Upload
saul
View
223
Download
1
Embed Size (px)
DESCRIPTION
For fall 2013
Citation preview
Chap 11) To emphasize the fact that the user does not have to see how it works internally, the ________ is often drawn as a cloud.A) network coreB) access linkC) hostD) serverAnswer: A
2) In terminal-host processing, processing is done on both the terminal and the server.A) True.B) False.Answer: B
3) In client/server processing, processing is done on the ________.A) clientB) serverC) Both A and BD) Neither A nor BAnswer: C
4) In P2P applications, most processing is done on the ________.A) clientB) serverC) Both A and B about equally.Answer: A
5) Client PCs provide service to other client PCs in ________ applications.A) P2PB) client/serverC) Both A and BD) Neither A nor BAnswer: A
6) In cloud computing, server management is outsourced.A) True.B) False.Answer: A
7) Network speeds usually are measured in ________.A) bits per secondB) bytes per secondC) Both A and BAnswer: A
Chap 21) Network standards are also called protocols.A) True.B) False.Answer: A
2) Standards govern ________.A) semanticsB) syntaxC) Both A and BD) Neither A nor BAnswer: C
3) The meaning of a message is referred to as the message's ________.A) protocolB) orderC) valueD) syntaxE) semanticsAnswer: E
4) How a message is organized is its ________.A) syntaxB) semanticsC) orderD) Both A and BAnswer: A
5) In HTTP, a server may initiate an interaction with the client.A) True.B) False.Answer: B
6) Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment.A) ACKB) SYNC) SYN/ACKD) None of the above.Answer: C
Chap 3
1) The threat environment includes ________.A) attackersB) attacks
C) Both A and BD) Neither A nor BAnswer: C
2) Which phase of the plan-protect-respond cycle takes the largest amount of work?A) Plan.B) Protect.C) Respond.D) Each phase requires about equal effort.Answer: B
3) Compromises also are called ________.A) breachesB) incidentsC) Both A and BD) Neither A nor BAnswer: C
4) A compromise is an attempted attack.A) True.B) False.Answer: B
5) Malware is a generic name for evil software.A) True.B) False.Answer: A
6) A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.A) malwareB) security errorC) vulnerabilityD) security faultAnswer: C
7) Users typically can eliminate a vulnerability in one of their programs by ________.A) installing a patchB) doing a zero-day installationC) Both A and BD) Neither A nor BAnswer: A