Test Bank
For
TU
Business Data Networks and Security
11th Edition
TO
Raymond R. Panko
Business Data Networks and Security, 11e (Panko)
Chapter 1 Core Network Concepts and Terminology
R
1) Flooding a host with traffic so that it cannot serve its legitimate users is a attack.
A) hacking
B) virus
G
C) malware
D) DoS
Answer: D
Difficulty: Basic
U
Question: 1a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
R
AACSB: Applying Information Technology
U
jhgfdsa
, JHGFDSA
2) The KrebsOnSecurity.com attack .
A) was a denial of service attack.
B) used IoT devices to attack the site
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 1b
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
TU
AACSB: Applying Information Technology, Analytical Thinking
3) Internet communication that does not involve a human is referred to with the term .
A) World Wide Web
B) impersonal
C) anonymous
TO
D) IoT
Answer: D
Difficulty: Difficult
Question: 1c
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
R
G
U
R
U
jhgfdsa
, JHGFDSA
4) If a host cannot reach a DNS server, it .
A) cannot have a host name
B) will have to rely on host names
C) will need to use a DHCP server
D) is unlikely to be able to communicate with most server hosts
Answer: D
Difficulty: Difficult
Question: 1d
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
TU
AACSB: Applying Information Technology, Analytical Thinking
5) The Mirai bots in the KrebsOnSecurity.com attack were .
A) client hosts
B) server hosts
C) IoT devices
D) all of the above
TO
Answer: C
Difficulty: Basic
Question: 1e
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
R
6) ISPs .
A) carry traffic in the Internet
B) connect users to the Internet
G
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
U
Question: 3a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
R
U
jhgfdsa
, JHGFDSA
7) A packet sent from one host to another over the Internet will ALWAYS pass through
.
A) a single ISP
B) more than 2 ISPs
C) exactly 2 ISPs
D) none of the above
Answer: D
Difficulty: Difficult
Question: 3c
Objective: Discuss how the Internet is changing and the security challenges these changes are
TU
creating.
AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
8) We call any device connected to the Internet a(n) .
A) IP
B) client
TO
C) router
D) host
Answer: D
Difficulty: Basic
Question: 4a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
R
AACSB: Applying Information Technology
9) Which of the following is a host when it's on a network?
A) a client PC
G
B) a server
C) a mobile phone
D) all of the above
Answer: D
U
Difficulty: Basic
Question: 4b
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
R
AACSB: Applying Information Technology
U
jhgfdsa