Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Exam 3 ISYS 209 | Questions with complete solutions

Beoordeling
-
Verkocht
-
Pagina's
14
Cijfer
A
Geüpload op
18-07-2024
Geschreven in
2023/2024

Exam 3 ISYS 209 | Questions with complete solutions According to the information in this video, the telephone system is an example of a _____ network circuit-switched As Zero and One explain in this video, a _____ must be used to convert an analog signal to a digital signal when transmitting data through a typical telephone line. Modem According to the information in this video, computers represent data using _____. Bits In this video, One-Bit describes how voices travel through typical telephone transmission lines. He is describing a(n) _____. analog signal In this video, One-Bit describes _____, the method of slicing digital messages into parcels, transmitting them across communication networks, and reassembling them at their destination. packet switching Which of the following is FALSE about the TCP/IP protocol? IP helps to recover any packets that are lost or damaged during transmission. At its most basic level, a(n) _________ simply consists of two computers that are connected together. Network If you wanted to have wireless connectivity in your home or apartment, you would need a _________________ to move packets of data to your different devices. Router Microsoft Windows Server and Linux are examples of: network operating systems. A ________ is a set of rules that programs on two communicating devices follow. Protocol A(n) __________________ is a way to communicate in a network that is recognized by a continuous waveform: analog signal The signal from your iPod earphone is a(n): analog signal. Network signals that are represented by on-off pulses indicate a(n): digital signal. If you were building a network intended to service two buildings that were next to each other, you would construct a: local area network. A company needing a network to connect its offices in Montana, Idaho, and Utah would require a: wide area network. Bandwidth is determined by: determining the difference between the highest and lowest frequency on a channel. If you are creating a network using twisted-pair (CAT 5) wire, the cable shouldn't exceed: 100 meters. In the Dundee Precious Metals (DPM) case, what technology was added to dramatically increase productivity and improve safety? An underground wireless Wi-Fi network The method of slicing digital messages into parcels, transmitting them along different communication paths, and reassembling them at their destinations is called ________. packet switching The Internet is based on which of the following three key technologies? Client/server computing, packet switching, and TCP/IP and related communications standards for linking networks and computers A company needing reliable network speeds at 1.5 Mbps would probably need to lease a dedicated: T1 line Which is the BEST definition of hertz? The number of cycles per second that can be sent through a medium Which single word below best describes Web 2.0? Dynamic Which of the following is NOT a function of the Internet service provider (ISP)? The ISP provides applications services. Which of the following could represent a current IP address? 207.46.250.119 Education being represented by .edu and business represented by .com are examples of: top level domains Which of the following TCP/IP application-layer protocols is used for email transmission? SMTP What is the name of the organization responsible for assigning public IP addresses? ICANN Which of the following is FALSE about the Domain Name Service (DNS)? The first name in the domain name is the organization name. Which of the following is a wireless protocol designed for transmitting data over short distances, replacing cables? Bluetooth According to the DHS agent portrayed in this video, the Secret Service has responded to network intrusions at businesses throughout the United States that have been impacted by _____ through their point-of-sale systems. Malware In this video, Agent Macey explains how a _____ pretends to be a legitimate company and sends email requesting users to update their confidential information such as passwords or account numbers. Spoofer Based on the information provided in this video, which of the following usually happens in a denial-of-service attack? A hacker floods a Web server with so many requests that it becomes unavailable to its intended users. In this video, Special Agent Macey says the single largest threat to the Internet is _____. denial-of-service attacks According to the information provided in this video, any business that has an online presence is at risk of _____. exposure to hacker activity denial-of-service attack unauthorized data disclosure loss of customer data all of the above ______________________ is a general security term that includes computer viruses, worms, and Trojan horses. Malware Which of the following is an opportunity for threats to gain access to assets? Vulnerability A _______________ is a program that seems like a normal program, but does something completely unexpected. Trojan horse A __________ is a unique type of malware that replicates itself from one computer to another. Worm A ___________ is a type of spyware that records keystrokes to steal sensitive information such as social security numbers. Keylogger Someone hacking into your Facebook account to add terrible photos and messages is taking part in _________________. Cybervandalism Taking over computers and directing those systems to overload a network is defined as a(n) _____________ attack. denial-of-service If you receive an email asking for your social security number in return for a million dollars, this is an example of _______________. Phishing ____________________ is an increasing problem where hackers lock parts of your computer and then demand money to unlock the system. Ransomware Although it may seem innocent enough, ___________ is a serious problem for companies that are involved with pay-per-click advertising. click fraud The ________________ virus, a rather nice sounding virus, was one of the most famous malwares that was detected in 2000. ILOVEYOU _______________ requires that your patient records be protected and saved for six years. HIPAA Which act requires financial institutions to ensure the security and confidentiality of customer data and mandates that data must be stored on a secure medium and protected during storage and transmittal? Gramm-Leach-Bliley Act _____________ provides rules related to the creation of financial statements to help avoid fraud. Sarbanes-Oxley Act Establishing a risk level of malware threats to an organization is an example of _______________. risk assessment Tricking employees to reveal their passwords by pretending to be a legitimate member of a company is referred to as ________. social engineering Electronic evidence on computer storage media that is not visible to the average user is called ________. ambient data Which of the following is a critical security function of senior management in anorganization? Establishing the security policy and managing risk ___________________ is the ability to determine that a person is who he or she claims to be through a variety of means. Authentication Gaining access to a safety deposit box using iris scanning is an example of _____________ authentication. Biometric Which of the following is NOT addressed by a business continuity plan? The technical issues involved in keeping systems up and running Which of the following examine(s) data files and sorts out low-priority online material while assigning higher priority to business-critical files? Deep packet inspection Which of the following is FALSE regarding public-key encryption? On receiving the message, the recipient uses the public key to decrypt it.

Meer zien Lees minder
Instelling
ISYS 209
Vak
ISYS 209









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
ISYS 209
Vak
ISYS 209

Documentinformatie

Geüpload op
18 juli 2024
Aantal pagina's
14
Geschreven in
2023/2024
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

18.49 $
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Bri254 Rasmussen College
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
917
Lid sinds
5 jaar
Aantal volgers
738
Documenten
3505
Laatst verkocht
3 dagen geleden
Best Tutorials, Exam guides, Homework help.

When assignments start weighing you down, take a break. I'm here to create a hassle-free experience by providing up-to-date and recent study materials. Kindly message me if you can't find your tutorial and I will help.

4.0

181 beoordelingen

5
106
4
20
3
25
2
6
1
24

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen