For
Business Data Networks and Security
11th Edition
Raymond R. Panko, University of Hawai`i at Mānoa
Julia L. Panko, Weber State University
,Test bank and Instructor manuals for Business Data
Networks and Security, 11th edition By Raymond R.
Panko
Business Data Networks and Security, 11e (Panko)
Chapter 1 Core Network Concepts and Terminology
1) Flooding a host with traffic so that it cannot serve its legitimate users is a attack.
A) hacking
B) virus
C) malware
D) DoS
Answer: D
Difficulty: Basic
Question: 1a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
2) The KrebsOnSecurity.com attack .
A) was a denial of service attack.
B) used IoT devices to attack the site
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 1b
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
3) Internet communication that does not involve a human is referred to with the term .
A) World Wide Web
B) impersonal
C) anonymous
D) IoT
Answer: D
Difficulty: Difficult
Question: 1c
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
1
Copyright © 2019 Pearson Education, Inc.
, 4) If a host cannot reach a DNS server, it .
A) cannot have a host name
B) will have to rely on host names
C) will need to use a DHCP server
D) is unlikely to be able to communicate with most server hosts
Answer: D
Difficulty: Difficult
Question: 1d
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
5) The Mirai bots in the KrebsOnSecurity.com attack were .
A) client hosts
B) server hosts
C) IoT devices
D) all of the above
Answer: C
Difficulty: Basic
Question: 1e
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
6) ISPs .
A) carry traffic in the Internet
B) connect users to the Internet
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 3a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
2
Copyright © 2019 Pearson Education, Inc.