+ All Categories
Home > Documents > Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6...

Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6...

Date post: 21-Dec-2015
Category:
View: 219 times
Download: 1 times
Share this document with a friend
Popular Tags:
21
Nasca 2007 200 200 200 200 400 400 400 400 600 600 600 600 800 800 800 800 1000 1000 1000 1000 Internet Ch. 5 Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8
Transcript
Page 1: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Nasca 2007

200 200 200 200

400 400 400 400

600 600 600 600

800 800 800 800

1000 1000 1000 1000

Internet Ch. 5 Internet Ch. 8 Networking and Security Ch. 6

Networking and Security Ch. 8

Page 2: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

A _________ is a clip of audio or video content that is

broadcast over the Internet using compressed audio files

such as MP3s.

podcast

Page 3: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Which of the following is the relatively new scam that attempts to

trick you into giving away confidential information through the

use of official-looking e-mails and phony Web sites?

phishing

Page 4: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Often used to personalize a Web site and make return visits more

efficient, a ___________ is stored on your computer by the Web server.

cookie

Page 5: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

A computer is identified by a(n) __________ so that data sent over the Internet gets

sent to the correct computer.

IP Address

Page 6: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

The technology that allows you to listen to a music file while it is being downloaded from a Web site to your

browser, without waiting for the download to finish, is called

Streaming audio

Page 7: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

_______ refers to the process of coding e-mail so that only the

person with the key to the code can decode and read the

message.

Encryption

Page 8: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

____________ is a client-side, small application that resides on

a server.

applet

Page 9: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

The communications method whereby data is broken into

smaller chunks that are sent over various routes at the same time

is

Packet switching

Page 10: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Secure Sockets Layer:a.) provides an authentication and password protection.

b.) creates a safe connection between a client and a server.

c.) is an extension to the HTTP protocol. d.) was created especially for the transfer of hypertext

documents.

b.) creates a safe connection between a

client and a server.

Page 11: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Which protocol is used on the Internet for data transmission?

TCP/IPHTTPUDPFTP

TCP/IP

Page 12: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

All network nodes (computers and peripherals) are connected to each other

and to the network by

Transmission media

Page 13: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Which of the following attaches to a network and provides wireless nodes with a means of wirelessly

connecting to the network?

Wireless Access Point

Page 14: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Public places at which you can wirelessly connect to the

Internet are known as

hotspots

Page 15: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

A _____________ is defined as anyone who breaks into a

computer system (whether an individual computer or a

network) unlawfully.

hacker

Page 16: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Whatis the weakest link in a computer security system?

The user

Page 17: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

A LAN is most likely to be used for which geographical area?

a.) building. b.) metropolitan area.

c.) town. d.) country.

a. building

Page 18: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

___________ topology is the most widely deployed client/server network layout in businesses

today because it offers the most flexibility.

Star

Page 19: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

To flow through a network, data is broken into small

segments called

packets

Page 20: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

Which of the cable types has the highest run length and

the highest installation cost?

Fiber-optic

Page 21: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.

A firewall ensures that incoming data came from a

valid source by using a technique known as

Packet screening


Recommended