100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Internet Exam 71 Questions with Verified Answers 2024,100% CORRECT

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
22-03-2024
Written in
2023/2024

Internet Exam 71 Questions with Verified Answers 2024 Why was IPv6 introduced as the new version of the Internet Protocol? - CORRECT ANSWER With only 32 bit IP addresses, the older version could not support the large number of devices connecting to the internet. Internet users need to be able to transfer private data online, like credit card numbers and social security numbers. Some cryptographic algorithms help ensure this safety. What makes cryptographic algorithms secure? - CORRECT ANSWER The algorithms used for cryptography are based on intractable problems, making them extremely difficult to break. Which of the following statements about packets is TRUE? a) Packets must be sent in order so they can be reassembled at the end host. b) Packet switching results in a sustained connection between two hosts. c) All packets must pass through a centralized router to be verified before reaching their destination. - CORRECT ANSWER None of these statements are true. HTTP is an acronym for Hypertext Transfer Protocol. Of the following, which is the best definition of HTTP? - CORRECT ANSWER HTTP is the protocol for communicating with web servers and transferring web pages and other data back to a browser. Which of the following are ways that the Internet has changed the way people collaborate? Select TWO answers. - CORRECT ANSWER a) Cloud computing allows people to work on the same document from different areas of the world. c) Video conferencing software enables people to talk to coworkers and friends. The following diagram shows a network of connected computers. Each computer, marked "A" through "G" is depicted with a circle. Two computers that are connected will have a line between them, ant the number of the line represents the unit cost of the connection between two computers. A high number is a high cost and a low number represents a lower cost. As an example, to send data from computer A directly to computer C and then directly to computer D would have a cost of 8 + 5 = 13 units. GRAPH Data is being sent from source computer G and its final destination is computer E. What would be the lowest cost of sending this data if all network communication lines are available for data transfer? - CORRECT ANSWER 18 Which of the following identifies a physical device using the Internet? - CORRECT ANSWER An IP address How are protocols like HTTP, SMTP, and IP created? - CORRECT ANSWER A worldwide group of volunteers to draft, revise, and publish protocols What is the most useful reason for the Domain Name System? - CORRECT ANSWER Domain names are easier for humans to remember than the IP addresses of frequently visited websites. Which of the following statements are true of the standards of the Internet? Select TWO answers. - CORRECT ANSWER a) Internet standards ensure that hardware and software created by different companies will be able to communicate with each other online. b) Internet standards are specific procedures and rules that are created in order to benefit the Internet community. The Internet Engineering Task Force makes decisions by rough consensus, not by the majority of votes. What does this ensure about the Internet? - CORRECT ANSWER Although the standards that govern the Internet (like IP and DNS) might change, they will not be affected by a small group or party The term protocol is used quite a bit when referring to computer networks. Of the following, what is the best definition of protocol? - CORRECT ANSWER A protocol refers to the defined rules that allow two connection points to talk to each other Internet users need to be able to transfer private data online, like credit card numbers and social security numbers. Some cryptographic algorithms help ensure this safety. What makes cryptographic algorithms secure? - CORRECT ANSWER The algorithms used for cryptography are based on intractable problems, making them extremely difficult to break. Which of the following statements about packets is TRUE? a) Packets must be sent in order so they can be reassembled at the end host. b) Packet switching results in a sustained connection between two hosts. c) All packets must pass through a centralized router to be verified before reaching their destination. - CORRECT ANSWER None of these statements are true. DNS stands for Domain Name System and it is used to translate domain names into IP addresses. If a domain name is , which of the following would be a subdomain of this domain? - CORRECT ANSWER A Which of the following statements about redundancy on the Internet are TRUE? Select TWO answers. - CORRECT ANSWER a) Redundancy has good qualities; if several routers fail, data can still be transferred. b) Redundancy has good qualities; many devices can be added to the network without affecting traffic. Let's assume that your Internet Service Provider (ISP) promotes that their bandwidth is 2 MB per second. The latency of a packet traveling from your favorite website's server to your computer is 1 millisecond (ms). Which of the following scenarios would MOST LIKELY have the greatest potential for increasing the speed of information flow from your favorite website's server to your computer? - CORRECT ANSWER Your ISP changes its bandwidth to 2.5 MB per second, and latency form your favorite website's server to your computer is changed to 0.75 ms. Which of the following statements are TRUE on the Internet? Select TWO answers. - CORRECT ANSWER a) Most network routing on the Internet is hierarchial. d) Most data can follow more than one path to the destination device. Alice posts a key for encrypting that anyone can access. Bob uses that key to encrypt a message, then sends it to Alice. When Alice receives the message, she decrypts it using a private key. What kind of encryption process is this? - CORRECT ANSWER Public key encryption Which of the following statements is an accurate interpretation of bandwidth speed? - CORRECT ANSWER The rate at which data is downloaded in a set amount of time. Many cyber security threats have human and software components. Which of the following situations describes the human component of phishing? - CORRECT ANSWER A hacker identifies a company to impersonate, then develops a believable email to distribute to a mass address list. Computer viruses come in many forms. Which of the following descriptions is most Unlikely to be describing a virus? - CORRECT ANSWER It is sent as an email that asks recipients for their credit card numbers. Which of the following is a setback of the trust model of the Internet? - CORRECT ANSWER Systems with new certificates will struggle to be accepted by other users' systems. Which of the following strategies to prevent unauthorized access to personal data and accompanying explanation is accurate? Select TWO answers. - CORRECT ANSWER a) Avoid accessing private data while using public Wi-Fi; it's possible for hackers to intercept packets on a public network. d) Use antivirus software; since this software detects and removes many different kinds of viruses. Which of the following accurately describes the trust model of certificate authorities? - CORRECT ANSWER A certificate authority is trusted by the owner of the certificate and the party relying on the certificate. Which of the following is the BEST description of what a certificate authority does? - CORRECT ANSWER Issues digital certificates that certify the ownership of public keys. Which of the following protocols is primarily used to establish a secure connection between browsers and servers so that no data is lost? - CORRECT ANSWER SSL/TLS Which of the following statements about security on the Internet is FALSE? a) Many methods of cybersecurity rely on cryptography. b) The trust model of the Internet ensures total security. c) There are hardware and software components of cybersecurity in addition to human components. d) The Internet is designed to scale so that more systems and networks can join at any time. - CORRECT ANSWER b) The trust model of the Internet ensures total security. Desktop computers, laptops, tablets, smartphones, and other devices are made by different companies, yet they are all able to access the Internet. This has led to widespread use of the Internet from many different kinds of devices. Which of the following makes this possible? - CORRECT ANSWER Open standards and protocols Which of the following is an example of a subdomain of according to the domain name system (DNS)? - CORRECT ANSWER The figure below represents a network of physically linked computers labeled A through F. Computers with a line between them can communicate directly to each other and, if two computers do not have a line connecting them, they must go through at least one other computer to communicate with each other. For example, information can be sent directly between computers B and E, but the information sent between computers B and C must go through other computers. GRAPH Which of the following statements about security in the network is TRUE? I. Computers A and D need to communicate with at least two additional computers in the network order to communicate with each other. II. Computers B and F can communicate with each other without additional computers being aware of the communication. - CORRECT ANSWER Neither I and II Which of the following explains why open standards make encryption more secure? - CORRECT ANSWER They are developed and reviewed by committees of experts and adopted by all Internet users. Which encryption method is widely used and why? - CORRECT ANSWER Public Key Encryption: this method does not require a secure channel for exchanging keys. Which of the following statements is TRUE regarding Internet protocols? a) The Internet is the same thing as the World Wide Web b) HTTP is a protocol primarily used for electronic mail. c) When a request is made by a client computer, HTTP ensures that the client is connected to the requested web page for the entire duration it's being viewed. - CORRECT ANSWER d) All of the above are false. Which of the following scenarios would breach the security of a message encrypted with a public key? - CORRECT ANSWER If a third party accessed the private key. HTTP is an example of an open standard of the Internet. What are the benefits of open standards like HTTP? Select TWO answers. - CORRECT ANSWER b) They allow devices and applications across many networks to work together and communicate. c) They are always revised by Internet users around the world. What is the primary reason that routing on the Internet is redundant? - CORRECT ANSWER Networks are still available in case of a path or router failure. Which of the following statements about TCP/IP is FALSE? a) TCP/IP is the most widely used standard for packets and routing. b) TCP/IP is exactly two sets of protocols (TCP and IP) c) IP is a set of standards for routing and transferring information on a network. d) TCP is a set of standards for how computers communicate with each other. - CORRECT ANSWER a) TCP/IP is the most widely used standard for packets and routing. Andrew uses an application to track how long it takes a packet to travel from his computer to a Wikipedia server. Which of the following is he measuring with this application? - CORRECT ANSWER Latency Which of the following statements about packets is FALSE? - CORRECT ANSWER The packet does not contain information about the sender's IP address. A hacker uses hundreds of different IP addresses to overrun a bank's website with requests. This effectively shuts down the website and prevents any Internet users from accessing it. Which of the following is the name for this kind of attack? - CORRECT ANSWER Distributed denial of service Many networks are set up using a hierarchical architecture to create a "backbone" network. In this system, several connected routers act as the backbone and many similar LANs are connected to the backbone. This much different than having a system where every router is connected to every other router. What are the benefits of the hierarchical approach to setting up a network? Select TWO answers. - CORRECT ANSWER c) It decreases congestion in the network. d) It makes the process of transferring data much more efficient. Many hardware, software, and human components contribute to the security of the Internet. Which of the following is NOT one of the ways that cybersecurity is implemented? a) Through hardware components, such as protections built into the processing chip. b) Through software components, such as antivirus programs that detect and prevent viruses. c) Through hardware components, such as passwords for secure websites. d) Through human components, such as security questions when a password is forgotten. - CORRECT ANSWER c) Through hardware components, such as passwords for secure websites. Which of the following are benefits of the trust system of the Internet? Select TWO answers. - CORRECT ANSWER a) It is less expensive to implement that other alternatives. b) It enables cooperation between two online entities. Alice and Bob need to exchange some private data online. To do this, Alice creates an algorithm that will encrypt and decrypt data. They secretly meet to share the algorithm, then they each use the algorithm to encrypt their messages and decrypt each other's messages. What kind of encryption process is this? - CORRECT ANSWER Symmetric encryption Which of the following best describes the basic idea of fault tolerance? - CORRECT ANSWER If part of the system fails, the operation continues without interruption. The new version of the Internet Protocol, IPv6, allows for IP addressed that are 128 bits long. How many possible IP addresses are available with IPv6? - CORRECT ANSWER 2^128 Which of the following statements are true of the Internet Engineering Task Force (IETF)? Select TWO answers. - CORRECT ANSWER b) The most important work of the IETF is to create and maintain protocols like HTTP and SMTP. c) The IETF is completely made up of volunteers from all over the world who do not need to attend meetings in person to participate Which of the following standards created by the Internet Engineering Task Force (IETF) is always required? - CORRECT ANSWER IP Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers. - CORRECT ANSWER c) Different types of networks can be connected in order to transfer data and communicate d) All devices that are connected on a network uses the same protocol An end-to-end architecture creates a network that is which of the following? Select TWO answers. - CORRECT ANSWER b) Reliable c) Open Which of the following is the primary characteristic of an end-to-end architecture? - CORRECT ANSWER Specific functions are found in the two host devices, freeing up the traffic on the network between them. The following diagram shows a computer network composed of computers A - F. If there is a line between two computers, that means there is a direct connection between the two computers. Note that this network is designed so that there are alternative paths between computers. An "X" on a line means that the connection is currently broken. GRAPH A message is sent from computer A and is destined for computer D. Given the current status of this network, which of the following computers must the message go through in order to reach its destination? I. Computer B II. Computer E III. Computer F - CORRECT ANSWER II only Which of the following are potential effects of the growth of cyber warfare? Select TWO answers. - CORRECT ANSWER c) The sources of cyber-attacks will be difficult to identify, allowing for many more attacks in the future. d) Countries with less resources will make a larger impact than they have in the past. The Open Systems Interconnection (OSI) is a conceptual model whose purpose is to make networks more manageable. Its objectives include allowing for more portable hardware and software integration, the creation of standard interfaces that would allow manufacturers of different systems to interconnect their equipment and the creation of a model that would be used world-wide. There are seven layers to the OSI. The lowest - or first - layer allows a contiguous sequence of bits to be transmitted through the network. Which of the following layers is the first layer of the OSI? - CORRECT ANSWER The physical layer A domain name consists of several domain labels separated by dots. Which of the following statements about domain name labels is FALSE? a) Every domain name ends with a top-level domain label. b) The hierarchy of domain name labels descends from left to right. c) The left most label of the domain name identifies the server. d) There is virtually no limit on the number of subdomains in a domain name. - CORRECT ANSWER b) The hierarchy of domain name labels descends from left to right. Which of the following statements about cybersecurity is true? - CORRECT ANSWER Certificate authorities operate based on the trust model. Ransomware is a relatively new form of attack on a computer system. A ransomware attack is when an individual or group of individuals targets an organization's server and is able to use a sophisticated form of encryption to lock down the organization's files. Effectively, the organization cannot gain access to their own data, causing major disruptions. The term "Ransomware" comes from the fact that the organization is asked for money in exchange for being granted access to their files. Of the following, which is the LEAST effective way for an organization to protect against Ransomware? - CORRECT ANSWER Make frequent backups of its data and store the backups online on the same server as the original data. Which of the following domain names are part of the same top tier? Select TWO answers. - CORRECT ANSWER a) geA.edu c) geB.edu A new device is given an IP address and added to a network so that it can access the Internet. Large amounts of files are uploaded and downloaded to this new device, but other users who were already online do not experience any difference in performance. Which of the following enables this phenomenon? - CORRECT ANSWER Redundant routers The Domain Name System (DNS) has a hierarchy that improves redundancy and helps the systems on the Internet scale appropriately. Which of the following statements is NOT true about the DNS? a) The responsibility of a DNS server is to take the domain name from a URL and convert it into a valid IP address. b) The top-level domains in the DNS hierarchy are the extensions after the last period in the domain name, such as com, edu, org, etc. c) Top-level domains in the DNS hierarchy can be organizational or geographical. d) Possible valid domain names for XYZ Corporation include , rp, and . - CORRECT ANSWER d) Possible valid domain names for XYZ Corporation include , rp, and . A hacker changes a record so that the DNS maps an incorrect IP address with a domain name. Which of the following is the name for this kind of DNS attack? - CORRECT ANSWER DNS cache poisoning Caesar Cipher is an older and since outdated encryption technique used by Julius Caesar to "hide" messages he sent to his troops. Using Caesar Cipher, each letter in the alphabet is translated to a letter with the same given offset from the original letter. Characters that are not A-Z remain as is. For example, if the message is HI ZOE and the offset is 2, then the encrypted message is JK BQG, since the letter "J" is two letters after "H" in the alphabet, and "K" is two letters after "I" in the alphabet, etc. Notice that "Z" is at the end of alphabet and the offset is 2, the algorithm has to wrap back around the beginning of the alphabet so that "Z" translates to "B". Suppose you want to encrypt the following message: REMAIN HOME. Of the following, which would be a potential encrypted message using Caesar Cipher? - CORRECT ANSWER UHPDLQ KRPH New websites are being created every day, yet Internet users are still able to navigate the web and access information at the same speed. Which of the following makes this possible? - CORRECT ANSWER Hierarchical DNS Which of the following statements about IPv4 addresses are NOT true? - CORRECT ANSWER There are no rules or guidelines for creating a new IP address. Each packet being routed around the internet contains header information about the packet itself, and it also contains part of the file being transferred (which is called its payload). Imagine that you are sending an image of a basketball player from computer A to computer B across the internet. Of the following, which information would be contained in each packet's header? Select TWO answers. - CORRECT ANSWER b) The IP address of the destination computer. c) The sequence number of the packet in relation to all the other packets of the image. The figure below represents a network of physically linked computers labeled A through F. Computers with a line between them can communicate directly to each other and, if two computers do not have a line connecting them, they must go through at least one other computer to communicate with each other. For example, information can be sent directly between computers B and E, but the information sent between computers B and C must go through other computers. GRAPH What's the minimum number of connections that must be broken or removed in the network before computer E can no longer communicate with computer B? - CORRECT ANSWER 2 Which of the following do HTTPS and SSL procedures ensure? Select TWO answers. - CORRECT ANSWER a) That the identity of the server involved in an interaction can be trusted. c) That any messages being sent are encrypted and thus secure. You have signed a contract with your internet service provider (ISP) that guarantees you a constant download capacity of 10 gigabytes (GB) per hour. You are downloading a video from your favorite movie website, and the video has a file size of 20 GB. The average amount of time it takes a packet of information to travel from the movie website to your computer is 2 milliseconds (ms). It takes just over two hours to download the entire movie. Considering this information, which of the following statements is true? - CORRECT ANSWER The latency is 2ms and the bandwidth is 10 GB/hr. Which of the following statements is true regarding the networks that make up the Internet? Select TWO answers. - CORRECT ANSWER c) Different types of networks can be connected in order to transfer data and communicate. d) All devices that are connected on a network use the same protocol. How does the hierarchical architecture of the DNS help the system scale? - CORRECT ANSWER Host names can be found in a database that can be distributed over many servers.

Show more Read less
Institution
Internet
Course
Internet









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Internet
Course
Internet

Document information

Uploaded on
March 22, 2024
Number of pages
12
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
paulhans Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
775
Member since
5 year
Number of followers
641
Documents
6853
Last sold
6 days ago
SecureGrade

For all documents, verified, of different complexities: Assignment ,Exams,and Homework GRADED A+ #All the best in your exams.......... success!!!!!

3.5

134 reviews

5
47
4
31
3
23
2
11
1
22

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions