code hs

Ace your homework & exams now with Quizwiz!

A company's server is flooded with data until it can no longer cope with the volume, rendering the server unreachable. What type of attack is this?

(Distributed) Denial of Service

To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works.

A government filtering search results to limit the access of information and suppress discussion amongst its citizens

What is the Internet Protocol (IP)?

A protocol that defines the structure of an Internet address and assigns a unique address to every device on the Internet

What information is contained in a packet?

A small part of a digital message, and metadata about the message, including where it came from and where it is going.

Tracking how long network users spend on FaceBook or Instagram is an example of:

Accounting

How is the bandwidth of a network measured?

Bitrate. Higher bitrate means higher bandwidth.

True or False: The Internet is non-existent in the developing world.

False

Which of the following statements are true about the Internet? I - The Internet connects devices and networks all over the world II - The Internet helps people collaborate to solve problems III - The Internet helps people communicate IV - There are no negative consequences of the Internet, it is purely positive

I, II, and III

What is the purpose of packet metadata?

Metadata helps route the data to the correct destination, and helps piece the data together at the destination

What does redundancy mean in the context of Internet routing?

Multiple paths exist between any two points

Which of the following refers to a widely agreed upon set of rules that standardize communication between machines?

Protocol

Which of the following makes sure that each request is forwarded to its intended recipient?

Router

Which of the following is a benefit of the fault-tolerant nature of Internet routing?

The ability to provide data transmission even when some connections between routers have failed

What is the bitrate of a system?

The amount of data (in bits) that can be sent in a fixed amount of time

What is the latency of a system?

Time it takes for a bit to travel from sender to receiver

Which of the following protocols allows for sending multiple packets between two computers by checking that all packets arrived and that they can be put back together in the proper order?

Transmission Control Protocol (TCP)

True or False: The Internet is a network connecting individual networks.

True

Which of the following does not demonstrate a harmful consequence of increased anonymity on the Internet?

Users can avoid targeted discrimination in an online forum.

According to the Domain Name System (DNS), which of the following is a subdomain of the domain example.com?

about.example.com

Social engineering is one of the most effective ways to attack a network.

true

Having network users login with a username and password is an example of:

Authentication

Allowing network users to delete certain files from a directory is an example of:

Authorization

AAA in network security is a protocol that stands for:

Authorization, Authentication, Accounting

A user enters a Web address in a browser, and a request for a file is sent to a Web server. Which of the following best describes how the file is sent back to the user?

The file is broken into packets and sent over a network. The packets must be reassembled by the user's computer when they are received. If any packets are missing, the browser re-requests the missing packets.

IP addresses are hierarchical. This means:

The information in an IP address goes from broad to specific.

What is the purpose of the Digital Millennium Copyright Act?

To criminalize the act of circumventing, or getting around, access controls that block access to copyrighted works.

What is the function of the Domain Name System (DNS)?

To translate domain names into IP addresses

True or False: All data sent over the Internet is broken down into several packets and sent over the network.

true


Related study sets

NurseLogic 2.0: Knowledge and Clinical Judgement - Advanced Test

View Set

Women's Health - Exam 1: Maternal Adaptation and Nursing Management During Pregnancy

View Set

Basic Human Needs:Physiological Concepts Oxygenation, Page 35

View Set

Collaborative Research (RCR-Basic)

View Set