MIS 3000 Ch 6
Which of the following is true about a VPN? A. The actual internal LAN addresses are sent in the VPN messages on the Internet. B. It appears as a secure connection, though it is not. C. It uses private networks instead of the public network. D. It does not provide users with remote access. E. It encrypts messages to ensure secure transmissions.
E. It encrypts messages to ensure secure transmissions.
Which of the following is the distinguishing feature of a LAN as compared to a WAN? A. Network hardware B. Bandwidth C. Communication capacity D. Number of users E. Single location
E. Single location
A common protocol that enables files to be moved from one computer to another over the Internet is _________. A. FTP Your answer is correct.B. SMTP C. SNMP D. XML E. HTTPS
A. FTP
Among the following, which is NOT likely to be a way for Falcon Security to use the cloud? A. Use Rackspace for hardware and load whatever operating system they want. Your answer is correct.B. Use Google Mail and Google Drive. C. Obtain data storage services from Amazon.com's S3 product. D. Use Windows Servers with SQL Server already installed from the Microsoft Azure cloud offerings. E. Use a CDN to distribute its content worldwide.
A. Use Rackspace for hardware and load whatever operating system they want.
Communication carriers are unhappy with the regulations that impose ________ and are currently engaged in legal battles to eliminate the concept. A. net neutrality Your answer is correct.B. bandwidth limits C. wide area networks D. maximum transmission speeds E. hop restrictions
A. net neutrality
In order to get on the Internet from a location such as a coffee shop, your device uses your __________, which is then substituted with the shop LAN's _________. A. private IP address; public IP address This is the correct answer.B. local IP address; public IP address Your answer is not correct.C. public IP address; private IP address D. private IP address; global IP address E. local IP address; global IP address
A. private IP address; public IP address
An important cloud design philosophy that defines all interactions among computing devices as services in a formal standardized way is termed the ________. A. service-oriented architecture Your answer is correct.B. service-options available C. seamless-operations architecture D. standard-operational access E. simple-option access
A. service-oriented architecture
Since companies do not know precisely how much demand will be placed on their computing resources in the future, an attractive element of using the cloud is the fact that it is ________. A. unpredictable B. elastic Your answer is correct.C. dynamic D. variable E. flexible
B. elastic
A computer ________ is a collection of computers that communicate with one another over transmission lines or wirelessly. A. farm B. network Your answer is correct.C. database D. application E. server
B. network
The most likely reason that an organization should not consider using the cloud is ______. A. the organization faces too much competition in its industry segment B. the organization is legally prohibited from losing physical control over its data Your answer is correct.C. the organization wants to wait for the cloud to mature D. the organization is not technically sophisticated E. the organization feels the clouds benefits are unclear
B. the organization is legally prohibited from losing physical control over its data
The following are all disadvantages of in-house hosting compared to use of the cloud, except ______. A. capital investment B. visibility of security measures Your answer is correct.C. development effort D. flexibility and adaptability to fluctuating demand E. obsolescence risk
B. visibility of security measures
The computers in two separated company sites must be connected using a(n) ________. A. local area network (LAN) B. wide area network (WAN) Your answer is correct.C. protocol D. Internet E. intranet
B. wide area network (WAN)
Suppose Falcon Security wished to utilize a vendor's application software in the cloud. It would need to obtain ________ cloud resources. A. IaaS (Infrastructure as a Service) B. WaaS (Web as a Service) C. SaaS (Software as a Service) Your answer is correct.D. PaaS (Platform as a Service) E. DaaS (Data as a Service)
C. SaaS (Software as a Service)
A wireless protocol that is becoming ever more common as everyday objects become "smart" devices is _________. A. Jetblack B. Greenline C. Whitehot D. Bluetooth Your answer is correct.E. Redhat
D. Bluetooth
Which of the following is the most accurate and complete definition of the cloud? A. A bubble on a network diagram B. Computers somewhere out there C. Easily accessible data storage D. Elastic leasing of pooled computer resources over the Internet Your answer is correct.E. Computing resources available to anyone
D. Elastic leasing of pooled computer resources over the Internet
The method of obtaining cloud-based services that includes hardware infrastructure, operating system, and possibly a DBMS is termed _______. A. WaaS (Web as a Service) B. IaaS (Infrastructure as a Service) C. DaaS (Data as a Service) D. PaaS (Platform as a Service) This is the correct answer.E. SaaS (Software as a Service)
D. PaaS (Platform as a Service)
_______ agreements ensure that communications carriers exchange traffic on their networks freely. A. Exchange B. Neutral Your answer is not correct.C. Free use D. Peering This is the correct answer.E. Hopping
D. Peering
A negative consequence of the expanding use of the cloud will be ______. A. higher costs of cloud services B. reduced availability of cloud services C. slower performance of cloud-based services D. fewer local jobs that focus on the installation and support of email and other servers Your answer is correct.E. large increases in cloud vendor data center job openings
D. fewer local jobs that focus on the installation and support of email and other servers
Advantages of content delivery networks (CDNs) include all of the following except ________. A. increased reliability B. protection from DOS attacks C. faster load times D. higher costs to mobile users Your answer is correct.E. pay-as-you-go
D. higher costs to mobile users
A network that relies primarily on wireless connection of devices located near to a single person is a ___________. A. local area network B. wide area network C. limited area network D. personal area network Your answer is correct.E. private area network
D. personal area network
A ________ is a set of rules that programs on two communicating devices follow. A. signal B. packet C. filter D. protocol Your answer is correct.E. language
D. protocol
The sharing of physical hardware by many organizations in the cloud, termed pooling, is accomplished with ____________. A. provisioning B. segmentation C. visualization D. virtualization Your answer is correct.E. separation
D. virtualization
Which of the following statements is NOT correct for private clouds? A. Private clouds provide security within the organizational infrastructure. B. They create a farm of servers managed with elastic load balancing. C. Private clouds can possibly provide secure access from outside that infrastructure. Your answer is not correct.D. They are built on top of public cloud infrastructure using VPN tunneling. E. They enable the business to maintain physical control over its stored data.
E. They enable the business to maintain physical control over its stored data.
Your Internet Service Provider serves all of the following functions except _________. A. collects money from its customers for its services B. pays access fees to communication carriers to help pay for the Internet C. provides you a gateway to the Internet D. provides you with a legitimate Internet address E. allows you to access a personal area network (PAN)
E. allows you to access a personal area network (PAN)
On a typical e-commerce Web site, a component called the ________ contains programs that obtain product data from a database, manage the shopping cart, and coordinate the checkout process. A. database management system B. Web server C. Web browser D. Internet server E. commerce server
E. commerce server