MIS 200 Module 4 - 6

25 July 2022
4.7 (114 reviews)
100 test answers

Unlock all answers in this set

Unlock answers (96)
question
Viruses can only be transmitted through direct computer-to-computer contact.
answer
false
question
A(n) ____ is often used so remote users have a secure connection to the organization's network
answer
virtual private network
question
Confidentiality, integrity, and availability are collectively referred to as the CIA triangle.
answer
true
question
A ____ is a programming routine built into a system by its designer or programmer.
answer
backdoor
question
An intrusion detection system can protect against both external and internal access.
answer
true
question
Backup facilities should never be shared in an attempt to reduce costs.
answer
false
question
____ refers to the accuracy of information resources within an organization.
answer
Integrity
question
Black hats are also known as ethical hackers.
answer
false
question
Level 2 security involves ____.
answer
back-end systems
question
A ____ travels from computer to computer in a network, but it does not usually erase data.
answer
worm
question
A firewall cannot reject an incoming packet, but instead sends a warning to the network administrator.
answer
false
question
Level 3 security involves ____.
answer
Corporate Network
question
____ are computer security experts who specialize in penetration testing and other testing methods to ensure that a company's information systems are secure.
answer
White Hats
question
An ideal password should be eight characters or longer.
answer
true
question
Which of the following is a type of access control?
answer
passwords
question
Social engineering takes advantage of the human element of security systems.
answer
true
question
A logic bomb is a type of ____.
answer
Trojan program
question
____ is the process of capturing and recording network traffic.
answer
sniffing
question
Level 1 security protects the back-end systems to ensure confidentiality, accuracy, and integrity of data.
answer
false
question
When using mirror disks, if one of the two disks containing the same data fails, the other disk also fails.
answer
false
question
A distributed denial-of-service (DDoS) attack involves hundreds of computers working together to bombard a Web site with thousands of requests for information in a short period.
answer
true
question
____ is a commonly used encryption protocol that manages transmission security on the Internet.
answer
secure sockets layer
question
Which of the following is a physical security measure?
answer
electronic trackers
question
Part of ensuring integrity is identifying authorized users and granting them access privileges.
answer
true
question
Data encryption transforms data into a scrambled form called ciphertext.
answer
true
question
___ are usually placed in front of a firewall and can identify attack signatures and trace patterns.
answer
Intrusion detection systems
question
In ____ encryption, the same key is used to encrypt and decrypt the message.
answer
symmetric
question
____ security measures use a physiological element to enhance security measures.
answer
biometric
question
Corner bolts are secured to a computer at the power outlet.
answer
false
question
Which of the following is a nonbiometric security measure?
answer
firewalls
question
____ ensures data security and integrity over public networks, such as the Internet.
answer
transport layer security
question
____ encryption uses a public key known to everyone and a private key known only to the recipient.
answer
asymmetric
question
The main advantage of asymmetric encryption is that it is faster and requires only a small amount of processing power.
answer
false
question
Which of the following is a biometric security measure?
answer
signature analysis
question
A ____ attack floods a network or server with service requests to prevent legitimate users' access to the system
answer
denial of service
question
Which of the following is considered an intentional threat?
answer
social engineering
question
The main function of the ____ model is to provide information on security incidents, including information systems' vulnerabilities, viruses, and malicious programs
answer
CIRC
question
Level 1 security involves ____.
answer
front-end servers
question
____ means that computers and networks are operating and authorized users can access the information they need
answer
availability
question
____ are hackers who specialize in unauthorized penetration of information systems.
answer
black hats
question
A ____ plan lists the tasks that must be performed to restore damaged data and equipment.
answer
disaster recovery
question
____ means that a system must prevent disclosing information to anyone who is not authorized to access it.
answer
confidentiality
question
Application-filtering firewalls are less expensive than packet-filtering firewalls.
answer
false
question
Typically, an organization leases the media used for a VPN on a(n) ____ basis.
answer
as needed
question
Spoofing is sending fraudulent e-mails that seem to come from legitimate sources, such as a bank or university
answer
false
question
A ____ is an inexperienced, usually young hacker who uses programs that others have developed to attack computer and network systems.
answer
script kiddie
question
A ____ attack typically targets Internet servers.
answer
denial of service
question
A worm travels from computer to computer in a network, but it does not usually erase data
answer
true
question
____ take advantage of the human element of security systems.
answer
social engineering attacks
question
Many organizations now follow the ____ model to form teams that can handle network intrusions and attacks quickly and effectively.
answer
cert
question
Fiber-optic cables have a higher capacity, smaller size, lighter weight, lower attenuation, and higher security than other cable types.
answer
true
question
Data communication technologies make, Web and video conferencing easier, which can reduce the costs of business travel.
answer
true
question
In ____ processing, each department has its own computer for performing processing tasks.
answer
decentralized
question
A routing table lists ____.
answer
nodes on a network
question
What is the first step in client/server communication?
answer
the user creates a query
question
The most common n-tier architecture is the three-tier architecture.
answer
true
question
When phone lines are used for Internet connections, a digital modem is necessary to convert a computer's digital signals to analog signals
answer
false
question
In data communication, ____ refers to integrating voice, video, and data so that multimedia information can be used for decision making.
answer
convergence
question
Ethernet is a standard communication protocol embedded in software and hardware devices used for building a LAN
answer
true
question
Databases and input/output devices can be distributed.
answer
true
question
____ cables are glass tubes surrounded by concentric layers of glass, called "cladding," to form a light path through wire cables
answer
fiber optic
question
Protocols help ensure compatibility between different manufacturers' devices.
answer
true
question
In the Open Systems Interconnection model, the session layer is responsible for formatting message packets.
answer
false
question
Traditional mainframe networks use a ____ topology.
answer
hiearchial
question
In the context of the technologies developed to improve the efficiency and quality of digital communications, ____ divide(s) each channel into six time slots.
answer
Time Division Multiple Access (TDMA)
question
Terrestrial microwave uses space-based transmitters and receivers and is often used for point-to-point links between buildings.
answer
false
question
Communication media connect sender and receiver devices.
answer
true
question
Many cables are required for a star topology
answer
true
question
A network ____ represents a network's physical layout
answer
topology
question
____ media operate on line-of-sight.
answer
terrestrial microwave
question
In _____ data transmission, multiple pieces of data are sent simultaneously.
answer
broadband
question
The process of deciding which path the data takes on a network is called ____.
answer
routing
question
The most common n-tier architecture involves ____ tiers.
answer
three
question
Radiated media use an antenna for transmitting data through air or water
answer
true
question
The amount of data that can be transferred from one point to another in one second is called ____.
answer
bandwidth
question
Local area networks(LANs) are used most often to isolate resources.
answer
true
question
Centralized processing is the primary configuration used in data communications today.
answer
false
question
Within the ____ technique for wireless security, a user's computer and the AP use a master key to negotiate for a key that will be used for a session.
answer
wifi protected access
question
A wide area network can only use one type of communication media in the network - coaxial cables
answer
false
question
The ____ topology is costly and difficult to maintain and expand.
answer
mesh
question
It is important to separate an organization's core functions from the data communication systems that support them
answer
false
question
Another name for a network interface card is a(n) ____.
answer
adapter card
question
The ____ layer of the OSI model serves as the window through which applications access network services.
answer
application
question
Data transmission channels are generally divided into two types: broadband and narrowband.
answer
true
question
In a point-to-point system, several devices share the same medium simultaneously.
answer
false
question
The Transmission Control Protocol (TCP) operates at the OSI model's ____ layer.
answer
transport
question
A hierarchical topology is also called a ____ topology.
answer
tree
question
All Internet connections require a modem.
answer
false
question
A bridge connects two LANs using the same protocol, and the communication medium must be the same on both LANs.
answer
true
question
The ____ layer of the OSI model generates the receiver's address and ensures the integrity of messages by making sure packets are delivered without error, in sequence, and with no loss or duplication
answer
transport
question
A ____ network is a network operating on a radio frequency (RF), consisting of radio cells, each served by a fixed transmitter.
answer
mobile
question
LANs are used most often to ____.
answer
integrate services, such as e-mail and file sharing
question
In the context of mobile networking, the 3G network has increased the quality of Internet Telephony or Voice over Internet Protocol.
answer
true
question
Internet protocol is responsible for packet forwarding.
answer
true
question
An Ethernet cable is used to connect computers, hubs, switches, and routers to a network.
answer
true
question
____ scaling refers to adding more workstations (clients).
answer
horizontal
question
Wireless network traffic can be captured with sniffers.
answer
true
question
In a bus topology, ____ are used at each end of the cable to absorb the signal.
answer
terminators
question
____ is using a cellular phone outside of a carrier's limited service area.
answer
roaming
question
The ring topology needs more cable than a star topology
answer
false