Company secure internal network and its firewall

Assignment Help Basic Computer Science
Reference no: EM131470216

1. The computers in a lab on a floor of a building would be connected using a ________.

  • MAN
  • PAN
  • LAN
  • WAN

2. A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.

  • armored
  • transitional
  • proxy
  • bastion host

3. A _______ is a virus triggered on a certain date.

  • time bomb
  • logic bomb
  • worm
  • macro

4. DRM-free music can be moved legally from system to system.

True
False

5. Which of the following is NOT a common network topology?

  • Cluster
  • Linear bus
  • Star
  • Ring

6. Every new cell/smartphone has to include a GPS chip.

True
False

7. Which of the following uses radio waves to transmit data signals over short distances?

  • Infrared
  • Bluetooth
  • Wireless access protocol
  • VoIP

8. Which of the following is NOT a virus category?

  • Macro
  • Pharming
  • Worm
  • Logic bomb

9. Many mobile devices include a mini- ________ port.

  • serial
  • coaxial
  • USB
  • parallel

10. The Spyeye Mobile Banking virus tricks users into downloading an infected file to their phones, which enables theft of online banking information.

True
False

11. With regard to computer protection, quarantining is defined as ________.

  • deleting an infected file
  • updating your antivirus software
  • repairing an infected file
  • placing a found virus in a secure area on the hard drive

12. A(n) ________ server tracks who is logging onto the network as well as which services on the network each user has available.

  • application
  • authentication
  • file
  • dedicated

13. A power failure interrupts VoIP service.

True
False

14. Since data transmissions can pass through fiber-optic cable in only one direction, transmission of data in both directions requires at least two fibers.

True
False

15. A ________ is a virus attached to documents such as Word or Excel files.

  • Trojan horse
  • script virus
  • macro virus
  • polymorphic virus

16. ________ viruses are often transmitted by a flash drive left in a USB port.

  • Macro
  • Boot-sector
  • Time-bomb
  • Logic-bomb

17. A main difference between the tablet and the smartphone is the ________.

  • touch-screen interface
  • Internet connectivity
  • screen size
  • operating system

18. Ethical hackers are also known as white-hat hackers.

True
False

19. CAPTCHA is ________.

  • a rootkit virus
  • password method
  • antivirus software
  • the wavy hard-to-read letter and number sequence you type to prove you are human to a Web site

19. Which of the following classifications of viruses can change its own code to avoid detection?

  • Stealth
  • Worm
  • Polymorphic
  • Multipartite

20. A print server uses a print ________ as a software holding area for jobs waiting to be printed.

  • heap
  • stack
  • spooler
  • logger

21 A tablet uses a full traditional operating system.

True
False

22. Data flows in both directions in a ring network.

True
False

23. 4G LTE Cellular networks offer faster data-transfer speed than Wi-Fi offers.

True
False

24. A virus signature is a portion of virus code unique to a particular computer virus.

True
False

25. Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

  • pretexting
  • theft
  • pharming
  • engineering

26. All of the following were top cybercrimes reported to the IC3 EXCEPT ________.

  • identity theft
  • non-auction scam
  • theft of services
  • advance fee fraud

27. Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

  • Conversion rate
  • Converting rate
  • Simplifying rate
  • Sampling rate

28. Ring networks use the ________ method to avoid data collisions.

  • active-check
  • passive-check
  • token
  • packet screening

29. The distance between two near field communication (NFC) devices is limited to about ________.

  • 1.5 in
  • 1.5 m
  • 10 m
  • 1.5 ft

30. Transmission media comprise the physical system data takes to flow between devices on the network.

True
False

31. Text messaging is also called ________.

  • short text messaging (STM)
  • text messaging system (TMS)
  • sending messages shortly (SMS)
  • short message service (SMS)

32. ________ allows only limited use of legally purchased media.

  • Copyright
  • Copyleft
  • Synchronizing
  • Digital rights management

33. The terms virus and worm actually mean the same thing.

  • True
  • False

34. ________ hackers break into systems for nonmalicious reasons such as to test system security vulnerabilities.

  • White-hat
  • Black-hat
  • Gray-hat
  • Green-hat

35. Which of the following digital image formats compresses the image file?

  • MPEG
  • JPEG
  • PDF
  • WAV

36. A ________ is named after a housing construction feature that slows the spread of fires from house to house.

  • firewall
  • fire extinguisher
  • firehouse
  • firebreak

37. The primary input devices for smartphones are ________.

  • microphone and touch screen
  • touch screen and digital camera
  • keyboard and mouse
  • microphone and mouse

38. A macro virus is a virus attached to a file such as a Word document or Excel workbook.

True
False

39. SMS technology sends both text and pictures.

  • True
  • False

Reference no: EM131470216

Questions Cloud

Encryption and decryption : Now that you have learned about encryption and decryption, and worked through some encryption of code
Would there be any way to fix the argument : Hello everyone! We have learned this week about deductive reasoning, including what it takes for an argument to be valid. This discussion allows us to get more.
Corporate governance-company cybersecurity posture : Provide at least three (3) points to justify whether or not there is an impactful relationship between corporate governance and a company's cybersecurity.
Security administration and access control : From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability.
Company secure internal network and its firewall : A(n) ________ server is a heavily secured server located between a company's secure internal network and its firewall.
Explainm the beamenable to scientific study for research : An explanation of two criteria for evaluating the quality of qualitative research designs. Next, explain how these criteria are tied to epistemological.
Calculate the contribution per mile and total contribution : Calculate the contribution per mile and total annual contribution associated with accepting FHP's proposal. What do you recommend
Explain the ethical issues faced by the organization : Explain the ethical issues faced by the organization, summarize the legal and regulatory issues faced by the organization.
Explain details of s and p process : I have a presentation to executives on the S&OP process and as such think lead with answers, explain detail as the audience dictates.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Explore traffic behavior when designing a network

Do some research regarding TCP selective ACK (SACK). Find out if the operating system (OS) on your computer uses it by default and, if not, if there's a mechanism for configuring the OS to use it.

  Convert the message into ascii (use hex notation)

Convert the following message into ASCII (use Hex notation) Easy as 1.2.3!

  Open systems interconnection model is inherently inefficient

The Open Systems Interconnection model is inherently inefficient. On the source host, each layer must take the work of higher layers, add some result, and pass the work to lower layers. On the destination host, each layer must process these re..

  Explain enterprise architecture using zachman framework

In your opinion, does framework necessarily lead to the top-down approach to development, e.g. you start with models in row 1, then work on row 2 models, and so on?

  Assignment-activity-network configuration

Understanding basic network terminology and the rationale for specific network configurations is key for understanding IT.  For this submission:

  Organization from the usage of apic-em

What are the key features and benefits to an organization from the usage of APIC-EM and what applications reside on the controller? How does it impact automation?

  Redevelop the final system using java

Collect the requirements for such a system from software engineers and external stakeholders (such as the regulatory certification authority) and develop the system using a plan-driven approach.

  Description of the network technologies and components

Prepare a Word document that is approximately 3-5 pages in APA format. It should be professional in appearance and suitable for review by network novices. Present the information in laymen's terms.

  How does the use of backup sites affect each

Compare the primary site method with the primary copy method for distributed concurrency control. How does the use of backup sites affect each?

  Write a letter of interest to a prospective employer listing

Look up a job that you want to have after college, write a letter of interest to a prospective employer listing: Who you are?What skills you have that are relevant for this job?Why you are interested in the job?

  Which endian representation does msp430 use

Start filling these numbers (in hexadecimal form) from the lowest possible memory address allowed. Take into account the microcontroller's endian representation.

  Match the terminology on the left with the corresponding

Match the terminology on the left with the corresponding category on the right.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd