4
Chap 1 1) To emphasize the fact that the user does not have to see how it works internally, the ________ is often drawn as a cloud. A) network core B) access link C) host D) server Answer: A 2) In terminal-host processing, processing is done on both the terminal and the server. A) True. B) False. Answer: B 3) In client/server processing, processing is done on the ________. A) client B) server C) Both A and B D) Neither A nor B Answer: C 4) In P2P applications, most processing is done on the ________. A) client B) server C) Both A and B about equally. Answer: A 5) Client PCs provide service to other client PCs in ________ applications. A) P2P B) client/server C) Both A and B D) Neither A nor B Answer: A 6) In cloud computing, server management is outsourced.

studyquestionstst1fall13 (2)

  • Upload
    saul

  • View
    223

  • Download
    1

Embed Size (px)

DESCRIPTION

For fall 2013

Citation preview

Page 1: studyquestionstst1fall13 (2)

Chap 11) To emphasize the fact that the user does not have to see how it works internally, the ________ is often drawn as a cloud.A) network coreB) access linkC) hostD) serverAnswer: A

2) In terminal-host processing, processing is done on both the terminal and the server.A) True.B) False.Answer: B

3) In client/server processing, processing is done on the ________.A) clientB) serverC) Both A and BD) Neither A nor BAnswer: C

4) In P2P applications, most processing is done on the ________.A) clientB) serverC) Both A and B about equally.Answer: A

5) Client PCs provide service to other client PCs in ________ applications.A) P2PB) client/serverC) Both A and BD) Neither A nor BAnswer: A

6) In cloud computing, server management is outsourced.A) True.B) False.Answer: A

7) Network speeds usually are measured in ________.A) bits per secondB) bytes per secondC) Both A and BAnswer: A

Page 2: studyquestionstst1fall13 (2)

Chap 21) Network standards are also called protocols.A) True.B) False.Answer: A

2) Standards govern ________.A) semanticsB) syntaxC) Both A and BD) Neither A nor BAnswer: C

3) The meaning of a message is referred to as the message's ________.A) protocolB) orderC) valueD) syntaxE) semanticsAnswer: E

4) How a message is organized is its ________.A) syntaxB) semanticsC) orderD) Both A and BAnswer: A

5) In HTTP, a server may initiate an interaction with the client.A) True.B) False.Answer: B

6) Host P transmits a SYN to Host Q. If host Q is willing to open the connection, it will transmit a(n) ________ segment.A) ACKB) SYNC) SYN/ACKD) None of the above.Answer: C

Chap 3

1) The threat environment includes ________.A) attackersB) attacks

Page 3: studyquestionstst1fall13 (2)

C) Both A and BD) Neither A nor BAnswer: C

2) Which phase of the plan-protect-respond cycle takes the largest amount of work?A) Plan.B) Protect.C) Respond.D) Each phase requires about equal effort.Answer: B

3) Compromises also are called ________.A) breachesB) incidentsC) Both A and BD) Neither A nor BAnswer: C

4) A compromise is an attempted attack.A) True.B) False.Answer: B

5) Malware is a generic name for evil software.A) True.B) False.Answer: A

6) A ________ is a flaw in a program that permits a specific attack or set of attacks against this problem.A) malwareB) security errorC) vulnerabilityD) security faultAnswer: C

7) Users typically can eliminate a vulnerability in one of their programs by ________.A) installing a patchB) doing a zero-day installationC) Both A and BD) Neither A nor BAnswer: A