Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6...
-
date post
21-Dec-2015 -
Category
Documents
-
view
221 -
download
1
Transcript of Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6...
![Page 1: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/1.jpg)
Nasca 2007
200 200 200 200
400 400 400 400
600 600 600 600
800 800 800 800
1000 1000 1000 1000
Internet Ch. 5 Internet Ch. 8 Networking and Security Ch. 6
Networking and Security Ch. 8
![Page 2: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/2.jpg)
A _________ is a clip of audio or video content that is
broadcast over the Internet using compressed audio files
such as MP3s.
podcast
![Page 3: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/3.jpg)
Which of the following is the relatively new scam that attempts to
trick you into giving away confidential information through the
use of official-looking e-mails and phony Web sites?
phishing
![Page 4: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/4.jpg)
Often used to personalize a Web site and make return visits more
efficient, a ___________ is stored on your computer by the Web server.
cookie
![Page 5: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/5.jpg)
A computer is identified by a(n) __________ so that data sent over the Internet gets
sent to the correct computer.
IP Address
![Page 6: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/6.jpg)
The technology that allows you to listen to a music file while it is being downloaded from a Web site to your
browser, without waiting for the download to finish, is called
Streaming audio
![Page 7: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/7.jpg)
_______ refers to the process of coding e-mail so that only the
person with the key to the code can decode and read the
message.
Encryption
![Page 8: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/8.jpg)
____________ is a client-side, small application that resides on
a server.
applet
![Page 9: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/9.jpg)
The communications method whereby data is broken into
smaller chunks that are sent over various routes at the same time
is
Packet switching
![Page 10: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/10.jpg)
Secure Sockets Layer:a.) provides an authentication and password protection.
b.) creates a safe connection between a client and a server.
c.) is an extension to the HTTP protocol. d.) was created especially for the transfer of hypertext
documents.
b.) creates a safe connection between a
client and a server.
![Page 11: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/11.jpg)
Which protocol is used on the Internet for data transmission?
TCP/IPHTTPUDPFTP
TCP/IP
![Page 12: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/12.jpg)
All network nodes (computers and peripherals) are connected to each other
and to the network by
Transmission media
![Page 13: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/13.jpg)
Which of the following attaches to a network and provides wireless nodes with a means of wirelessly
connecting to the network?
Wireless Access Point
![Page 14: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/14.jpg)
Public places at which you can wirelessly connect to the
Internet are known as
hotspots
![Page 15: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/15.jpg)
A _____________ is defined as anyone who breaks into a
computer system (whether an individual computer or a
network) unlawfully.
hacker
![Page 16: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/16.jpg)
Whatis the weakest link in a computer security system?
The user
![Page 17: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/17.jpg)
A LAN is most likely to be used for which geographical area?
a.) building. b.) metropolitan area.
c.) town. d.) country.
a. building
![Page 18: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/18.jpg)
___________ topology is the most widely deployed client/server network layout in businesses
today because it offers the most flexibility.
Star
![Page 19: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/19.jpg)
To flow through a network, data is broken into small
segments called
packets
![Page 20: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/20.jpg)
Which of the cable types has the highest run length and
the highest installation cost?
Fiber-optic
![Page 21: Nasca 2007 200 400 600 800 1000 Internet Ch. 5Internet Ch. 8 Networking and Security Ch. 6 Networking and Security Ch. 8.](https://reader035.fdocuments.us/reader035/viewer/2022062407/56649d575503460f94a35fe6/html5/thumbnails/21.jpg)
A firewall ensures that incoming data came from a
valid source by using a technique known as
Packet screening