The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 2 Days Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Computer Networks
Step 1 of 1
Question 1 of 42 Points: 10
Kevin's work situation sometimes allows him the flexibility of working from home. When he does so, he accesses his workstation at the office by logging on to it through the Internet. While he is using his workplace computer from home, his workplace computer is what type of computer in relation to him?
Â
unsecured
Â
second-person
Â
remote
Â
virtual
Question 2 of 42 Points: 10
Which of the following is not a common way to view a computer network?
Â
the physical level
Â
the software level
Â
the user interface level
Â
the logical level
Question 3 of 42 Points: 10
Fiber optic cables transmit what type of signal in place of electromagnetic waves?
Â
light pulses
Â
sound waves
Â
its and bytes
Â
radio waves
Question 4 of 42 Points: 10
Which of the following is not a common network device used to connect multiple computers together?
Â
a network hub
Â
a network switch
Â
a router
Â
All of the above are used to connect multiple computers together.
Question 5 of 42 Points: 10
Which of the following is a significant example of a circuit switched network?
Â
telephone network
Â
internet
Â
radio tower networks
Â
all of the above
Question 6 of 42 Points: 10
In what network topology is a single cable the actual network, with each device connected to that single cable?
Â
star topology
Â
ring topology
Â
mesh topology
Â
bus topology
Question 7 of 42 Points: 10
Which of the following is a factor in the pathway chosen in a packet switched network?
Â
other message traffic on the network
Â
whether a full pathway can be established prior to transmission
Â
whether the pathway can be repeated for all other messages between the two computers
Â
all of the above
Question 8 of 42 Points: 10
Why is a switch able to utilize bandwidth more efficiently than a hub?
Â
Because it is able to discern which messages can be ignored as spam and which are actually important to pass on.
Â
Because messages sent by a switch are compressed into a form that requires fewer bits.
Â
Because it recognizes the intended recipient for a particular message and is able to direct that message only towards that single device.
Â
all of the above
Question 9 of 42 Points: 10
Which of the following is a common trait of both routing and switching?
Â
Messages intended for recipients outside of the network are directed using tables of IP addresses from other networks.
Â
Routing and switching both involve the evaluation of which message to send first when there are multiple incoming messages.
Â
Individual device addresses are used to direct messages.
Â
Both routing and switching direct messages primarily through a process known as broadcasting.
Question 10 of 42 Points: 10
A server provides information to what type of computer?
Â
a user
Â
a subordinate
Â
a peer
Â
a client
Question 11 of 42 Points: 10
Which of the following correctly describes the characteristics of most servers?
Â
Servers are usually comparable to client computers in their operational capacity, but they are just dedicated to certain specific functions.
Â
Servers generally have much greater hard disk storage but slower CPU performance.
Â
Servers are usually cheaper computers that come with only basic system unit components.
Â
Servers generally need to be more powerful machines with greater disk storage and faster response times.
Question 12 of 42 Points: 10
How do virtual machines relate to operating systems?
Â
Virtual machines are temporary operating systems that can be installed and used when a computer is undergoing a conversion from one operating system to another.
Â
Virtual machines allow computers with different operating system to communicate over a network.
Â
Virtual machines use advanced input/output technology to remove the need to have an operating system.
Â
Virtual machines allow users to emulate various operating systems on a single computer.
Question 13 of 42 Points: 10
A virtual machine falls into which of the following categories?
Â
personal computer unit
Â
peripheral device
Â
networking hardware component
Â
software
Question 14 of 42 Points: 10
What type of server may be used to support both application software and data files but usually is limited to serving requests only from clients within the local network?
Â
file server
Â
database server
Â
web server
Â
all of the above
Question 15 of 42 Points: 10
Why are servers sometimes built into cabinets?
Â
to keep them from accidentally coming into direct contact with people, which could be dangerous to their health
Â
to make them more transportable so that they can carry vital file or database information from location to location
Â
to keep them under secure lock and key
Â
to allow for large numbers of components to be inserted, such as numerous hard disk drives for large storage capacity
Question 16 of 42 Points: 10
Kyle is wanting to create a simple network between a few devices. He needs the network to be reliable even if one of the devices fail. The devices will not be creating large volumes of traffic. The most important factor in his decision making process is cost, which needs to be low. What is probably the best network topology for his needs?
Â
mesh topology
Â
star topology
Â
bus topology
Â
ring topology
Question 17 of 42 Points: 10
How does a DNS relate to how a user interacts with IP addresses?
Â
A DNS converts an English-like name provided by a user to its corresponding numerical IP address so that the user does not have to remember the numerical form.
Â
A DNS provides individual computer devices and webpages with unique IP addresses so that users can locate those devices and pages and communicate with them.
Â
A DNS breaks down an IP address into manageable packets of data that can be processed individually.
Â
A DNS examines the IP address provided by the user and then identifies the location of the device associated with that IP address so that an information packet can be forwarded to that location.
Question 18 of 42 Points: 10
What part of an incoming packet does a router examine in order to determine the next location to send it to?
Â
destination IP address
Â
routing table
Â
the DNS alias
Â
any of the above, depending on where the packet originated
Question 19 of 42 Points: 10
When a large message is broken down into multiple smaller message units which are sent across the Internet to their destination individually, what are the individual units called?
Â
packets
Â
pods
Â
parcels
Â
bricks
Question 20 of 42 Points: 10
What device connects a computer or computer network to the Internet?
Â
DNS
Â
LAN
Â
router
Â
Internet Service Provider
Question 21 of 42 Points: 10
What kind of tables does a DNS have?
Â
tables that help the server identify the location of each device based on its IP address
Â
tables that list the MAC addresses of all individual devices connected to the Internet
Â
tables that map out the location of major nodes and links in their region of the Internet so that important pathway decisions can be made
Â
tables that contain host IP addresses and their corresponding aliases
Question 22 of 42 Points: 10
Which of the following steps comes first in the process of communicating a message over the Internet?
Â
The destination IP address is translated from an "external public" address to an "internal private" address.
Â
The message is placed into packets.
Â
The local router decides the best first location to send the message.
Â
The message information is sent from the source computer to the Internet point of presence for that local network.
Question 23 of 42 Points: 10
What is the major advantage for communications provided by DNS services?
Â
DNS services provide a platform for communications between computers running different network protocols.
Â
DNS services do not provide any additional functionality, but they do speed all Internet communications up significantly.
Â
Users are far more likely to remember names for websites rather than the lengthy numerical addresses that would be needed without DNS services.
Â
Users are able to reach websites that they otherwise would not be granted access to.
Question 24 of 42 Points: 10
Which of the following is not a common top-level domain name for websites hosted in the United States?
Â
.gov
Â
.com
Â
.edu
Â
Question 25 of 42 Points: 10
What symbol(s) separate(s) the domain name portion of a URL from the resource ID portion?
Â
a period (.)
Â
a colon followed by two slashes (://)
Â
a slash (/)
Â
none of the above
Question 26 of 42 Points: 10
What are the two categories of concern in IAS?
Â
security and assurance
Â
integrity and security
Â
access and stability
Â
availability and confidentiality
Question 27 of 42 Points: 10
Which of the following is not a concern related to data integrity?
Â
Data must be collected in a manner that ensures its accuracy.
Â
Data should not be altered without a record of when, how, and by whom it was altered.
Â
Data must be stored in such a way that access is denied to those who should not see it, but is available to those who need to use it.
Â
Data must be entered into the system for storage correctly.
Question 28 of 42 Points: 10
Lisa is in charge of employee payroll for her company. Sensitive personal employee information must be collected for payroll purposes, including such things as addresses, social security numbers, and retirement account information. Lisa is one of only two employees in the company who have access to the password protected files where the information is stored. She is able to access that information either from a workstation at the office or through remote access from her personal computer at home. She is able to make changes to the information in those files, but those changes are always recorded and documented. If she opens one of the sensitive files, the other employee who has access to it cannot alter it in any way while she is using it. What is the violation of IAS principles in this scenario?
Â
Personal information should only be recorded if necessary, but if it is necessary to record it, it should be available publicly.
Â
Availability is compromised because the files are password protected, which might prevent access to the files by those who need to use the information.
Â
The fact that Lisa can access this private information remotely from home grants availability at the expense of integrity and security.
Â
There are no obvious violations of IAS principles in this scenario.
Question 29 of 42 Points: 10
What is the first step in strategic risk analysis?
Â
identifying vulnerabilities
Â
identifying policies to protect the organization
Â
identifying threats
Â
identifying information assets
Question 30 of 42 Points: 10
Which of the following is an example of public information?
Â
an employee's address
Â
an employee's email address
Â
an employee's health information
Â
all of the above
Question 31 of 42 Points: 10
What type of asset is liable to a social engineering threat?
Â
people
Â
money
Â
information
Â
all of the above
Question 32 of 42 Points: 10
Alan is a web administrator and he is facing a problem with one of his servers. He cannot get it to respond to requests the way it should. When he logs directly into the server and explores the situation, he finds that millions of requests are flooding the server from the same few machines over and over again so that it cannot handle the volume of activity. What type of attack is Alan dealing with?
Â
a denial of service attack
Â
Trojan Horse
Â
phishing
Â
packet sniffing
Question 33 of 42 Points: 10
What is a grey-hat hacker?
Â
a mix between a white-hat hacker and a black-hat hacker
Â
a hacking professional who sometimes hacks for "good purposes"
Â
a hacking professional who sometimes hacks for "bad purposes"
Â
all of the above
Question 34 of 42 Points: 10
What type of malware is usually downloaded unknown to the user and observes the user's activities in order to gain sensitive information that the user might enter in regular activities?
Â
worm
Â
spyware
Â
ghostware
Â
invisible friend
Question 35 of 42 Points: 10
Anti-malware software can be configured to run on-demand, but what is another common approach to configuring when it is to run?
Â
It can be configured to run constantly without interruption.
Â
It can be configured to scan every incoming message.
Â
It can be configured to run only after each message is opened.
Question 36 of 42 Points: 10
What type of security software prevents certain types of messages from coming into or out of the network?
Â
firewall software
Â
anti-virus software
Â
encryption software
Â
all of the above
Question 37 of 42 Points: 10
Which of the following is not a common basis for authenticating identity?
Â
what you know
Â
what you have
Â
what you are
Â
none of the above
Question 38 of 42 Points: 10
In what type of access control is a user's access defined; according to which preset category best describes his function in the organization, such as a supervisor, manager, or analyst?
Â
positional hierarchy access control
Â
role-based access control
Â
9-bit scheme access control
Â
two-factor access control
Question 39 of 42 Points: 10
"Fill in the blank" question: select the correct answer.
The many parties involved in a business setting can mutually benefit from one another in their activities, but only if they are connected through some sort of
.
Question 40 of 42 Points: 10
What term refers to the interdependent and constantly developing relationships between customers, suppliers, employees, and others involved in the business process?
Â
business ecosystem
Â
business web
Â
co-dependence
Â
none of the above
Question 41 of 42 Points: 10
Which of the following statements accurately describes the benefits of computer networks in business settings?
Â
In most business settings, computer networks provide many significant benefits, but there is always a need to be aware of the increased risk associated with them.
Â
Computer networks do provide small to moderate advantages to businesses who install, use, and maintain them properly, but most businesses find that that the costs, trouble, and increased risks involved make computer networks a bad choice.
Â
Computer networks provide many advantages for work processes today (cost savings, increased efficiency and productivity, etc.) without any significant drawbacks.
Â
Computer networks provide many advantages to businesses, but one significant drawback is the tendency of employees to take advantage of their flexibility by working from home or other informal settings rather than coming into the central office.
Question 42 of 42 Points: 10
Why might a company's software expenses decrease if they implement a computer network for their office?
Â
A network allows users to communicate instantly with one another rather than using software for numerous steps of back and forth communication.
Â
Networks run primarily using hardware, not software.
Â
They can potentially share software over the network rather than purchasing copies of the software for each user.
Â
The capabilities of networks automate many tasks that would otherwise have required human users.
Â
----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------you----------- fo-----------r y-----------our----------- in-----------ter-----------est----------- an-----------d b-----------uyi-----------ng -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll -----------be -----------qui-----------ckl-----------y