid naming conflicts b. The ability to provide data transmission even when some connections between routers have failed c. The ability to resolve errors in domain name system (DNS) lookups d. The ability to use multiple protocols such as hypertext transfer protocol (HTTP), Internet protocol (IP), and simple mail transfer protocol (SMTP) to transfer data.
b
What are the benefits of keeping a log of all transactions that occur on your network and reviewing them? a. It can be time-consuming and overwhelming to review logs. b. You can anticipate and prevent attacks before they happen. c. You can find and respond to attacks that have happened. d. You may inadvertently make information hard to access for authorized users.
c
What is the Internet Protocol (IP)? a. A set of rules describing what behavior is acceptable on the Internet b. A law that says that the Internet is for everyone c. A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet d. An agreement that sets a limit on the number of computers than can be on the Internet at any given time
c
What is the latency of a system? a. The amount of data (in bits) that can be transmitted at any given time b. The distance that data needs to travel in a network c. The time it takes for a bit to travel from sender to receiver d. The strength of the network connection
c
Which of the following statements are true about the Internet? I - The Internet connects devices and networks all over the world II - The Internet helps people collaborate to solve problems III - The Internet helps people communicate IV - There are no negative consequences of the Internet, it is purely positive a. II only b. I and II c. I, II, and III d. I, II, III, and IV
c
What information is contained in a packet? a. The entirety of a digital message b. The entirety of a digital message, and metadata about the message, including where it came from and where it is going. c. A small part of a digital message. d. A small part of a digital message, and metadata about the message, including where it came from and where it is going.
d
What is the purpose of the Digital Millennium Copyright Act? a. To make all content on the Internet free for everyone to use. b. To allow for open source software on the Internet. c. To criminalize plagiarism on the Internet. d. To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works.
d
Which of the following is an example of censorship on the Internet? a. People watching movies from an unauthorized streaming site b. Students using the anonymity of the Internet to harass somebody at school c. Students using the Internet to find homework answers d. A government filtering search results to limit the access of information and suppress discussion amongst its citizens
d
Which of the following protocols allows for sending multiple packets between two computers by checking that all packets arrived and that they can be put back together in the proper order? a. Internet Protocol (IP) b. HyperText Transfer Protocol (HTTP) c. HyperText Transfer Protocol Secure (HTTPS) d. Transmission Control Protocol (TCP)
d
Which of the following would not be considered suspicious behavior by an intrusion detection system (IDS)? a. A user tries to access a password file b. A large amount of data is sent somewhere outside of the network c. An employee is on vacation, but somebody is accessing the network from their account d .An employee accesses a file they are authorized to view during business hours
d