-
True/False:
The public nature of the internet has lessened privacy issues.
False
-
True/False:
Online retailers use cookies to implement "shopping carts."
True
-
What is not a technique you can effectively use to reduce the amount of unauthorized e-mail on your computer?
Reply to SPAM and ask to be removed from the mailing list.
-
______ is the field that pertains to legal evidence found in computers and digital storage media.
Computer Forensics
-
True/False:
A globally unique identifier (GUID) is an identification number that is generated by a hardware componenet or a program.
True
-
True/False:
Companies such a uLocate and BrickHouse can us the GPS in your cell phone to determine your location.
True
-
As of the week ending June 6, 2010 ______ was the top spam relaying country.
India
-
True/False:
Ubiquitous computing is defined as individuals interacting with one computer at a time.
False
-
True/False:
FERPA establishes standards for the transmission of electronic health care information
False
-
This type of software collects your personal info, monitors your web surfing habits, and distributes this info to a third party.
Spyware
-
An individuals ability to restrict or eliminate the collection, use, and sale of confidential personal information is known as _____.
privacy
-
True/False:
A backdoor is a vulnerability that could enable someone to crack an encryption code.
True
-
Complaints of Web crimes rose with an increase of _____ percent between 2008 and 2009.
22.3
-
True/False:
In a DDoS attack, the commandeered computers are called zombies and the individual computers are called botnets.
False
-
True/False:
The FTC and Department of Justice have primary jurisdiction over spammers.
True
-
True/False:
A digital signature guarantees that a message has NOT been tampered with.
True
-
Which of the following is NOT a technology that threatens online anonymity?
Phreaking
-
An emerging trend where individuals interact with multiple networked devices that are often embedded in everyday objects is called ______.
ubiquitous computing
-
True/False:
Spear phishing targets specific people.
True
-
In the European Union, a basic human rights declaration grants citizens all of the following privacy rights Except the right to ___________.
be informed of the sale of personal information from one marketing company to another.
-
Which of the following is the best definition of a cookie?
It is a plain text file written to your hard disk by a Web site you visit.
-
The new emerging legal field that tracks and combats computer-related crimes is called ______.
cyberlaw
-
Which of the following security measures on home and portable devices will deter unauthorized access to a person's account?
All of the above
-
True/False:
Before is is encrypted, a readable message is known as ciphertext.
False
-
True/False:
All new cell phones in the United States must have GPS awareness.
True
-
Which of the following is the path through which messages are sent from one location to another?
???????
-
Wire technologies are __________.
connected by a physical medium
-
Which of the following statements is NOT true about the public witched telephone network (PTSN)?
PTSN is exclusively an analog network.
-
Bluetooth is a _______ radio transmission technology.
Short-range
-
ISDN is an abbreviation for which of the following terms?
Integrated services digital network
-
Which of the following transmission media has the lowest transfer rate?
???????
-
What is the transfer rate of fiber-optic cable?
10 Gbps
-
_______ sends more than one call over a single line.
Multiplexing
-
The word modem is a combination of which of the following words?
Modulate and demodulate
-
Which of the following wireless communication medium transmits data via beams of light sent through the air?
Infrared
-
Which of the following is not true about baud?
is it the rate at which two modems can exchange data.
-
Which of the following types of port is used by an infrared mouse?
IrDA
-
An ADC is simply a _______ that has the circuitry to convert an analog signal into a digital signal.
microchip
-
Bandwidth refers to _________.
the amount of data that can be transmitted through a communications channel
-
True/False:
MMDS is an abbreviation for multichannel multipoint distribution services
True
-
True/False:
IrDA stands for Infrared Data Association.
True
-
True/False:
Twisted pair is used for telephones.
True
-
True/False:
Category 6 twisted pair cable is backward compatible with Cat-5e but not Cat-5.
False
-
True/False:
Fiber-optic cable can carry more data without loss of signal for longer distances than coaxial cable/
True
-
True/False:
Unlike most other forms of DSL, HDSL is not a typical consumer service.
True
-
True/False:
Digitization is the transformation of data into digital format.
True
-
True/False:
VoiP is too complex to be installed and configured by a novice user.
False
-
True/False:
A fax modem and a fax machine are the same thing.
False
-
True/False:
Text messaging is similar to using your phone for instant messaging.
True
-
True/False:
Location awareness technology is available through cell phones.
True
-
Which of the following is not a disadvantage of networks?
Sharing important information
-
A local area network (LAN) in which all the computers are equals is called a _______ network.
peer-to-peer
-
Which of the following protocols use Ethernet?
CSMA/CD
-
Contention sometimes results in _______.
Collisions
-
In a _______ topology, the network nodes are connected to a central hub or switch.
star
-
Which of the following types of networks require an access point?
WiFi
-
A VPN operates as a private network over which larger type of network?
Internet
-
Which of the following is not a network communications device?
LAN
-
Each node on a network has a unique logical address, which is __________.
assigned by the software in use
-
The term network topology refers to the __________.
physical layout of a local area network
-
When a computer is connected to a network, it is called a ________.
node
-
Another term for a network administrator is a network ___________.
engineer
-
Which of the following is not a function of communication devices?
Encryption
-
How do most wireless LANs ensure security with radio transmission?
by using a random series of frequencies
-
A _______ is a simple broadcast device that does not mange traffic ad usually results in frequent collisions.
hub
-
Which of the following is the largest wide area network?
Internet
-
True/False:
External WiFi transceivers connect through USB connections.
True
-
True/False:
Network administrators support computer networks.
True
-
True/False:
A wireless access point is commonly used as a bridge between a wireless and a wired network.
True
-
True/False:
A disadvantage of networking is loss of autonomy.
True
-
True/False:
An advantage of networking is fewer security threats.
False
-
True/False:
VPN is the acronym for Virtual Public Network.
False
-
True/False:
An advantage of networking is centralized data management.
True
-
True/False:
In a P2P network, users can choose which files they wish to share.
True
|
|