Security 11th Edition Panko (Ch 1 TO 11)
TABLES OF CONTENTS
,1. Core Network Concepts and Terminology.
1a. hands-On: A Few Internet Tools
2. Network Standards
3. Network Management
3a. hands-On: Microsoft Office Visio
4. Network Security.
5. Ethernet (802.3) Switched LANs
5a. hands-On: Cutting and Connectorizing UTP
6. Wireless LANs I
6a. hands-On: Using Xirrus Wi-Fi Inspector
7. Wireless LANs II
8. TCP/IP Internetworking I
8a. hands-On: Wireshark Packet Capture
9. TCP/IP Internetworking II
9a. Cisco's IOS Command Line Interface (CLI)
10. Carrier Wide Area Networks (WANs)
11. Networked Applications
Business Data Networks and Security., 11e
(Panko) Chapter 1 Core Network Concepts
and Terminology.
,1) Flooding a host with traffic so that it cannot serve its legitimate users is a attack.
A) hacking
B) virus
C) malware
D) DoS
Answer:
D
Difficulty.: Basic
Question: 1a
Objective: Discuss how the Internet is changing and the security. challenges these
changes are creating.
AACSB: Apply.ing Information Technology.
, 2) The KrebsOnSecurity..com attack .
A) was a denial of service attack.
B) used IoT devices to attack the site
C) both A and B
D) neither A nor
B Answer: C
Difficulty.:
Basic Question:
1b
Objective: Discuss how the Internet is changing and the security. challenges these
changes are creating.
AACSB: Apply.ing Information Technology., Analy.tical Thinking
3) Internet communication that does not involve a human is referred to with the
term .
A) World Wide Web
B) impersonal
C) anony.mous
D) IoT
Answer:
D
Difficulty.:
Difficult
Question: 1c
Objective: Discuss how the Internet is changing and the security. challenges these
changes are creating.
AACSB: Apply.ing Information Technology., Analy.tical Thinking