Data, Security, and Network Test

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following best exemplifies the use of keylogging to gain unauthorized access to a computer system?

A. A user unintentionally installs a program on their computer that records all user input and forwards it to another computer. A few weeks later, someone else is able to access the user's computer using the recorded data.

Which of the following is an example of an attack using a rogue access point?

A. An unauthorized individual gains the ability to view network traffic by connecting to a network router that uses weak or no security measures.

Which of the following best explains how IP addresses are assigned?

A. As a new device is connected to the Internet, it is assigned an IP address to enable communication on the network.

Researchers have developed a simulation of packets traveling between server computers and client computers in a network. Of the following, which two outcomes are most likely to be results of the simulation? Select two answers.

A. Better understanding of the effect of temporarily unavailable network connections D. Better understanding of the impact of increased connection speeds for frequently visited servers

A user wants to save a data file on an online storage site. The user wants to reduce the size of the file, if possible, and wants to be able to completely restore the file to its original version. Which of the following actions best supports the user's needs?

A. Compressing the file using a lossless compression algorithm before uploading it

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. Which of the following explains a benefit of using open standards and protocols for Internet communication?

A. Open standards and protocols allow different manufacturers and developers to build hardware and software that can communicate with hardware and software on the rest of the network.

A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

A. Public key encryption enables parties to initiate secure communications through an open medium, such as the Internet, in which there might be eavesdroppers.

Which of the following best explains how symmetric encryption algorithms are typically used?

A. Symmetric encryption uses a single key that should be kept secret. The same key is used for both encryption and decryption of data.

The following figure represents a network of physically linked devices labeled P through S. A line between two devices indicates a connection. Devices can communicate only through the connections shown. Which of the following statements best explains the ability of the network to provide fault tolerance?

A. The network is considered fault-tolerant because there are redundant paths between each pair of devices.

Directions: The question or incomplete statement below is followed by four suggested answers or completions. Select the one that is best in each case. The following figures represent different ways of configuring a network of physically linked computers labeled P, Q, R, and S. A line between two computers indicates that the computers can communicate directly with each other. In which configuration is it NOT possible to have redundant routing between computers P and S?

B

Which of the following is an advantage of a lossless compression algorithm over a lossy compression algorithm?

B. A lossless compression algorithm can guarantee reconstruction of original data, while a lossy compression algorithm cannot.

An individual receives an e-mail that appears to be from an insurance company. The message offers a low insurance rate, and prompts the recipient to click a link to learn more. Which of the following is most indicative that the e-mail is part of a phishing attempt?

B. After clicking the link, a Web page opens that prompts the recipient for personal information.

A bank customer receives an e-mail from a sender claiming to be a bank employee. The e-mail asks the customer to provide personal information and to call a phone number if he or she has any questions. The customer suspects the e-mail might be a phishing attempt. Which of the following responses is most likely to be a privacy risk for the bank customer?

B. Calling the phone number given in the e-mail and providing the personal information over the phone

A digital photo file contains data representing the level of red, green, and blue for each pixel in the photo. The file also contains metadata that describes the date and geographic location where the photo was taken. For which of the following goals would analyzing the metadata be more appropriate than analyzing the data?

B. Determining the likelihood that the photo was taken at a particular public event

Which of the following is an example of symmetric encryption?

B. Finn and Gwen develop a system that maps each letter of the alphabet to a unique symbol using a secret key. Finn uses the key to write a message to Gwen where each letter is replaced with the corresponding symbol. Gwen uses the key to map each symbol back to the original letter.

When a cellular telephone user places a call, the carrier transmits the caller's voice as well as the voice of the person who is called. The encoded voices are the data of the call. In addition to transmitting the data, the carrier also stores metadata. The metadata of the call include information such as the time the call is placed and the phone numbers of both participants. For which of the following goals would it be more useful to computationally analyze the metadata instead of the data? I. To determine if a caller frequently uses a specific word II. To estimate the number of phone calls that will be placed next Monday between 10:30 A.M. and noon. III. To generate a list of criminal suspects when given the telephone number of a known criminal

B. II only

Internet protocol version 6 (IPv6) has been introduced to replace the previous version (IPv4). Which of the following best describes a benefit of IPv6 over IPv4?

B. IPv6 allows for a greater number of addresses than IPv4, which allows more devices to be connected to the Internet.

Which of the following statements about the Internet is true?

B. The Internet is designed to scale to support an increasing number of users.

Which of the following best explains how messages are typically transmitted over the Internet?

B. The message is broken into packets. The packets can be received in any order and still be reassembled by the recipient's device.

Which of the following can be represented by a single binary digit? Select two answers.

B. The remainder when dividing a whole number by 2 C. The value of a Boolean variable

A color in a computing application is represented by an RGB triplet that describes the amount of red, green, and blue, respectively, used to create the desired color. A selection of colors and their corresponding RGB triplets are shown in the following table. Each value is represented in decimal (base 10). Color NameRGB Tripletindigo (75, 0, 130)ivory(255, 255, 240)light pink(255, 182, 193)​light yellow(255, 255, 224)magenta(255, 0, 255)neutral gray(127, 127, 112)pale yellow(255, 255, 160)vivid yellow(255, 255, 14) What is the binary RGB triplet for the color indigo?

C. (01001011, 00000000, 10000010)

An online store uses 6-bit binary sequences to identify each unique item for sale. The store plans to increase the number of items it sells and is considering using 7-bit binary sequences. Which of the following best describes the result of using 7-bit sequences instead of 6-bit sequences?

C. 2 times as many items can be uniquely identified.

A video-streaming Web site uses 32-bit integers to count the number of times each video has been played. In anticipation of some videos being played more times than can be represented with 32 bits, the Web site is planning to change to 64-bit integers for the counter. Which of the following best describes the result of using 64-bit integers instead of 32-bit integers?

C. 2^32 times as many values can be represented.

A certain computer has two identical processors that are able to run in parallel. Each processor can run only one process at a time, and each process must be executed on a single processor. The following table indicates the amount of time it takes to execute each of three processes on a single processor. Assume that none of the processes are dependent on any of the other processes. ProcessExecution Time onEither ProcessorX60 secondsY30 secondsZ50 seconds Which of the following best approximates the minimum possible time to execute all three processes when the two processors are run in parallel?

C. 80 seconds

Which of the following best exemplifies the use of multifactor authentication?

C. A Web site requires a user to enter a password as well as a numeric code received via text message before the user can log in to an account.

Which of the following scenarios best exemplifies a phishing attack?

C. A user receives an e-mail from a sender offering technical help with the user's computer. The e-mail prompts the user to start a help session by clicking a provided link and entering the username and password associated with the user's computer.

A certain programming language uses 4-bit binary sequences to represent nonnegative integers. For example, the binary sequence 0101 represents the corresponding decimal value 5. Using this programming language, a programmer attempts to add the decimal values 14 and 15 and assign the sum to the variable total. Which of the following best describes the result of this operation?

C. An overflow error will occur because 4 bits is not large enough to represent 29, the sum of 14 and 15.

The figure below shows two possible network configurations for devices P through V. A line between two devices indicates a connection. Devices can communicate only through the connections shown. In which of the configurations is it possible to have redundant routing between devices Q and V?

C. Both configuration I and configuration II

Digital images are often represented by the red, green, and blue values (an RGB triplet) of each individual pixel in the image. A photographer is manipulating a digital image and overwriting the original image. Which of the following describes a lossless transformation of the digital image?

C. Creating the negative of an image by creating a new RGB triplet for each pixel in which each value is calculated by subtracting the original value from 255. The negative of an image is reversed from the original; light areas appear dark, and colors are reversed.

Biologists often attach tracking collars to wild animals. For each animal, the following geolocation data is collected at frequent intervals. The time The date The location of the animal Which of the following questions about a particular animal could NOT be answered using only the data collected from the tracking collars?

C. Do the movement patterns of the animal vary according to the weather?

The figure below represents a network of physically linked devices labeled A through I. A line between two devices indicates that the devices can communicate directly with each other. Any information sent between two devices that are not directly connected must go through at least one other device. For example, in the network represented below, information can be sent directly between A and B, but information sent between devices A and G must go through other devices. Which of the following statements is true about the network?

C. If devices B and F fail, then device A will not be able to communicate with device G.

ASCII is a character-encoding scheme that uses 7 bits to represent each character. The decimal (base 10) values 65 through 90 represent the capital letters A through Z, as shown in the table below. What ASCII character is represented by the binary (base 2) number 1001010 ?

C. J

A programmer is developing software for a social media platform. The programmer is planning to use compression when users send attachments to other users. Which of the following is a true statement about the use of compression?

C. Lossy compression of an image file generally provides a greater reduction in transmission time than lossless compression does.

A computer has two processors that are able to run in parallel. The table below indicates the amount of time it takes either processor to execute four different processes. Assume that none of the processes is dependent on any of the other processes. ProcessExecution TimeW20 secondsX30 secondsY45 secondsZ50 seconds A program is used to assign processes to each of the processors. Which of the following describes how the program should assign the four processes to optimize execution time?

C. Processes W and Z should be assigned to one processor, and processes X and Y should be assigned to the other processor.

Which of the following activities poses the greatest personal cybersecurity risk?

C. Reserving a hotel room by e-mailing a credit card number to a hotel

An Internet user has a need to send private data to another user. Which of the following provides the most security when transmitting private data?

C. Sending the data using public-key encryption

In which of the following situations would it be most appropriate to choose lossy compression over lossless compression?

C. Storing music files on a smartphone in order to maximize the number of songs that can be stored

Which of the following best describes the relationship between the World Wide Web and the Internet?

C. The World Wide Web is a system of linked pages, programs, and files that is accessed via a network called the Internet.

The transmission control protocol (TCP) and Internet protocol (IP) are used in Internet communication. Which of the following best describes the purpose of these protocols?

C. To establish a common standard for sending messages between devices on the Internet

Which of the following best explains how a certificate authority is used in protecting data?

D. A certificate authority verifies the authenticity of encryption keys used in secured communications.

Individuals sometimes attempt to remove personal information from the Internet. Which of the following is the LEAST likely reason the personal information is hard to remove?

D. All personal information is stored online using authentication measures, making the information hard to access.

A video game character can face toward one of four directions: north, south, east, and west. Each direction is stored in memory as a sequence of four bits. A new version of the game is created in which the character can face toward one of eight directions, adding northwest, northeast, southwest, and southeast to the original four possibilities. Which of the following statements is true about how the eight directions must be stored in memory?

D. Four bits are enough to store the eight directions.

Open protocols provide a way to standardize data transmission between different devices.

D. Guest users will be restricted in the maximum amount of data that they can send and receive per second.

Which of the following is a primary reason for the use of open protocols on the Internet?

D. Open protocols provide a way to standardize data transmission between different devices.

Which of the following best describes the ability of parallel computing solutions to improve efficiency?

D. The efficiency of a solution that can be broken down into parallel portions is still limited by a sequential portion.

In public key cryptography, the sender uses the recipient's public key to encrypt a message. Which of the following is needed to decrypt the message?

D. The recipient's private key

Which of the following best explains how devices and information can be susceptible to unauthorized access if weak passwords are used?

D. Unauthorized individuals can use data mining and other techniques to guess a user's password.

A Web site uses several strategies to prevent unauthorized individuals from accessing user accounts. Which of the following is NOT an example of multifactor authentication?

D. When a user enters an incorrect password more than two times in a row, the user is locked out of the account for 24 hours.

Consider the following numeric values. Binary 1011 Binary 1101 Decimal 5 Decimal 12 Which of the following lists the values in order from least to greatest?

Decimal 5, binary 1011, decimal 12, binary 1101

A user unintentionally installs keylogging software on a computer. Which of the following is an example of how the keylogging software can be used by an unauthorized individual to gain access to computing resources?

The software records all user input on the computer. The recorded information is transmitted to an unauthorized individual, who analyzes it to determine the user's login passwords.


Set pelajaran terkait

Microecon Exam (ch. 14, 15, 16, 17, 18)

View Set

AP Human Geography Midterm Review

View Set

Chapter 9: Outlining Your Speech

View Set

Solving Systems of Linear Inequalities

View Set

Week 4 Retention Quiz Chapters 3 & 11

View Set