AP CSP Internet Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A common way that DDoS attacks are propagated is via botnets... Why might this method be preferred by cyber criminals for the purpose of DDoS attacks? Select two answers.

- Botnets do not require the attacker to be revealed, since computers in a botnet do not communicate with a centralized server. - Since botnets can contain many different computers, DDoS attacks can be made much more powerful.

What are the benefits of the internet's having an end-to-end architecture? Select two answers.

- New devices are more easily connected since they do not need to be registered on a central server. - Computational processes do not have to worry about a server's being online to work.

At least how many connections must be damaged to prevent the client and server from communicating?

2

How many addresses can be created using IPv6?

2^128

Which of the following is NOT an example of a human component within a cyber attack?

A website, which has been hacked, utilizes backdoor protocols in the browser or operating system to secretly download and run a virus.

Which of the following is an example of the effects that cyber attacks can have on the world at large?

All of the above

What is the advantage of using public key encryption for encrypted communications?

Anyone can encrypt a message to the receiver without having to know how to decrypt it.

Why are most websites designed to work within the boundaries of current web protocols, even when it limits a website's capabilities?

Because the protocols are supported by all current web browsers, potential incompatibilities are minimized.

In many old dial-up internet systems... Which of the following describes why this occurs?

Data packets travel slowly on dial-up systems, so each portion of the image was displayed as it was received.

Which of the following describes the characteristics of the internet and its systems?

II and III only (Hierarchical organization; Redundant connections)

What is the purpose of the transmission control protocol/internet protocol (TCP/IP) suite?

It controls the way data is made into packets, addressed, transmitted, and reassembled.

Which of the following protocols are NOT utilized by devices on the internet?

None of the above

How do open standards ensure the security of encrypted data?

Open standards have their flaws publicly documented, which means there are more people that can repair or mitigate those flaws.

How does the DNS hierarchy scale the system?

Since URLs are arranged in a hierarchical system, it is easier for new websites to be added and organized into the DNS.

Which of the following illustrates how the internet's hierarchy can improve scalability?

Since the IP address gives the target's network, transmissions can look for the network first instead of immediately searching for the individual target.

In the following URL, what is the lowest level of the domain's syntax hierarchy?

tovuti.net/ukurasa

How is math utilized in cryptography?

Bits and group of bits (e.g., characters) are modified by utilizing mathematical and algebraic principles.

How does redundancy improve the scaling of the internet?

Redundancy makes end-to-end connections more reliable, which means that more devices are able to communicate without interruption.

DNS responses often do not have digital signatures... Why might this be a problem?

There is no way to determine if a user is redirected to a malicious DNS.

What role do the secure sockets layer (SSL) and transport layer security (TLS) protocols play in web communication?

SSL and TLS encrypt communications to ensure that the data cannot be read if it is intercepted.

From 1995 to 1999... Which of the following could be a reason for the replacement?

SSL's security measures had been circumvented, so evolving internet protocols had to be changed to maintain integrity of data.

For an IP address similar to 184.89.187.64, which of the following is an example of hierarchy in IP addresses?

The first few digits of an address identify the network, while the rest specify a device on the network.

What is the purpose of transitioning from IPv4 to IPv6?

The rise of internet-connected devices means that the number of available unique IPv4 addresses is sharply decreasing, and IPv6 will allow for more addresses.

The internet is built on open standards. In this context, what does "open" mean?

The standards are made freely available and can be used by anyone.

Which of the following is an example of cybersecurity being implanted through hardware?

To protect against malicious programs, all files downloaded to a computer are scanned for viruses by an antivirus program.

Suppose that a certain encryption program works by... Could this be decrypted using symmetric encryption? If so, what would be the encryption key?

Yes, the key would be equal to n.


Set pelajaran terkait

ECON - Monetary Policy Smartbook

View Set

WGU Course C840 - Digital Forensics in Cybersecurity Quizlet by Brian MacFarlane

View Set

Chp 10: Pretrial Activities and the Criminal Trial

View Set

Chapter 40: Mechanisms of Endocrine Control Patho Prep U

View Set

HEPATOBILIARY AND PANCREATIC DISORDERS PRACTICE Q'S

View Set

제13과 어디에 가요? 재외동포를 위한 한국어 1-1 (한러)

View Set