,https://browsegrades.net/singlePaper/416752/testbank-and-instructor-manuals-for-business-d
Test Bank
For
Business Data Networks and Security
11th Edition
Raymond R. Panko, University of Hawai`i at Mānoa
Julia L. Panko, Weber State University
Prepared by
Raymond R. Panko, University of Hawai`i at Mānoa
Boston Columbus Indianapolis New York San Francisco Hoboken
Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto
Delhi Mexico City Sao Paolo Sydney Hong Kong Seoul Singapore Taipei Tokyo
,https://browsegrades.net/singlePaper/416752/testbank-and-instructor-manuals-for-business-d
Copyright © 2019, 2015, 2013 by Pearson Education, Inc. or its affiliates. All Rights Reserved. Printed in the United
States of America. This publication is protected by copyright, and permission should be obtained from the publisher
prior to any prohibited reproduction, storage in a retrieval system, or transmission in any form or by any means,
electronic, mechanical, photocopying, recording, or otherwise. For information regarding permissions, request forms
and the appropriate contacts within the Pearson Education Global Rights & Permissions Department, please
visit www.pearsoned.com/permissions/.
Instructors of classes using Business Data Networks And Security, 11th Edition, by Panko/Panko, may reproduce
material from the Instructor’s Resource Manual and Test Bank for classroom use.
10 9 8 7 6 5 4 3 2 1 ISBN-10: 0-13-478792-7
ISBN-13: 978-0-13-478792-3
www.pearsonhighered.com
, https://browsegrades.net/singlePaper/416752/testbank-and-instructor-manuals-for-business-da
Business Data Networks and Security, 11e (Panko)
Chapter 1 Core Network Concepts and Terminology
1) Flooding a host with traffic so that it cannot serve its legitimate users is a attack.
A) hacking
B) virus
C) malware
D) DoS
Answer: D
Difficulty: Basic
Question: 1a
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology
2) The KrebsOnSecurity.com attack .
A) was a denial of service attack.
B) used IoT devices to attack the site
C) both A and B
D) neither A nor B
Answer: C
Difficulty: Basic
Question: 1b
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
3) Internet communication that does not involve a human is referred to with the term .
A) World Wide Web
B) impersonal
C) anonymous
D) IoT
Answer: D
Difficulty: Difficult
Question: 1c
Objective: Discuss how the Internet is changing and the security challenges these changes are
creating.
AACSB: Applying Information Technology, Analytical Thinking
1
Copyright © 2019 Pearson Education, Inc.