Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Exam 3 ISYS 209 | Questions with complete solutions

Rating
-
Sold
-
Pages
14
Grade
A
Uploaded on
18-07-2024
Written in
2023/2024

Exam 3 ISYS 209 | Questions with complete solutions According to the information in this video, the telephone system is an example of a _____ network circuit-switched As Zero and One explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line. Modem According to the information in this video, computers represent data using _____. Bits In this video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____. analog signal In this video, One-Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination. packet switching Which of the following is FALSE about the TCP/IP protocol? IP helps to recover any packets that are lost or damaged during transmission. At its most basic level, a(n) _________ simply consists of two computers that are connected together. Network If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices. Router Microsoft Windows Server and Linux are examples of: network operating systems. A ________ is a set of rules that programs on two communicating devices follow. Protocol A(n) __________________ is a way to communicate in a network that is recognized by a continuous waveform: analog signal The signal from your iPod earphone is a(n): analog signal. Network signals that are represented by on-off pulses indicate a(n): digital signal. If you were building a network intended to service two buildings that were next to each other, you would construct a: local area network. A company needing a network to connect its offices in Montana, Idaho, and Utah would require a: wide area network. Bandwidth is determined by: determining the difference between the highest and lowest frequency on a channel. If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed: 100 meters. In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety? An underground wireless Wi-Fi network The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________. packet switching The Internet is based on which of the following three key technologies? Client/server computing, packet switching, and TCP/IP and related communications standards for linking networks and computers A company needing reliable network speeds at 1.5 Mbps would probably need to lease a dedicated: T1 line Which is the BEST definition of hertz? The number of cycles per second that can be sent through a medium Which single word below best describes Web 2.0? Dynamic Which of the following is NOT a function of the Internet service provider (ISP)? The ISP provides applications services. Which of the following could represent a current IP address? 207.46.250.119 Education being represented by .edu and business represented by .com are examples of: top level domains Which of the following TCP/IP application-layer protocols is used for email transmission? SMTP What is the name of the organization responsible for assigning public IP addresses? ICANN Which of the following is FALSE about the Domain Name Service (DNS)? The first name in the domain name is the organization name. Which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables? Bluetooth According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems. Malware In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers. Spoofer Based on the information provided in this video, which of the following usually happens in a denial-of-service attack? A hacker floods a Web server with so many requests that it becomes unavailable to its intended users. In this video, Special Agent Macey says the single largest threat to the Internet is _____. denial-of-service attacks According to the information provided in this video, any business that has an online presence is at risk of _____. exposure to hacker activity denial-of-service attack unauthorized data disclosure loss of customer data all of the above ______________________ is a general security term that includes computer viruses, worms, and Trojan horses. Malware Which of the following is an opportunity for threats to gain access to assets? Vulnerability A _______________ is a program that seems like a normal program, but does something completely unexpected. Trojan horse A __________ is a unique type of malware that replicates itself from one computer to another. Worm A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers. Keylogger Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________. Cybervandalism Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack. denial-of-service If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________. Phishing ____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system. Ransomware Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising. click fraud The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000. ILOVEYOU _______________ requires that your patient records be protected and saved for six years. HIPAA Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal? Gramm-Leach-Bliley Act _____________ provides rules related to the creation of financial statements to help avoid fraud. Sarbanes-Oxley Act Establishing a risk level of malware threats to an organization is an example of _______________. risk assessment Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________. social engineering Electronic evidence on computer storage media that is not visible to the average user is called ________. ambient data Which of the following is a critical security function of senior management in anorganization? Establishing the security policy and managing risk ___________________ is the ability to determine that a person is who he or she claims to be through a variety of means. Authentication Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication. Biometric Which of the following is NOT addressed by a business continuity plan? The technical issues involved in keeping systems up and running Which of the following examine(s) data files and sorts out low-priority online material while assigning higher priority to business-critical files? Deep packet inspection Which of the following is FALSE regarding public-key encryption? On receiving the message, the recipient uses the public key to decrypt it.

Show more Read less
Institution
ISYS 209
Course
ISYS 209









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
ISYS 209
Course
ISYS 209

Document information

Uploaded on
July 18, 2024
Number of pages
14
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers
$18.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Bri254 Rasmussen College
View profile
Follow You need to be logged in order to follow users or courses
Sold
911
Member since
5 year
Number of followers
738
Documents
3505
Last sold
1 week ago
Best Tutorials, Exam guides, Homework help.

When assignments start weighing you down, take a break. I'm here to create a hassle-free experience by providing up-to-date and recent study materials. Kindly message me if you can't find your tutorial and I will help.

4.0

181 reviews

5
106
4
20
3
25
2
6
1
24

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions