SophiaPretty

(5)

$14/per page/Negotiable

About SophiaPretty

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Algebra See all
Accounting,Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Communications,Computer Science,Economics,Engineering,English,Environmental science,Essay writing Hide all
Teaching Since: Jul 2017
Last Sign in: 304 Weeks Ago, 2 Days Ago
Questions Answered: 15833
Tutorials Posted: 15827

Education

  • MBA,PHD, Juris Doctor
    Strayer,Devery,Harvard University
    Mar-1995 - Mar-2002

Experience

  • Manager Planning
    WalMart
    Mar-2001 - Feb-2009

Category > Computer Science Posted 09 Nov 2017 My Price 10.00

sometimes allows him the flexibility of working from home.

Computer Networks

Step 1 of 1

Question 1 of 42 Points: 10

Kevin's work situation sometimes allows him the flexibility of working from home. When he does so, he accesses his workstation at the office by logging on to it through the Internet. While he is using his workplace computer from home, his workplace computer is what type of computer in relation to him?

 

unsecured

 

second-person

 

remote

 

virtual

Question 2 of 42 Points: 10

Which of the following is not a common way to view a computer network?

 

the physical level

 

the software level

 

the user interface level

 

the logical level

Question 3 of 42 Points: 10

Fiber optic cables transmit what type of signal in place of electromagnetic waves?

 

light pulses

 

sound waves

 

its and bytes

 

radio waves

Question 4 of 42 Points: 10

Which of the following is not a common network device used to connect multiple computers together?

 

a network hub

 

a network switch

 

a router

 

All of the above are used to connect multiple computers together.

Question 5 of 42 Points: 10

Which of the following is a significant example of a circuit switched network?

 

telephone network

 

internet

 

radio tower networks

 

all of the above

Question 6 of 42 Points: 10

In what network topology is a single cable the actual network, with each device connected to that single cable?

 

star topology

 

ring topology

 

mesh topology

 

bus topology

Question 7 of 42 Points: 10

Which of the following is a factor in the pathway chosen in a packet switched network?

 

other message traffic on the network

 

whether a full pathway can be established prior to transmission

 

whether the pathway can be repeated for all other messages between the two computers

 

all of the above

Question 8 of 42 Points: 10

Why is a switch able to utilize bandwidth more efficiently than a hub?

 

Because it is able to discern which messages can be ignored as spam and which are actually important to pass on.

 

Because messages sent by a switch are compressed into a form that requires fewer bits.

 

Because it recognizes the intended recipient for a particular message and is able to direct that message only towards that single device.

 

all of the above

Question 9 of 42 Points: 10

Which of the following is a common trait of both routing and switching?

 

Messages intended for recipients outside of the network are directed using tables of IP addresses from other networks.

 

Routing and switching both involve the evaluation of which message to send first when there are multiple incoming messages.

 

Individual device addresses are used to direct messages.

 

Both routing and switching direct messages primarily through a process known as broadcasting.

Question 10 of 42 Points: 10

A server provides information to what type of computer?

 

a user

 

a subordinate

 

a peer

 

a client

Question 11 of 42 Points: 10

Which of the following correctly describes the characteristics of most servers?

 

Servers are usually comparable to client computers in their operational capacity, but they are just dedicated to certain specific functions.

 

Servers generally have much greater hard disk storage but slower CPU performance.

 

Servers are usually cheaper computers that come with only basic system unit components.

 

Servers generally need to be more powerful machines with greater disk storage and faster response times.

Question 12 of 42 Points: 10

How do virtual machines relate to operating systems?

 

Virtual machines are temporary operating systems that can be installed and used when a computer is undergoing a conversion from one operating system to another.

 

Virtual machines allow computers with different operating system to communicate over a network.

 

Virtual machines use advanced input/output technology to remove the need to have an operating system.

 

Virtual machines allow users to emulate various operating systems on a single computer.

Question 13 of 42 Points: 10

A virtual machine falls into which of the following categories?

 

personal computer unit

 

peripheral device

 

networking hardware component

 

software

Question 14 of 42 Points: 10

What type of server may be used to support both application software and data files but usually is limited to serving requests only from clients within the local network?

 

file server

 

database server

 

web server

 

all of the above

Question 15 of 42 Points: 10

Why are servers sometimes built into cabinets?

 

to keep them from accidentally coming into direct contact with people, which could be dangerous to their health

 

to make them more transportable so that they can carry vital file or database information from location to location

 

to keep them under secure lock and key

 

to allow for large numbers of components to be inserted, such as numerous hard disk drives for large storage capacity

Question 16 of 42 Points: 10

Kyle is wanting to create a simple network between a few devices. He needs the network to be reliable even if one of the devices fail. The devices will not be creating large volumes of traffic. The most important factor in his decision making process is cost, which needs to be low. What is probably the best network topology for his needs?

 

mesh topology

 

star topology

 

bus topology

 

ring topology

Question 17 of 42 Points: 10

How does a DNS relate to how a user interacts with IP addresses?

 

A DNS converts an English-like name provided by a user to its corresponding numerical IP address so that the user does not have to remember the numerical form.

 

A DNS provides individual computer devices and webpages with unique IP addresses so that users can locate those devices and pages and communicate with them.

 

A DNS breaks down an IP address into manageable packets of data that can be processed individually.

 

A DNS examines the IP address provided by the user and then identifies the location of the device associated with that IP address so that an information packet can be forwarded to that location.

Question 18 of 42 Points: 10

What part of an incoming packet does a router examine in order to determine the next location to send it to?

 

destination IP address

 

routing table

 

the DNS alias

 

any of the above, depending on where the packet originated

Question 19 of 42 Points: 10

When a large message is broken down into multiple smaller message units which are sent across the Internet to their destination individually, what are the individual units called?

 

packets

 

pods

 

parcels

 

bricks

Question 20 of 42 Points: 10

What device connects a computer or computer network to the Internet?

 

DNS

 

LAN

 

router

 

Internet Service Provider

Question 21 of 42 Points: 10

What kind of tables does a DNS have?

 

tables that help the server identify the location of each device based on its IP address

 

tables that list the MAC addresses of all individual devices connected to the Internet

 

tables that map out the location of major nodes and links in their region of the Internet so that important pathway decisions can be made

 

tables that contain host IP addresses and their corresponding aliases

Question 22 of 42 Points: 10

Which of the following steps comes first in the process of communicating a message over the Internet?

 

The destination IP address is translated from an "external public" address to an "internal private" address.

 

The message is placed into packets.

 

The local router decides the best first location to send the message.

 

The message information is sent from the source computer to the Internet point of presence for that local network.

Question 23 of 42 Points: 10

What is the major advantage for communications provided by DNS services?

 

DNS services provide a platform for communications between computers running different network protocols.

 

DNS services do not provide any additional functionality, but they do speed all Internet communications up significantly.

 

Users are far more likely to remember names for websites rather than the lengthy numerical addresses that would be needed without DNS services.

 

Users are able to reach websites that they otherwise would not be granted access to.

Question 24 of 42 Points: 10

Which of the following is not a common top-level domain name for websites hosted in the United States?

 

.gov

 

.com

 

.edu

 

.pdf

Question 25 of 42 Points: 10

What symbol(s) separate(s) the domain name portion of a URL from the resource ID portion?

 

a period (.)

 

a colon followed by two slashes (://)

 

a slash (/)

 

none of the above

Question 26 of 42 Points: 10

What are the two categories of concern in IAS?

 

security and assurance

 

integrity and security

 

access and stability

 

availability and confidentiality

Question 27 of 42 Points: 10

Which of the following is not a concern related to data integrity?

 

Data must be collected in a manner that ensures its accuracy.

 

Data should not be altered without a record of when, how, and by whom it was altered.

 

Data must be stored in such a way that access is denied to those who should not see it, but is available to those who need to use it.

 

Data must be entered into the system for storage correctly.

Question 28 of 42 Points: 10

Lisa is in charge of employee payroll for her company. Sensitive personal employee information must be collected for payroll purposes, including such things as addresses, social security numbers, and retirement account information. Lisa is one of only two employees in the company who have access to the password protected files where the information is stored. She is able to access that information either from a workstation at the office or through remote access from her personal computer at home. She is able to make changes to the information in those files, but those changes are always recorded and documented. If she opens one of the sensitive files, the other employee who has access to it cannot alter it in any way while she is using it. What is the violation of IAS principles in this scenario?

 

Personal information should only be recorded if necessary, but if it is necessary to record it, it should be available publicly.

 

Availability is compromised because the files are password protected, which might prevent access to the files by those who need to use the information.

 

The fact that Lisa can access this private information remotely from home grants availability at the expense of integrity and security.

 

There are no obvious violations of IAS principles in this scenario.

Question 29 of 42 Points: 10

What is the first step in strategic risk analysis?

 

identifying vulnerabilities

 

identifying policies to protect the organization

 

identifying threats

 

identifying information assets

Question 30 of 42 Points: 10

Which of the following is an example of public information?

 

an employee's address

 

an employee's email address

 

an employee's health information

 

all of the above

Question 31 of 42 Points: 10

What type of asset is liable to a social engineering threat?

 

people

 

money

 

information

 

all of the above

Question 32 of 42 Points: 10

Alan is a web administrator and he is facing a problem with one of his servers. He cannot get it to respond to requests the way it should. When he logs directly into the server and explores the situation, he finds that millions of requests are flooding the server from the same few machines over and over again so that it cannot handle the volume of activity. What type of attack is Alan dealing with?

 

a denial of service attack

 

Trojan Horse

 

phishing

 

packet sniffing

Question 33 of 42 Points: 10

What is a grey-hat hacker?

 

a mix between a white-hat hacker and a black-hat hacker

 

a hacking professional who sometimes hacks for "good purposes"

 

a hacking professional who sometimes hacks for "bad purposes"

 

all of the above

Question 34 of 42 Points: 10

What type of malware is usually downloaded unknown to the user and observes the user's activities in order to gain sensitive information that the user might enter in regular activities?

 

worm

 

spyware

 

ghostware

 

invisible friend

Question 35 of 42 Points: 10

Anti-malware software can be configured to run on-demand, but what is another common approach to configuring when it is to run?

 

It can be configured to run constantly without interruption.

 

It can be configured to scan every incoming message.

 

It can be configured to run only after each message is opened.

Question 36 of 42 Points: 10

What type of security software prevents certain types of messages from coming into or out of the network?

 

firewall software

 

anti-virus software

 

encryption software

 

all of the above

Question 37 of 42 Points: 10

Which of the following is not a common basis for authenticating identity?

 

what you know

 

what you have

 

what you are

 

none of the above

Question 38 of 42 Points: 10

In what type of access control is a user's access defined; according to which preset category best describes his function in the organization, such as a supervisor, manager, or analyst?

 

positional hierarchy access control

 

role-based access control

 

9-bit scheme access control

 

two-factor access control

Question 39 of 42 Points: 10

"Fill in the blank" question: select the correct answer.

The many parties involved in a business setting can mutually benefit from one another in their activities, but only if they are connected through some sort of

.

Question 40 of 42 Points: 10

What term refers to the interdependent and constantly developing relationships between customers, suppliers, employees, and others involved in the business process?

 

business ecosystem

 

business web

 

co-dependence

 

none of the above

Question 41 of 42 Points: 10

Which of the following statements accurately describes the benefits of computer networks in business settings?

 

In most business settings, computer networks provide many significant benefits, but there is always a need to be aware of the increased risk associated with them.

 

Computer networks do provide small to moderate advantages to businesses who install, use, and maintain them properly, but most businesses find that that the costs, trouble, and increased risks involved make computer networks a bad choice.

 

Computer networks provide many advantages for work processes today (cost savings, increased efficiency and productivity, etc.) without any significant drawbacks.

 

Computer networks provide many advantages to businesses, but one significant drawback is the tendency of employees to take advantage of their flexibility by working from home or other informal settings rather than coming into the central office.

Question 42 of 42 Points: 10

Why might a company's software expenses decrease if they implement a computer network for their office?

 

A network allows users to communicate instantly with one another rather than using software for numerous steps of back and forth communication.

 

Networks run primarily using hardware, not software.

 

They can potentially share software over the network rather than purchasing copies of the software for each user.

 

The capabilities of networks automate many tasks that would otherwise have required human users.

 

Answers

(5)
Status NEW Posted 09 Nov 2017 02:11 PM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y

Not Rated(0)