Chapter 12
the provision of computing power and disk space to client firms who access it from desktop PCs is known as
Infrastructure-as-a-service
what do you call a system of computers that connects the internal users of an organization that is distributed over a wide geographic area?
Intranet
a ping signal is used to initiate
a smurf attack
in a ring topology
all nodes of equal status; responsibility for managing communications is distributed among the nodes
HTTP
controls Web browsers that access the Web
which one of the following statements is correct?
cookies contain the URLs of sites visited by the user
a digital signature is
derived from the digest of a document that has been encrypted with the sender's private key
which of the following statements is correct? the client server model
distributes both data and processing tasks to the server's node
one advantage of network technology is
file servers permit software and data to be shared with other network users
a star topology is appropriate
for a wide area network with a mainframe for a central computer
which of the following is not a key feature of cloud computing
individual clients have control over the physical location of the service being provided
in a star topology, when the central site fails
individual workstations can function locally but cannot communicate with other workstations
a message that is made to look as though it is coming from a trusted source but is not is called
internet protocol spoofing
IP spoofing
is a form of masquerading to gain unauthorized access to a web server
FTP
is a low-level encryption scheme used to secure transmissions in higher-level () format
a virtual private network
is a private network with a public network
which of the following statements is correct? TCP/IP
is the basic protocol that permits communication between Internet sites.
HTML
is the document format used to produce Web pages
an IP Address:
is the unique address that every computer node and host attached to the Internet must have
NNTP
is used to connect to Usenet groups on the Internet
packet switching
is used to establish temporary connections between network devices for the duration of a communication session
a distributed denial of service (DDoS) attack
may take the form of either a SYN flood or smurf attack
which method does not manage or control data collisions that might occur on a network
multiplexing
to physically connect a workstation to a LAN requires a
network interface card
all of the following are true about the Open System Interface (OSI) protocol except
one protocol is developed and applied to all the OSI layers
which of the following statements is correct?
packet switching is used to establish temporary connections between network devices for the duration of a communication session
this class of cloud computing enables client firms to develop and deploy onto the cloud infrastructure consumer-generated applications using facilities provided by the vendor
platform-as-a-service
the client/server technology
reduces the number of records that must be locked by having the file server perform record searches
network protocols fulfill all of the following objectives except
result in inflexible standards
which topology has a large central computer with direct connections to a periphery of smaller computers? also in this topology, the central computer manages and controls data communications among the network nodes
star topology
the primary difference between a LAN and a WAN is
the geographical area covered by the network
sniffer software is
used by network administrators to analyze network traffic