Business Data Networks And Security
By Raymond R. Panko,
11th Edition
,Table Of Content
Chapter 1: Welcome To The Cloud
Chapter 2: Network Standards
Chapter 3: Network Security
Chapter 4: Network And Security Management
Chapter 5: Ethernet (802.3) Switched Lans
Chapter 6: Wireless Lans I
Chapter 7: Wireless Lans Ii
Chapter 8: Tcp/Ip Internetworking I
Chapter 9: Tcp/Ip Internetworking Ii
Chapter 10: Wide Area Networks
Chapter 11: Networked Applications
,Business Data Networks And Security, 11e (Panko)
Chapter 1 Core Network Concepts And Terminology
1) Flooding A Host With Traffic So That It Cannot Serve Its Legitimate Users Is A Attack.
A) Hacking
B) Virus
C) Malware
D) Dos
ANS: D Difficulty:
Basic Question: 1a
Objective: Discuss How The Internet Is Changing And The Security Challenges These Changes
Are Creating.
Aacsb: Applying Information Technology
2) The Krebsonsecurity.Com Attack .
A) Was A Denial Of Service Attack.
B) Used Iot Devices To Attack The Site
C) Both A And B
D) Neither A Nor
B ANS: C
Difficulty: Basic
Question: 1b
Objective: Discuss How The Internet Is Changing And The Security Challenges These Changes
Are Creating.
Aacsb: Applying Information Technology, Analytical Thinking
3) Internet Communication That Does Not Involve A Human Is Referred To With The Term .
A) World Wide Web
B) Impersonal
C) Anonymous
D) Iot
ANS: D Difficulty:
Difficult Question:
1c
Objective: Discuss How The Internet Is Changing And The Security Challenges These Changes
Are Creating.
Aacsb: Applying Information Technology, Analytical Thinking
, 4) If A Host Cannot Reach A Dns Server, It .
A) Cannot Have A Host Name
B) Will Have To Rely On Host Names
C) Will Need To Use A Dhcp Server
D) Is Unlikely To Be Able To Communicate With Most Server
Hosts ANS: D
Difficulty: Difficult
Question: 1d
Objective: Discuss How The Internet Is Changing And The Security Challenges These Changes
Are Creating.
Aacsb: Applying Information Technology, Analytical Thinking
5) The Mirai Bots In The Krebsonsecurity.Com Attack Were .
A) Client Hosts
B) Server Hosts
C) Iot Devices
D) All Of The
Above ANS: C
Difficulty: Basic
Question: 1e
Objective: Discuss How The Internet Is Changing And The Security Challenges These Changes
Are Creating.
Aacsb: Applying Information Technology
6) Isps .
A) Carry Traffic In The Internet
B) Connect Users To The Internet
C) Both A And B
D) Neither A Nor
B ANS: C
Difficulty: Basic
Question: 3a
Objective: Discuss How The Internet Is Changing And The Security Challenges These Changes
Are Creating.
Aacsb: Applying Information Technology, Analytical Thinking