, Test Bank
v
For
Business Data Networks and Security
v v v v
11th Edition
v
,
, Business Data Networks and Security, 11e (Panko)
v v v v v v
Chapter 1 Core Network Concepts and
v v v v v v
Terminology
v
1) Flooding a host with traffic so that it cannot serve its legitimate users is a
v v v v attack. v v v v v v v v v v
A) hacking
B) virus
C) malware
D) DoS
Answer:
v
vD
Difficulty:
vBasicQuestion:
v
v1a
Objective: Discuss how the Internet is changing and the security challenges these changes
v v v v v v v v v v v v
arecreating.
v v
AACSB: Applying Information Technology
v v v
2) The KrebsOnSecurity.com attack
v . v
A) was a denial of service attack.
v v v v v
B) used IoT devices to attack the site
v v v v v v
C) both A and B v v v
D) neither A nor B v v v
Answer: C
v v
Difficulty: Basic
v v
Question: 1b
v v
Objective: Discuss how the Internet is changing and the security challenges these changes
v v v v v v v v v v v v
arecreating.
v v
AACSB: Applying Information Technology, Analytical Thinking
v v v v v
3) Internet communication that does not involve a human is referred to with the term
v . v v v v v v v v v v v v
A) World Wide Web v v
B) impersonal
C) anonymous
D) IoT
Answer:
v
vD
Difficulty:
vDifficultQuestion: v
v1c
Objective: Discuss how the Internet is changing and the security challenges these changes are
v v v v v v v v v v v v v
creating.
v
AACSB: Applying Information Technology, Analytical Thinking
v v v v v