MIS 315 Quiz 5 (ch.6)
The connection between a VPN client and a VPN server is called a(n) ________. a. tunnel b. bridge c. hyperlink d. access point e. data highway
a. tunnel
Which of the following refers to the three tiers in the three-tier architecture? a. user, server, and database b. IP, IPv4, and IPv6 c. tunnel, switch, and access point d. TCP, IP, and http e. HTML, XML, and JSON
a. user, server, and database
Which of the following is an example of IaaS? a. Microsoft Azure b. Amazon S3 c. Office 365 d. Apple iCloud e. Salesforce.com
b. Amazon S3
In cloud computing, resources are said to be "pooled" because organizations ________. a. use the public Internet to create the appearance of a private connection b. share the same physical hardware through virtualization c. offer their services to each other free of charge, in a give-and-take arrangement d. share the same physical address range e. use open source standards that enable users to modify a program's source code
b. share the same physical hardware through virtualization
For communications equipment, K stands for ________. a. 1,042 b. 1,024 c. 1,000 d. 10,000 e. 100
c. 1000
________ are large-scale high-speed centralized computers, used for internal corporate data processing needs. a. clients b. thin clients c. mainframes d. NAS e. hosts
c. mainframes
Which of the following is defined as the elastic leasing of pooled computer resources over the Internet? a. wiki b. Bluetooth c. the cloud d. SSD e. broadband
c. the cloud
For communications equipment, M stands for ___________. a. 500 b. 1000 c. 1024 d. 1,000,000 e. 15,000
d. 1,000,000
Which of the following is an example of PaaS, a category of cloud hosting? a. Skype b. Microsoft Office 365 c. Amazon S3 d. Microsoft Azure e. iCloud
d. Microsoft Azure
A ________ is a worldwide-unique term that is affiliated with a public IP address. a. DNF b. packet c. URL d. domain name e. hyperlink
d. domain name
Which of the following characteristics is a disadvantage of cloud-based hosting? a. It involves significant requirement of capital. b. It involves high ongoing support costs. c. It involves high cost uncertainties. d. It involves high dependency on vendor. e. It involves high annual maintenance costs.
d. it involves high dependency on vendor
Which of the following features distinguishes a LAN from a WAN? a. A WAN has low bandwidth. b. A WAN has a limit on the number of users. c. A LAN has stringent hardware requirements. d. A LAN is bigger than a WAN. e. A LAN connects computers in a single location.
e. A LAN connects computers in a single location
Which of the following statements is TRUE about a VPN? a. A VPN is only used between hosts on local networks. b. A VPN connection appears as a secure connection, though it is not. c. A VPN network does not provide users with remote access. d. A VPN connection utilizes private networks instead of the public network. e. A VPN client software encrypts messages to ensure secure transmissions.
e. A VPN client software encrypts messages to ensure secure transmissions
Which of the following TCP/IP application-layer protocols is used to move files over the Internet and maintain Web sites? a. http b. smtp c. rdp d. https e. ftp
e. ftp
Which of the following is an example if SaaS? a. Amazon S3 b. Microsoft Azure c. Google App Engine d. Orcale on Demand e. iCloud
e. iCloud
Which of the following is a benefit of in-house hosting? a. no obsolescence b. superior flexibility and adaptability to growing or fluctuating demand c. lower capital requirements d. fewer training requirements e. in-depth visibility of security and disaster preparedness
e. in-depth visibility of security and disaster preparedness
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. a. processor b. databasse c. application d. server e. network
e. network