Chapter 12

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

the provision of computing power and disk space to client firms who access it from desktop PCs is known as

Infrastructure-as-a-service

what do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?

Intranet

a ping signal is used to initiate

a smurf attack

in a ring topology

all nodes of equal status; responsibility for managing communications is distributed among the nodes

HTTP

controls Web browsers that access the Web

which one of the following statements is correct?

cookies contain the URLs of sites visited by the user

a digital signature is

derived from the digest of a document that has been encrypted with the sender's private key

which of the following statements is correct? the client server model

distributes both data and processing tasks to the server's node

one advantage of network technology is

file servers permit software and data to be shared with other network users

a star topology is appropriate

for a wide area network with a mainframe for a central computer

which of the following is not a key feature of cloud computing

individual clients have control over the physical location of the service being provided

in a star topology, when the central site fails

individual workstations can function locally but cannot communicate with other workstations

a message that is made to look as though it is coming from a trusted source but is not is called

internet protocol spoofing

IP spoofing

is a form of masquerading to gain unauthorized access to a web server

FTP

is a low-level encryption scheme used to secure transmissions in higher-level () format

a virtual private network

is a private network with a public network

which of the following statements is correct? TCP/IP

is the basic protocol that permits communication between Internet sites.

HTML

is the document format used to produce Web pages

an IP Address:

is the unique address that every computer node and host attached to the Internet must have

NNTP

is used to connect to Usenet groups on the Internet

packet switching

is used to establish temporary connections between network devices for the duration of a communication session

a distributed denial of service (DDoS) attack

may take the form of either a SYN flood or smurf attack

which method does not manage or control data collisions that might occur on a network

multiplexing

to physically connect a workstation to a LAN requires a

network interface card

all of the following are true about the Open System Interface (OSI) protocol except

one protocol is developed and applied to all the OSI layers

which of the following statements is correct?

packet switching is used to establish temporary connections between network devices for the duration of a communication session

this class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor

platform-as-a-service

the client/server technology

reduces the number of records that must be locked by having the file server perform record searches

network protocols fulfill all of the following objectives except

result in inflexible standards

which topology has a large central computer with direct connections to a periphery of smaller computers? also in this topology, the central computer manages and controls data communications among the network nodes

star topology

the primary difference between a LAN and a WAN is

the geographical area covered by the network

sniffer software is

used by network administrators to analyze network traffic


संबंधित स्टडी सेट्स

Ancient Persia and Its Context 2

View Set

CIS 105 Sound Byte: Plagiarism and Intellectual Property

View Set

Organelles involved in Processing Proteins

View Set

Brunner & Suddarth's 27: Management of Patients With Coronary Vascular Disorders

View Set

ST-502 Terms_Lecture 11_Original Sin

View Set

Midterm/Final Review (Application)

View Set

Psychology of Human Dev. Chp 17 (quiz questions)

View Set

K selected and R selected species

View Set