Security 11th Edition
ST
UV
TEST BANK
IA
?_
Raymond R. Panko
AP
Julia L. Panko
PR
Comprehensive Test Bank for Instructors
OV
and Students
ED
© Raymond R. Panko & Julia L. Panko. All rights reserved. Reproduction or distribution
??
without permission is prohibited.
©MEDCONNOISSEUR
, Table of Contents
Test Bank for Business Data Networks and Security (11th Edition)
Authors: Raymond R. Panko, Julia L. Panko
ST
ISBN: 9780134817125
UV
Chapter 1: Core Network Concepts and Terminology
Chapter 2: Network Standards
Chapter 3: Network Management
Chapter 3a: Hands-On: Microsoft Office Visio
Chapter 4: Network Security
IA
Chapter 5: Ethernet (802.3) Switched LANs
Chapter 6: Wireless LANs I
Chapter 7: Wireless LANs II
?_
Chapter 9: TCP/IP Internetworking II
Chapter 10: Carrier Wide Area Networks (WANs)
Chapter 11: Networked Applications
AP
PR
OV
ED
??
©MEDCONNOISSEUR
, Test bank and Instructor manuals for Business Data
Networks and Security, 11th edition By Raymond R.
Panko
ST
Business Data Networks and Security, 11e (Panko)
Chapter 1 Core Network Concepts and Terminology
UV
1) Flooding a host with traffic so that it cannot serve its legitimate users is a attack.
A) hacking
B) virus
C) malware
IA
D) DoS
Answer: D
Difficulty: Basic
Question: 1a
?_
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
2) The KrebsOnSecurity.com attack .
AP
A) was a denial of service attack.
B) used IoT devices to attack the site
C) both A and B
D) neither A nor B
Answer: C
PR
Difficulty: Basic
Question: 1b
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
OV
3) Internet communication that does not involve a human is referred to with the term .
A) World Wide Web
B) impersonal
C) anonymous
D) IoT
ED
Answer: D
Difficulty: Difficult
Question: 1c
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
??
AACSB: Applying Information Technology, Analytical Thinking
1
Copyright © 2019 Pearson Education, Inc.
, 4) If a host cannot reach a DNS server, it .
A) cannot have a host name
B) will have to rely on host names
ST
C) will need to use a DHCP server
D) is unlikely to be able to communicate with most server hosts
Answer: D
Difficulty: Difficult
Question: 1d
UV
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
5) The Mirai bots in the KrebsOnSecurity.com attack were .
IA
A) client hosts
B) server hosts
C) IoT devices
D) all of the above
?_
Answer: C
Difficulty: Basic
Question: 1e
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AP
AACSB: Applying Information Technology
6) ISPs .
A) carry traffic in the Internet
B) connect users to the Internet
PR
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 3a
OV
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
ED
??
2
Copyright © 2019 Pearson Education, Inc.