Module 3 Flashcards
Standard category in which standards are supported by a number of vendors, but do not have any official standing
De facto
What are the 4 basic functions of application?
- Data storage
- Data access
- Application logic
- Presentation logic
Which of the following are true about a router?
A. A router transfers packets from one network to another network
B. A Router translates DNS names to IP addresses
C. A Router works at the internet layer of the 5 layer hybrid OSI/TCP/IP model
D. A router is necessary to switch frames within a network
E. A router transmits frames between networks
A. A router transfers packets from one network to another network
C. A Router works at the internet layer of the 5 layer hybrid OSI/TCP/IP model
Organization that is responsible for establishing standards that govern how the Internet operates
Internet Engineering Task Force (IETF)
What is the dominant technology used in desktop area networks?
A. Bluetooth
B. Ethernet
C. infra red
D. RFID
E. DSL
A. Bluetooth
Which of the following are components of a network?
A. Hard drives
B. Protocols
C. Network standards
D. Communications devices
E. Messages
F. Applications
B. Protocols
D. Communications devices
E. Messages
F. Applications
Which protocol is used for network management?
A. HTTP
B. TCP
C. SNMP
D. IP
E. SMTP
C. SNMP
What technology is primarily used to prevent penetration attacks?
Firewall
Which of these statements describe a Denial of Service (DoS) attack?
A. Unsuspecting computer users can be part of a DoS attack if their computer has been infected with a malicious bot program
B. Strong authentication techniques using cryptography is the best defense against a DoS attack
C. The attacker sends an initial single break-in packet
D. Users of the network usually don’t experience an impact by this type of attack unless they receive a bogus packet
E. One or more machines send bogus packets to try to overload the network so valid packets can’t be processed
A. Unsuspecting computer users can be part of a DoS attack if their computer has been infected with a malicious bot program
C. The attacker sends an initial single break-in packet
E. One or more machines send bogus packets to try to overload the network so valid packets can’t be processed
Which of the following are objectives of securing a network?
A. Confidentiality
B. Availability
C. Integrity
D. Proper ordering of messages
E. Elimination of redundancy by compressing data
A. Confidentiality
B. Availability
C. Integrity
Multitier architectures are characterized by which of the following?
A. were popular in the 60s and 70s to run timesharing
B. distribute processing functions over 2 or more computers
C. run client/server applications
D. put data storage logic on one computer and all other logic on another
E. are ones where each machine is both a client and a server
C. run client/server applications
B. distribute processing functions over 2 or more computers
Which of the following are characteristics of a host-based architecture?
A. time-sharing
B. dumb terminals
C. personal computers
D. heavy network demand
E. serial communication
A. time-sharing
B. dumb terminals
E. serial communication
Which of the following were important advancements made in the industry in the 1970s and 1980s that led to a new type of system architecture?
A. the development of VoIP
B. the development of inexpensive networks
C. the development of commercial off-the-shell software (COTS)
D. the development of unbounded media
E. the development of microprocessors
B. the development of inexpensive networks
C. the development of commercial off-the-shell software (COTS)
E. the development of microprocessors
Which of the following statements are true about host-based architectures?
A. put all the processing on a single computer
B. are ones where each machine is both a client and a server
C. examples today include cloud applications such as Blackboard and Google docs
D. examples today include use of Telnet and sensor-based applications
E. evenly distribute processing on two systems
A. put all the processing on a single computer
D. examples today include use of Telnet and sensor-based applications
Which of the following characterize cloud computing?
A. lack of scalability
B. elimination of risk
C. self-service
D. dynamic resource allocation
C. self-service
D. dynamic resource allocation