AND ANSWERS NEW UPDATE
To minimize the invasion of privacy, _____. - Answer-users should be able to review
their records and correct any inaccuracies
An intrusion detection system can protect networks against both external and internal
access. T/F - Answer-true
Social engineering is an attack that takes advantage of the backdoors in security
systems. T/F - Answer-false
__is a form of spyware that records the keys pressed on a keyboard and can be
software or hardware devices. - Answer-Keystroke loggers
____is an attempt to gain access to a network by posing as an authorized user in order
to find sensitive information, such as passwords and credit card information. - Answer-
spoofing
Which of the following statements is true of a worm? - Answer-It is an independent
program that can spread itself without attaching itself to a host program.
In the event of a network attack or intrusion, a _____ lists the tasks that must be
performed by the organization to restore damaged data and equipment. - Answer-
disaster recovery plan
___ is a type of data encryption that enables users of the Internet to securely and
privately exchange data through the use of a pair of keys that is obtained from a trusted
authority and shared through that authority. - Answer-Asymmetric key encryption
__ is a biometric security measure - Answer-fingerprint
The lock in a browser address bar indicates a safe web connection over _____. -
Answer-Secure Sockets Layer
In _____, one node is in charge of selecting the path for all packets. - Answer-
centralized routing
____ is the amount of data that can be transferred from one point to another in one
second. - Answer-bandwidth
, Identify a true statement about the different forms of sender and receiver devices. -
Answer-Thin clients have no processing power.
____ refers to the electronic transfer of data from one location to another. - Answer-
Data communication
Communication media that use an antenna for transmitting data through air or water are
called _____. - Answer-radiated media
__ refers to rules of conduct that govern data communication. - Answer-protocol
Typically, a narrowband carries more data than a broadband. T/F - Answer-false
Computer indicators such as 0s and 1s used for instructions are signals.
T/F - Answer-true
In data communication, _____ refers to integrating voice, video, and other data to
create multimedia information that can be used for decision making. - Answer-
convergence
___ check to see what links are on the user's Web page and make sure they work; if a
link is broken, they identify it and include this information as part of the data about that
page. - Answer-crawlers
A(n) _____is a secure network that uses the internet and web technologies to connect
intranets of business partners so that communication between organizations is possible.
- Answer-Extranet
Which of the following is a type of interorganizational system? - Answer-extranet
The protocol that is used for internet telephony is _____. - Answer-Voice over internet
protocol
_are indexes of information, based on keywords embedded in documents, that allow
search engines to find what Internet users are looking for. - Answer-Directories
There are multiple internet backbones, and they are connected at network access
points. T/F - Answer-true
Which of the following indicates the top-level domain for the universal resource locator
(URL), http://www.csub.edu? - Answer-.edu
An intranet application or service that uses an organization's computer network. T/F -
Answer-true