The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 304 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
I really struggleing with My CIS 105 lesson this week. I need some help with my questions so I can compete my study guide.
1  of 40
The computers in a lab on a floor of a building would be connected using a ________.
|
|
MAN |
|
|
PAN |
|
|
LAN |
|
|
WAN |
Question
2  of 40
A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.
|
|
armored |
|
|
transitional |
|
|
proxy |
|
|
bastion host |
Question
3  of 40
A ________ is a virus triggered on a certain date.
|
|
time bomb |
|
|
logic bomb |
|
|
worm |
|
|
macro |
Question
4  of 40
DRM-free music can be moved legally from system to system.
|
|
True |
|
|
False |
Question
5  of 40
Which of the following is NOT a common network topology?
|
|
Cluster |
|
|
Linear bus |
|
|
Star |
|
|
Ring |
Question
6  of 40
Every new cell/smartphone has to include a GPS chip.
|
|
True |
|
|
False |
Question
7  of 40
Which of the following uses radio waves to transmit data signals over short distances?
|
|
Infrared |
|
|
Bluetooth |
|
|
Wireless access protocol |
|
|
VoIP |
Question
8  of 40
Which of the following is NOT a virus category?
|
|
Macro |
|
|
Pharming |
|
|
Worm |
|
|
Logic bomb |
Question
9  of 40
Many mobile devices include a mini- ________ port.
|
|
serial |
|
|
coaxial |
|
|
USB |
|
|
parallel |
Question
10  of 40
The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.
|
|
True |
|
|
False |
Question
11  of 40
With regard to computer protection, quarantining is defined as ________.
|
|
deleting an infected file |
|
|
updating your antivirus software |
|
|
repairing an infected file |
|
|
placing a found virus in a secure area on the hard drive |
Question
12  of 40
A(n) ________ server tracks who is logging onto the network as well as which services on the network each user has available.
|
|
application |
|
|
authentication |
|
|
file |
|
|
dedicated |
Question
13  of 40
A power failure interrupts VoIP service.
|
|
True |
|
|
False |
Question
14  of 40
Since data transmissions can pass through fiber-optic cable in only one direction, transmission of data in both directions requires at least two fibers.
|
|
True |
|
|
False |
Question
15  of 40
A ________ is a virus attached to documents such as Word or Excel files.
|
|
Trojan horse |
|
|
script virus |
|
|
macro virus |
|
|
polymorphic virus |
Question
16  of 40
________ viruses are often transmitted by a flash drive left in a USB port.
|
|
Macro |
|
|
Boot-sector |
|
|
Time-bomb |
|
|
Logic-bomb |
Question
17  of 40
A main difference between the tablet and the smartphone is the ________.
|
|
touch-screen interface |
|
|
Internet connectivity |
|
|
screen size |
|
|
operating system |
Question
18  of 40
Ethical hackers are also known as white-hat hackers.
|
|
True |
|
|
False |
Question
19  of 40
CAPTCHA is ________.
|
|
a rootkit virus |
|
|
password method |
|
|
antivirus software |
|
|
the wavy hard-to-read letter and number sequence you type to prove you are human to a Web site |
Question
20  of 40
Which of the following classifications of viruses can change its own code to avoid detection?
|
|
Stealth |
|
|
Worm |
|
|
Polymorphic |
|
|
Multipartite |
Question
21  of 40
A print server uses a print ________ as a software holding area for jobs waiting to be printed.
|
|
heap |
|
|
stack |
|
|
spooler |
|
|
logger |
Question
22  of 40
A tablet uses a full traditional operating system.
|
|
True |
|
|
False |
Question
23  of 40
Data flows in both directions in a ring network.
|
|
True |
|
|
False |
Question
24  of 40
4G LTE Cellular networks offer faster data-transfer speed than Wi-Fi offers.
|
|
True |
|
|
False |
Question
25  of 40
A virus signature is a portion of virus code unique to a particular computer virus.
|
|
True |
|
|
False |
Question
26  of 40
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
|
|
pretexting |
|
|
theft |
|
|
pharming |
|
|
engineering |
Question
27  of 40
All of the following were top cybercrimes reported to the IC3 EXCEPT ________.
|
|
identity theft |
|
|
non-auction scam |
|
|
theft of services |
|
|
advance fee fraud |
Question
28  of 40
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
|
|
Conversion rate |
|
|
Converting rate |
|
|
Simplifying rate |
|
|
Sampling rate |
Question
29  of 40
Ring networks use the ________ method to avoid data collisions.
|
|
active-check |
|
|
passive-check |
|
|
token |
|
|
packet screening |
Question
30  of 40
The distance between two near field communication (NFC) devices is limited to about ________.
|
|
1.5 in |
|
|
1.5 m |
|
|
10 m |
|
|
1.5 ft |
Question
31  of 40
Transmission media comprise the physical system data takes to flow between devices on the network.
|
|
True |
|
|
False |
Question
32  of 40
Text messaging is also called ________.
|
|
short text messaging (STM) |
|
|
text messaging system (TMS) |
|
|
sending messages shortly (SMS) |
|
|
short message service (SMS) |
Question
33  of 40
________ allows only limited use of legally purchased media.
|
|
Copyright |
|
|
Copyleft |
|
|
Synchronizing |
|
|
Digital rights management |
Question
34  of 40
The terms virus and worm actually mean the same thing.
|
|
True |
|
|
False |
Question
35  of 40
________ hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities.
|
|
White-hat |
|
|
Black-hat |
|
|
Gray-hat |
|
|
Green-hat |
Question
36  of 40
Which of the following digital image formats compresses the image file?
|
|
MPEG |
|
|
JPEG |
|
|
|
|
|
WAV |
Question
37  of 40
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
|
|
firewall |
|
|
fire extinguisher |
|
|
firehouse |
|
|
firebreak |
Question
38  of 40
The primary input devices for smartphones are ________.
|
|
microphone and touch screen |
|
|
touch screen and digital camera |
|
|
keyboard and mouse |
|
|
microphone and mouse |
Question
39  of 40
A macro virus is a virus attached to a file such as a Word document or Excel workbook.
|
|
True |
|
|
False |
Question
40  of 40
SMS technology sends both text and pictures.
|
|
True |
|
|
False |
![]()
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly