Архитектура Аудит Военная наука Иностранные языки Медицина Металлургия Метрология
Образование Политология Производство Психология Стандартизация Технологии


Networks and Telecommunications



 

  1. What is the World Wide Web?
    1. technologies that provide access to information through telecommunications
    2. a collection of interconnected documents and other resources
    3. the application of scientific knowledge for practical purposes
    4. global computer network providing a variety of information and communication facilities
    5. exchange of information over significant distances by electronic means

 

  1. What was the purpose of ARPANET?
    1. to develop a platform for the WWW
    2. to share research information
    3. an experiment to test sharing resources
    4. a university project to share MP3 files
    5. a super-secret government project to share classified data

 

  1. What is NOT true of a network?
    1. A network is a way to get “stuff” between 2 or more “things”
    2. Networks usually do not have internal connections
    3. A network allows sharing information among computer
    4. The postal system is an example of a network
    5. Metros are an example of a network

 

  1. How many devices are required for a network to be called a computer network?
    1. 1
    2. 2
    3. 3
    4. 4
    5. 5

 

  1. What is the scale of a PAN?
    1. Vicinity (e.g., Bluetooth)
    2. Building (WiFi, Ethernet)
    3. City (DSL)
    4. Country (Large ISP)
    5. Global

  2. What is the scale of a LAN?
    1. Vicinity (e.g., Bluetooth)
    2. Building (WiFi, Ethernet)
    3. City (DSL)
    4. Country (Large ISP)
    5. Global

  3. What is the scale of a MAN?
    1. Vicinity (e.g., Bluetooth)
    2. Building (WiFi, Ethernet)
    3. City (DSL)
    4. Country (Large ISP)
    5. Global

  4. What is the scale of a WAN?
    1. Vicinity (e.g., Bluetooth)
    2. Building (WiFi, Ethernet)
    3. City (DSL)
    4. Country (Large ISP)
    5. Global

  5. What type of connection do these networks represent?
    1. Physical
    2. Virtual
    3. Intermittent
    4. Constant
    5. Logical

 

  1. What type of connection does this network represent?
    1. Physical
    2. Virtual
    3. Intermittent
    4. Constant
    5. Logical

 

  1. What is the most common type of network topology used today?
    1. Fish
    2. Star
    3. Bus
    4. Ring
    5. Tree

 

  1. A laptop, smartphone, or server are examples of what network component?
    1. applications
    2. hosts
    3. routers
    4. links
    5. interfaces

 

  1. A DSL modem and wireless access points are examples of what network component?
    1. applications
    2. hosts
    3. routers
    4. links
    5. interfaces

 

  1. Wires, cables and radio signals are examples of what network component?
    1. applications
    2. hosts
    3. routers
    4. links
    5. interfaces

 

  1. Network-application and network-network are examples of what on a network?
    1. applications
    2. hosts
    3. routers
    4. links
    5. interfaces

 

  1. What is the function of the data layer?
    1. Transmit data by an electric voltage, radio frequencies, or light over a physical medium
    2. Sends data node-to-node
    3. Provides network addressing and routing (host-to-host)
    4. Delivers data from process-to-process
    5. Provides application services to users and programs

 

  1. What is the function of the network layer?
    1. Transmit data by an electric voltage, radio frequencies, or light over a physical medium
    2. Sends data node-to-node
    3. Provides network addressing and routing (host-to-host)
    4. Delivers data from process-to-process
    5. Provides application services to users and programs

  2. What is the function of the transport layer?
    1. Transmit data by an electric voltage, radio frequencies, or light over a physical medium
    2. Sends data node-to-node
    3. Provides network addressing and routing (host-to-host)
    4. Delivers data from process-to-process
    5. Provides application services to users and programs












Cybersecurity

 

  1. Cybercrime refers to anything done with criminal intent using ______.
    1. A smartphone
    2. The internet
    3. A computer
    4. An internet connected device
    5. A computer connected to the internet

 

  1. What do hackers and cybercriminals do for a living?
    1. Work regular jobs and hack on the weekends
    2. Are plumbers or electricians with nothing better to do
    3. Hack and steal for a living
    4. Unemployed people with IT skills just trying to put food on the table as they look for a job
    5. Steal from the rich to give to the poor

 

  1. What describes the cybercrimes category of “Computer as a Tool”?
    1. Using a computer to target an individual
    2. Targeting a computer or system to commit a crime
    3. Using a computer to sell illegal goods
    4. Hate speech or Harassing someone through cyberspace
    5. none of the above

  2. What describes the cybercrimes category of “Computer as a Target”?
    1. Using a computer to target an individual
    2. Targeting a computer or system to commit a crime
    3. Using a computer to sell illegal goods
    4. Hate speech or Harassing someone through cyberspace

  3. What describes the cybercrimes category of “Selling Illicit Goods”?
    1. Using a computer to target an individual
    2. Targeting a computer or system to commit a crime
    3. Using a computer to sell illegal goods
    4. Hate speech or Harassing someone through cyberspace
    5. none of the above

  4. What describes the cybercrimes category of “Offensive Content or harassment”?
    1. Using a computer to target an individual
    2. Targeting a computer or system to commit a crime
    3. Using a computer to sell illicit goods
    4. Hate speech or online stalking
    5. none of the above

  5. Spam, phishing scams, and identity theft are examples of which type of cybercrime.
    1. Computer as a Tool
    2. Computer as the Target
    3. Selling Illicit Goods
    4. Offensive content or Harassment
    5. none of the above

 

  1. What does malware stand for?
    1. nothing special, just malware
    2. malfunctioning software
    3. malicious software
    4. malfunctioning hardware
    5. malice-ware

 

  1. What is not a risk of pirated software?
    1. likely contains malware
    2. a cybercriminal can use your computer to commit cyber crimes
    3. might contain undetected keylogging software
    4. none of the above are risks
    5. All are risks of using pirated software

 

  1. How does malware infect your computer?
    1. untrusted websites
    2. email attachments
    3. pirated software
    4. infected flash drives
    5. all of the above

 

  1. This list contains a passphrases and passwords. Which is the passphrase?
    1. I want 2 smile more: )
    2. (? fFeT! I#7TVJK?
    3. gDR4qLEB7g
    4. KN%6hGYgEqdVvAt7#W
    5. sd3WPYJZCs

 

  1. What do difficult targets do?
    1. Use weak passwords
    2. Use Two-Factor Authentication (2FA)
    3. Respond to spam
    4. Click links in emails
    5. Visit shady internet sites
    6. Run pirated software

 

  1. What do easy targets do?
    1. Are security conscious
    2. Understand the dangers and risks
    3. Use encryption
    4. Click links in emails
    5. Use strong passwords








Internet Technologies

 

  1. What is the most common form of network architecture on the internet?
    1. Peer-to-peer
    2. Client-server
    3. Ring
    4. Bus
    5. Tree

 

  1. Typically, how do clients and servers interact?
    1. One-to-one (one client to one server)
    2. One-to-many (one client to many servers)
    3. Many-to-one (many clients to one server)
    4. Many-to-many (many clients to many servers)
    5. None of these. Clients and servers do not interact

 

  1. The unique name of a computer on the internet
    1. IP address
    2. ISP
    3. domain name
    4. URL
    5. Web hoster

 

  1. The unique address of a computer on a network
    1. IP address
    2. ISP
    3. domain name
    4. URL
    5. Web hoster

 

  1. The exact location of a document on the web
    1. IP address
    2. ISP
    3. domain name
    4. URL
    5. Web hoster

 

  1. Connect websites to the internet
    1. IP address
    2. ISP
    3. domain name
    4. URL
    5. Web hoster

 

  1. A software program which interprets the HTML documents and displays it on the user’s screen
    1. web browser
    2. web hosting provider
    3. internet service provider (ISP)
    4. domain registrar
    5. domain name system (DNS)

 

  1. Connects clients to the internet
    1. web browser
    2. web hosting provider
    3. internet service provider (ISP)
    4. domain registrar
    5. domain name system (DNS)

 

  1. Maps the domain name to an IP address
    1. web browser
    2. web hosting provider
    3. internet service provider (ISP)
    4. domain registrar
    5. domain name system (DNS)

 

  1. What is an example of a TLD (top level domain)?
    Study hint: identify the rest of the answers.
    1. 212.87.38.45
    2. do.ektu.kz
    3. https: //en.wikipedia.org/wiki/IPv6_address
    4. index.html
    5. .com

 

  1. An IPv6 address uses what format?
    1. Binary (base 2): 11001100.10000100.00101000.10011011
    2. Octal (base 8): 0300.0250.0057.0352
    3. Decimal (base 10): 192.168.1.82
    4. Hexadecimal (base 16): 2001: db8: a0b: 12f0:: 1
    5. none of the above

 

  1. What service allow users to acquire domain names?
    1. ISP
    2. DNS
    3. Domain registrar
    4. Web hoster
    5. None of these

 

  1. What protocol do the web browser and web service use?
    1. FTP
    2. UDP
    3. NTP
    4. HTTP
    5. IP

 

  1. Why is TCP/IP such an important web protocol?
    1. It’s fast. It makes sure the data arrives as quickly as possible
    2. It’s secure. It makes sure that hackers cannot see the data en route
    3. It guarantees delivery. It guarantees that data arrives intact, which creates a duplicate of the original file
    4. It reduces redundancy. It doesn’t care if data is lost, such as when streaming a movie.
    5. It’s efficient. It uses less resources than UDP.

 

  1. How does TCP handle lost data or packets during transit?
    1. TCP must initiate a new connection with the server
    2. TCP must stop the file transfer and then restart at the beginning of the file
    3. TCP knows what packet was lost. So, it will request only the lost packet.
    4. TCP is smart enough to know if the packet is important (maybe the file doesn’t need the data)
    5. Data packets never go missing.

 

  1. What is the role of IP in the TCP/IP internet protocol stack?
    1. Creates a virtual connection
    2. Carries the data to the final destination
    3. Splits the data into small packets
    4. Guarantees data delivery
    5. Reassembles the data to create a replica of the file

 

  1. Defines the presentation and style of the web page.
    1. HTML
    2. CSS
    3. Python
    4. JavaScript
    5. Ruby

 

  1. Controls the behavior of the web page.
    1. HTML
    2. CSS
    3. Python
    4. JavaScript
    5. Ruby

 

  1. In HTML, what is text that links to other information, or to other web pages? (what does the H stand for).
    Study hint: What does HTML stand for?
    1. hypertext
    2. hyper-extensions
    3. markup
    4. language
    5. hypermedia

 

  1. In HTML, what are links on a web page called?
    1. hyper-extensions
    2. hyperlinks
    3. markup
    4. language
    5. hypermedia

 

  1. Which is JavaScript?
    Study hint: identify the rest of the answers.
    1. < i> This text is italics< /i>
    2. h1 { color: orange; }
    3. for (i = 0; i < cars.length; i++)
    4. < p> The price of < i> rice< /i> today is 459 won.< /p>
    5. p { font-size: 20px; }

 


Поделиться:



Последнее изменение этой страницы: 2019-06-08; Просмотров: 163; Нарушение авторского права страницы


lektsia.com 2007 - 2024 год. Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав! (0.028 с.)
Главная | Случайная страница | Обратная связь