Vous êtes sur la page 1sur 27

1.

Embedding different types of data, such as sound and graphics, within Internet
electronic mail requires which of the following formats to be used for encoding the
data?
(a) MIME (b) TCP/IP (c) Encryption (d) GIF
Correct answer is
(a)

2.
If a MIME designation in a file attached to an email has the name "text/html", then
the client's email reader interprets this to mean which of the following?
(a) The file should be saved to the client's disk using the name "text/html". (b)
The file is a text file that should be interpreted by a client application that
understands HTML information. (c) The HTML program file in the text folder should
be used to interpret this file. (d) The file contains text-based information,
requiring the use of a text editor.
Correct answer is
(b)

3.
Which of the following correctly characterizes the part of the email address after
the @ (the "at" sign)?
(a) The computer name of the recipient's computer (b) The IP address of the
recipient's computer (c) The Web server of the recipient (d) The email server name
on which the recipient has an account
Correct answer is
(d)

4.
Web page URLs begin with
(a) url:// (b) page:// (c) www:// (d) http://
Correct answer is
(d)

1.
What networks are useful in environments where wiring is difficult to install?
(a) Wirefree (b) Wireless (c) Coaxial (d) Twisted pair
Correct answer is
(b)

2.
The numbers in IP addresses are separated by
(a) periods (b) commas (c) exclamation points (d) colons
Correct answer is
(a)

3.
What top-level domain belongs to computers in the category of networks and ISPs?
(a) int (b) net (c) adm (d) html
Correct answer is
(b)
4.
What top-level domain belongs to computers in the category of professional and
nonprofit organizations?
(a) org (b) npo (c) com (d) edu
Correct answer is
(a)

5.
An IP address is a set of four numbers between 0 and
(a) 24 (b) 16(c) 255(d) 128
Correct answer is
(c)

6.
What top-level domain belongs to computers in the category of commercial
businesses?
(a) org (b) bus (c) com (d) bsn
Correct answer is
(c)

7.
What knits the Internet together and allows data to travel smoothly over the
communications links provided by NSPs worldwide?
(a) FTP (b) HTTP (c) URL (d) TCP/IP
Correct answer is
(d)

8.
ISPs can be accessed by which of the following ways?
Telephone lines
Cable television systems
Personal satellite dishes
(a) I and II only (b) I, II, and III (c) II only (d) I only
Correct answer is
(b)

1.
The numbers in IP addresses are separated by
(a) commas (b) exclamation points (c) periods (d) colons
Correct answer is
(c)

6.
Networks typically use _____ cable.
(a) wireless (b) NIC (c) coaxial (d) twisted pair
Correct answer is
(d)

7.
An IP address is a set of four numbers between 0 and
(a) 128 (b) 16(c) 255(d) 24
Correct answer is
(c)

1.
Which of the following components are required for an email system?
Email server software
Post office software
Email client software
(a) I and II only (b) I, II, and III (c) II and III only (d) I and III only
Correct answer is
(d)

2.
When you send an email to someone, it is sent to
(a) the recipient's computer (b) the recipient's email server (c) the sender's
email server (d) the sender's email client
Correct answer is
(b)

3.
Which of the following are valid examples of client-server systems on the Internet?
Reading messages on a newsgroup application
Reading and sending email messages through an email application
Receiving Web pages through a browser application
(a) I and III only (b) I, II, and III (c) II and III only (d) I and II only
Correct answer is
(b)

4.
Which of the following is (are) true about thick and thin clients in a client-
server system?
Thin clients perform relatively little work.
A Web browser is an example of a thick client.
A handheld computer is a typical example of a thin client.
(a) I and III only (b) I, II, and III (c) III only (d) I only
Correct answer is
(a)

4.
Which of the following is (are) true about a server in a client-server system?
The server accepts requests from clients, performs some function, and returns the
results.
A Web server is needed to host a website.
Servers do not normally run user programs, so they are more likely to be reliable
and stable.
(a) I and II only (b) III only (c) I and III only (d) I only
Correct answer is
(a)

1.
A browser that receives and processes a Java applet is an example of a
(a) thick client (b) forwarding client (c) thin client (d) store-and-forward
technology
Correct answer is
(a)

1.
What type of cable is typically used to carry cable television signals because its
high capacity allows it to carry signals for more than 100 television channels
simultaneously?
(a) STP (b) UTP (c) BNC (d) Coaxial
Correct answer is
(d)

2.
Effective communication depends on the efficiency of the coding process and the
channel's resistance to electrical interference called
(a) parity (b) noise (c) waveforms (d) receiver flow
Correct answer is
(b)

3.
Which of the following connections uses shared bandwidth, resulting in reduced
speeds when a large number of users are online?
(a) Cable modems (b) ISDN (c) T1 (d) Telephone modem
Correct answer is
(a)

4.
Which of the following terms represents the transmission capacity of a
communications channel?
(a) Resolution (b) Indexing (c) Frequency (d) Bandwidth
Correct answer is
(d)

5.
What kind of waves provides wireless transmission for mobile communications, such
as cellular telephones, and for stationary communications where it is difficult or
impossible to install cabling, such as in remote, geographically rugged regions?
(a) Radio (b) Line-of-sight (c) UTP (d) Infrared
Correct answer is
(a)

6.
What signals typically represent an unlimited range of values and have a smooth
curved waveform?
(a) Hertz (b) Wavelength (c) Digital (d) Analog
Correct answer is
(d)

7.
When two devices communicate, they must agree on protocols for
starting and ending a transmission
recognizing transmission errors
determining the rate of data transmission
(a) II and III only (b) I and II only (c) I and III only (d) I, II, and III
Correct answer is
(d)

8.
Which of the following is a service that transports data digitally over dial-up or
dedicated telephone lines.
(a) Demodulation (b) Voiceband (c) ISDN (d) POTS
Correct answer is
(c)

9.
Which of the following are commonly used network topologies?
Star
Ring
Modems
(a) II and III only (b) I and III only (c) I and II only (d) III only

Correct answer is
(c)

10.
The bandwidth of a(n) _____ signal is usually measured in bits per second.
(a) video (b) satellite (c) digital (d) analog
Correct answer is
(c)

1.
A communications _____ is a physical path or frequency for a signal transmission.
(a) protocol (b) bridge (c) channel (d) band
Correct answer is
(c)

5.
For situations where extremely high bandwidth is required, _____ cable is the best
solution.
(a) STP twisted-pair (b) fiber-optic (c) UTP twisted-pair (d) coaxial
Correct answer is
(b)

7.
Modems transfer data between computers by converting between
(a) analog and digital (b) Ethernet and digital (c) analog and Ethernet (d) video
and sound
Correct answer is
(a)

8.
Computer modems typically use a(n) _____ protocol, in which the transmitting modem
sends a start bit to indicate the beginning of a block of data.
(a) synchronous (b) asynchronous (c) block (d) analog
Correct answer is
(b)
1.
Using a(n) _____ protocol, the sender and the receiver are synchronized by a signal
called a clock.
(a) block (b) analog (c) synchronous (d) asynchronous
Correct answer is
(c)

9.
Which of the following types of network connection services use strictly digital
transfers of data?
ISDN
T1
Cable modem
(a) I and III only (b) II and III only (c) I and II only (d) I, II, and III
Correct answer is
(d)

1.
What is a backbone provider (also known as a Network Service Provider)?
(a) A provider of national and international network links for the Internet (b) The
largest provider of Internet access within a particular region (c) Any company that
provides Web-based services (d) A group of small providers that work together to
provide Internet access
Correct answer is
(a)

2.
Which of the following is (are) true about the names of Internet resources?
A domain name must be registered at InterNIC along with its IP address.
Every specific computer's name that can be accessed via the Internet is registered
at InterNIC.
Computers can be referred to by their fully-qualified domain name only and not by
their IP address.
(a) III only (b) II and III only (c) I only (d) I and II only
Correct answer is
(c)

3.
Which of the following are protocols used on the Internet?
http
https
ftp
(a) I, II, and III (b) I and III only (c) I and II only (d) II and III only
Correct answer is
(a)

4.
What is the protocol used to transfer Web pages?
(a) udp (b) ftp (c) http (d) html
Correct answer is
(c)
5.
With respect to the Internet, companies need to register a unique domain name when
(a) buying a new modem (b) establishing an electronic commerce Web site (c) buying
a new computer (d) connecting a new computer to the Internet
Correct answer is
(b)

6.
With respect to the Internet, routers are used to connect
(a) any two computers (b) different networks of computers (c) a computer and a
modem (d) a computer to the Internet
Correct answer is
(b)

7.
Which of the following are tasks performed by a Web browser?
Sending a request for a specific file to a server
Formatting and displaying a file received from a server
Sending additional requests to the server to retrieve any graphics elements such as
icons or images for a requested file
(a) I and III only (b) I and II only (c) I, II, and III (d) II and III only
Correct answer is
(c)

8.
If a URL begins with the protocol HTTPS, then
synchronous transmission will be used
information transmitted, such as credit card numbers, will be encrypted
a secure version of HTTP is being used
(a) I and III only (b) II and III only (c) I, II, and III (d) I and II only
Correct answer is
(b)

9.
Which of the following are protocols associated with Internet email?
SMTP
POP
FTP
(a) I and II only (b) I and III only (c) I, II, and III (d) II and III only
Correct answer is
(a)

10.
What is the name of the Internet protocol used to make sure messages are reliably
transmitted and received by the destination computer?
(a) IP (b) ISP (c) POP (d) TCP
Correct answer is
(d)

11.
When messages are sent between computers on the Internet, the term "hop count"
indicates which of the following?
(a) The number of computers that can see the message on the Internet (b) The number
of times to resend the data whenever communication problems are encountered (c) The
difference between the IP addresses of the sending and receiving computers (d) The
number of routers involved in relaying the message to the destination computer
Correct answer is
(d)

12.
The Internet address www.newbie.net is composed of three words separated by
periods. The last word, net, is the
(a) name of the company to which the Web server belongs (b) top-level domain name
(c) domain name to which the computer belongs (d) name of the computer within the
company's network of computers
Correct answer is
(b)

1.
The World Wide Web is
(a) a client/server application program used to access the Internet (b) the same as
the Internet (c) a collection of Web servers throughout the world (d) a software
package
Correct answer is
(c)

8.
Which of the following symbols is used to separate directory paths in a URL?
(a) : (b)// (c). (d)/
Correct answer is
(d)

11.
Which of the following services may be provided by an ISP?
A temporary IP address
An account on the ISP's email server
Web hosting of the customer's Web page
(a) II and III only (b) I, II, and III (c) I and III only (d) I and II only
Correct answer is
(b)

12.
IP host addresses on the Internet are composed of which of the following?
(a) A 24-bit number (b) Any number of lowercase alphanumeric characters (c) Four
decimal numbers ranging from 0 to 255 (d) A single decimal number ranging from 0 to
255
Correct answer is
(c)

1.
After loading a word processor document from a floppy, a user's computer begins to
show symptoms of being infected by a virus. Which of the following is true
concerning this situation?
(a) The document could have contained a macro that contained a virus. (b) The
document text could have contained an embedded virus. (c) A document cannot contain
a virus, so the source of the virus was not the word processing document. (d) The
word processing program checks all documents for viruses before using them, so the
source of the virus was not the document.
Correct answer is
(a)

2.
Computers can be attacked by programs that exhaust which of the following
resources?
CPU cycles
Memory
Disk space
(a) I and III only (b) I and II only (c) I, II, and III (d) II and III only
Correct answer is
(c)

3.
Which of the following is (are) true regarding distributed denial of service
attacks?
The source of the attack can be easily traced.
These complex attacks are theoretical and have not yet occurred.
(a) II only (b) None (c) I only (d) I and II
Correct answer is
(b)

4.
A computer attack that exploits the way that a network connection remains open
waiting for a response is known as a _____ attack.
(a) spam (b) Smurf (c) mail bomb (d) SYN flood
Correct answer is
(d)

5.
Which of the following are common behaviors of computer viruses?
Self-replication
Infliction of physical damage to the computer's hardware
Unwarranted file removal
(a) I, II, and III (b) I and III only (c) I and II only (d) II and III only
Correct answer is
(b)

6.
The method of cracking a password by trying all possible alphanumeric combinations
is known as a _____ attack

(a) dictionary (b) brute force (c) man-in-the-middle (d) port scanning
Correct answer is
(b)

7.
Which of the following can be used to prevent social engineering attacks?
Verifying identities of people requesting sensitive information
Using data encryption
Being aware of computer fraud schemes
(a) II and III only (b) I and III only (c) I, II, and III (d) III only
Correct answer is
(b)

8.
Which of the following consequences of executing a virus on a PC is (are) possible?
Files appear to be missing or deleted from the hard disk.
Either the PC system board or a disk drive is physically damaged.
There is low computer memory on disks.
(a) I, II, and III (b) II and III only (c) I only (d) I and III only
Correct answer is
(d)

9.
Which of the following is (are) true regarding network connectivity attacks?
A network connectivity attack can be achieved by generating numerous half-open
connections to the target computer.
A network connectivity attack can be achieved by generating excessive amount of
traffic on the target network.
(a) I only (b) II only (c) I and II (d) None
Correct answer is
(c)

10.
Which of the following can help prevent denial of service attacks?
Defragment hard drives frequently.
Disable or block any unused network services.
(a) II only (b) None (c) I and II (d) I only
Correct answer is
(a)

11.
Which of the following is (are) true regarding a Smurf attack?
It can use the ping command to perform the attack.
It allows a hacker to steal data from a computer.
It uses other computers on a network to attack a single computer.
(a) I, II, and III (b) II and III only (c) I and III only (d) I and II only
Correct answer is
(c)

12.
Which of the following can help to prevent port-scanning attacks?
Destroy or lock up sensitive information
Close unused ports
Monitor network usage and investigate suspicious activities
(a) II and III only (b) I and III only (c) I, II, and III (d) I and II only
Correct answer is
(a)

13.
Which of the following is email spoofing?
(a) Modifying an email header to fake the email source (b) Sending viruses through
email (c) Intercepting email by monitoring a network (d) Sending large amounts of
unsolicited email
Correct answer is
(a)

14.
Probing a computer system for vulnerabilities, such as systems that allow anonymous
TELNET logins, is
(a) packet sniffing (b) social engineering (c) port scanning (d) spoofing
Correct answer is
(c)

15.
Which of the following is not true of malicious software?
(a) A Trojan horse is an entire program that a user might knowingly execute but
without realizing that it will operate in a malicious manner. (b) A boot virus is
located on the area of a disk loaded by the BIOS during the boot process and is
immediately activated every time the computer is reset or powered on. (c) A worm is
a program that replicates itself on other systems and impacts computer operations
by tying up critical resources such as memory or files. (d) A program virus is
embedded within a program file and is initially activated whenever the program file
is copied to the disk drive.
Correct answer is
(d)

16.
Attacking a computer by sending it an excessive number of email messages is known
as
(a) pinging (b) spamming (c) spoofing (d) Smurfing
Correct answer is
(b)

17.
What does a packet sniffer do?
(a) Captures data packets that are transmitted through a network (b) Causes one
computer to impersonate another (c) Converts encrypted passwords to plain text (d)
Renders a computer network unusable
Correct answer is
(a)

18.
Which of the following is (are) true regarding computer security attacks?
Home computers are rarely a target for hackers.
It is virtually impossible to eavesdrop on a typical computer network.
(a) I and II (b) I only (c) II only (d) None
Correct answer is
(d)

19.
Which of the following is (are) true regarding computer security attacks?
Hackers can cause home computers to attack other computers.
Organizations typically experience more computer security breaches from internal
personnel than from people external to the organization.
(a) I and II (b) I only (c) None (d) II only
Correct answer is
(a)

20.
Which of the following is (are) true regarding network bandwidth attacks?
They can be used to launch a denial of service attack.
They can cause a Web site to become unavailable.
They work by flooding a network with traffic.
(a) II and III only (b) I and II only (c) I and III only (d) I, II, and III
Correct answer is
(d)

3.
Which of the following can help prevent passwords from being cracked?
Limiting physical access to computer servers
Using obscure words from the dictionary as passwords
(a) I and II (b) II only (c) None (d) I only
Correct answer is
(d)

6.
After gaining access to a computer system, hackers will typically do which of the
following?
Set up control for further attacks
Take, alter, or delete data
Use the computer system resources
(a) I, II, and III (b) II and III only (c) I and II only (d) II only
Correct answer is
(a)

11.
Which of the following conditions on a user's computer might indicate the presence
of a computer virus?
Certain files of the user are no longer present on the disk.
The system no longer boots.
Annoying messages appear on the display, and then disappear.
(a) I, II, and III (b) I and II only (c) I and III only (d) II and III only
Correct answer is
(a)

16.
Which of the following computer attack methods does not require a hardware or
software tool?
(a) Spoofing (b) Social engineering (c) Port scanning (d) Packet sniffing
Correct answer is
(b)

17.
Which of the following computer attacks is spoofing?
(a) Using one computer to impersonate another (b) Using a program to decrypt
passwords (c) Accessing an unprotected port on a computer (d) Monitoring a network
to intercept data
Correct answer is
(a)

18.
A computer attack that uses handler computers to control agent computers to attack
a target computer is known as a _____ attack.
(a) network connectivity (b) Smurf (c) SYN flood (d) distributed denial of service
Correct answer is
(d)

19.
Which of the following can be used to prevent packet sniffing attacks?
Data encryption
Well-chosen passwords
Limiting physical access to network connections
(a) I and III only (b) I, II, and III (c) I and II only (d) II and III only
Correct answer is
(a)

Which of the following are potential communications links?

Telephone wiring

Fiber-optic cable

Satellite

Correct (b) I, II, and III

Which of the following reasons is (are) valid for why "iCarnegie" is a bad
password?

It is a word from the dictionary.

It does not contain numbers and symbols.

It is the name of an institution.

Correct (d) II and III

Which of the following comparisons between public-key encryption schemes and


private-key encryption schemes is true?

Correct (c) Public-key encryption schemes involve more computations than


private-key encryption schemes.

With respect to public key encryption, which of the following is true of a server's
public key when transferring data across the Internet to a client computer?

Correct (a) It is used by client computers when transferring encrypted data


from that particular server.

Which of the following is (are) true regarding computer network intrusion detection
systems?

They compare traffic against a database of known attack signatures.

They can generate false alarms.

Correct (c) I and II

Compared to digital signals, analog transmissions

Correct (d) use a continuous range of values

What is the host name of the specific computer whose domain name is
www.icarnegie.com?

Correct (a) www

A conventional phone line is capable of transmitting which of the following?

Correct (c)Data in analog form

When connecting to an ISP using a standard phone line, which of the following is
(are) required?

A phone number to access the ISP's Internet server computer

Account name and password

An internal or external modem

Correct (b) I, II, and III

22.
Which of the following methods provides the fastest Internet bandwidth between a
home computer and an ISP?
(a) Analog modem using the telephone connection (b) ISDN connection (c) Cable modem
(d) Network LAN card
Correct answer is
(c)

Which of the following causes are possibly responsible for a failure to restore all
of the files on a failed disk from a backup tape?

The backup tape only contains files from the last incremental backup.
Data was compressed when it was being backed up.

The backup tape has become corrupted or unreadable.

Correct (a) I and III only

One of the most common applications of encryption is transmitting data securely


over the Web via

Correct (b) the Secure Socket Layer (SSL)

Which of the following provides a description of Web browsers?

Correct (d) A Web browser is a software program that runs on a computer and
helps access Web pages.

13.
A certificate authority associates a specific _____ with the entity requesting the
certificate.
(a) public key (b) digital signature (c) private key (d) password
Correct answer is
(a)

15.
Which of the following is true about private-key encryption schemes?
(a) The sender and the receiver use the same private key. (b) The sender and the
receiver have different private keys. (c) The sender and the receiver have two
private keys, one for encryption and one for decryption. (d) The sender must notify
the receiver before sending a message.
Correct answer is
(a)

16.
Which of the following is (are) true of computer network intrusion detection
systems?
They typically block malicious traffic.
They are not needed if a firewall is in place.
(a) I and II (b) II only (c) None (d) I only
Correct answer is
(c)

17.
To increase the likelihood of a successful restore operation from a previous backup
operation, the backup file should be stored on which of the following?
(a) The actual disk drive being backed up (b) A disk drive located on a file server
(c) Another disk drive installed inside that computer (d) The computer's least used
disk drive
Correct answer is
(b)
18.
Which of the following are used to connect to an ISP from home using the telephone
lines?
A network LAN card
A modem
Communications software

(a) I, II, and III (b) II and III only (c) I and II only (d) I and III only
Correct answer is
(b)

24.
The FTP protocol
(a) is only used on intranet servers (b) ensures encryption of files being
transferred (c) is a much newer technology than HTTP (d) allows communication with
computers that are not running a Web server
Correct answer is
(d)

1.With respect to security on the Internet, what is the purpose of digital


signatures?

(a) To request receipts for all sent messages

(b) To post anonymous messages to bulletin boards

(c) To encrypt mail messages

(d) To verify the identity of a message sender

Correct answer is (d)

________________________________________

2.Which of the following is correct with respect to customers providing highly


personal information across the Internet through electronic commerce transactions?

(a) If a transaction is encrypted, any unauthorized parties intercepting the


transaction will take ten or more years to decrypt the information.

(b) Transactions are relatively secure between the consumer and a company's Web
site if the data is encrypted.

(c) It is impossible for anybody to see the transaction on the Internet except for
the intended Web site conducting the transaction.

(d) Customers should never provide charge card information when asked to complete
an electronic commerce transaction.

Correct answer is (b)

________________________________________

3.A certificate authority associates a specific _____ with the entity requesting
the certificate.

(a) digital signature

(b) password

(c) private key

(d) public key

Correct answer is (d)

________________________________________

4.Encryption is used to

(a) archive system files

(b) save storage space

(c) protect privacy by encoding data

(d) store data files in a vault

Correct answer is (c)

________________________________________

5.Which encryption method uses a pair of digital keys?

(a) SSL

(b) Public key encryption

(c) Active-X

(d) S-HTTP

Correct answer is (b)

___________________________________________

6.How does a receiver of an encrypted message verify that the message originated
from the sender?

(a) The receiver compares the message with the decrypted signature of the sender.

(b) The receiver compares the message hashed with the sender's signature.

(c) The receiver compares the received message with the sender's signature.

(d) The receiver compares the message hashed with the decrypted signature of the
sender.

Correct answer is (d)

_______________________________________

7.With respect to public key encryption, which of the following is true of a


server's private key when transferring data across the Internet from a client
computer?

(a) It is used by all clients when transferring encrypted data to that server.

(b) It is not a very secure method of encryption, because every computer is aware
of the recipient's private key.

(c) The sender and receiver both use the private key to encrypt and decrypt a data
message sent between them.

(d) It is used only by the server to decrypt information received from a client.

You did not answer this question.

Correct answer is (d)

________________________________________

8.With respect to public key encryption, which of the following is true of a


server's public key when transferring data across the Internet to a client
computer?

(a) It is used by client computers when transferring encrypted data from that
particular server.

(b) It is used by the server to decrypt information sent by a client.

(c) All clients and servers use the same public key when transferring encrypted
data on the Internet.

(d) It is not a very secure method of encryption, because every computer is aware
of a recipient's public key value and can decrypt the data.

Correct answer is (a)

________________________________________

9.Which of the following must be included on a digital certificate?

I. The name of the entity and the expiration date

II. The number of times the certificate has been viewed

The digital signature of the certificate authority

(a) II and III only

(b) I, II, and III

(c) I and II only

(d) I, and III

Correct answer is (d)

________________________________________

10.How does the secure socket layer (SSL) verify the identity of the Web server
requesting confidential data?

(a) It uses the server's private key.

(b) It uses the server's public key.

(c) It uses the server's password.

(d) It uses the server's digital signature.

Correct answer is (b)

________________________________________

11.Which of the following statements is (are) true about smart cards?

I. They are vulnerable to Internet attacks.

II. They can encrypt data.

(a) I and II

(b) I only

(c) II only

(d) None

Correct answer is (c)

________________________________________

12. Which of the following is (are) true about encryption of data?

I. Given the high speed and low cost CPUs available, even the most complex
encrypted data is not entirely safe for a long period of time.

II. The more bits in the key of the encryption algorithm, the harder it is to
break the encryption.

In public key encryption, the sender and the receiver of encrypted data both use
the same key value to encrypt and decrypt the data.

(a) I, II, and III

(b) I and III only

(c) II and III only

(d) I and II only

Correct answer is (d)

_______________________________________________

13.Which of the following comparisons between public-key encryption schemes and


private-key encryption schemes is true?

(a) Private-key encryption schemes are more secure than public-key encryption
schemes.

(b) Public-key encryption schemes involve more computations than private-key


encryption schemes.

(c) It is easier to decrypt data using private-key encryption schemes than public-
key encryption schemes.

(d) It takes longer to transmit encrypted data using private-key encryption schemes
than public-key encryption schemes.

Correct answer is (b)

____________________________________________________

14.To encrypt a message using public-key encryption scheme, which of the following
must be done?

(a) Encrypt the message using the sender's private key.

(b) Encrypt the message using the receiver's public key.

(c) Encrypt the message using the sender's public key.

(d) Encrypt the message using the receiver's private key.

Correct answer is (b)

_______________________________________________________

15.One of the most common applications of encryption is transmitting data securely


over the Web via

(a) a Trojan horse

(b) the Secure Socket Layer (SSL)

(c) e-mail

(d) a simple substitution code

Correct answer is (b)

_________________________________________________

16.Of the following processes, which best characterizes the authentication process?

(a) Verifying that software that is in use is not a pirated copy

(b) Establishing a user identity

(c) Authorizing use of some resource by a particular user

(d) Logging into a secure site

Correct answer is (b)

______________________________________________________
17.Which of the following reasons is (are) valid for why "iCarnegie" is a bad
password?

I. It is a word from the dictionary.

II. It does not contain numbers and symbols.

It is the name of an institution.

(a) I and III only

(b) II and III

(c) I and II only

(d) I, II, and III

Correct answer is (b)

_____________________________________________________

18.Which of the following is true about private-key encryption schemes?

(a) The sender and the receiver have different private keys.

(b) The sender and the receiver use the same private key.

(c) The sender must notify the receiver before sending a message.

(d) The sender and the receiver have two private keys, one for encryption and one
for decryption.

Correct answer is (b)

_____________________________________________________

19.Of the following processes, which best characterizes the authentication process?

(a) Establishing a user identity

(b) Logging into a secure site

(c) Authorizing use of some resource by a particular user

(d) Verifying that software that is in use is not a pirated copy

Correct answer is (a)

________________________________________________________

1.A differential backup is a copy of the files that have changed since the

(a) last differential backup

(b) first full backup

(c) last incremental backup

(d) last full backup


Correct answer is (d)

________________________________________

2.Of the following strategies, which is best for minimizing the time and storage
required to perform a backup, while ensuring that the latest versions of files are
successfully backed up?

(a) Performing full backups on a daily basis

(b) Performing full backups on a weekly basis

(c) Performing incremental backups on a weekly basis, and full backups daily

(d) Performing full backups on a weekly basis, and incremental backups daily

Correct answer is (d)

________________________________________

3.Which of the following is (are) true regarding network monitoring tools?

I. They should only be installed in a single location on a network.

II. Monitoring only needs to be done when a problem is suspected.

(a) II only

(b) I and II

(c) None

(d) I only

Correct answer is (c)

________________________________________

4.Which of the following is (are) true regarding computer security?

I. Applying all available security measures may negatively impact system


usability.

II. Most intrusions result from exploitation of known vulnerabilities that remain
unpatched.

(a) I only

(b) I and II

(c) II only

(d) None

Correct answer is (b)

________________________________________
5.To increase the likelihood of a successful restore operation from a previous
backup operation, the backup file should be stored on which of the following?

(a) A disk drive located on a file server

(b) The actual disk drive being backed up

(c) Another disk drive installed inside that computer

(d) The computer's least used disk drive

Correct answer is (a)

________________________________________

6.Good computer security practices include which of the following?

I. Never shop online.

II. Remove excess RAM from computers.

Avoid sending email at night.

(a) II and III only

(b) None

(c) I and II only

(d) I, II, and III

Correct answer is (b)

________________________________________

7.Anti-virus software with updated virus definitions typically protects against


which of the following?

I. Worms

II. Trojan horse programs

(a) II only

(b) I only

(c) None

(d) I and II

Correct answer is (d)

________________________________________

8.A full backup was performed on Monday and incremental backups were performed on
each of the next two days.

What is the correct search order for finding the most recent version of a backed-up
file?
(a) The last incremental backup, the first incremental backup, the full backup

(b) The full backup, the first incremental backup, the last incremental backup

(c) The first incremental backup, the last incremental backup, the full backup

(d) The full backup, the last incremental backup, the first incremental backup

Correct answer is (a)

_____________________________________________________

9.Which of the following is (are) true of anti-virus software?

I. Typically, it scans both files and memory.

II. It is ineffective unless it is updated frequently.

It protects against network bandwidth attacks.

(a) I and III only

(b) I and II only

(c) II only

(d) I, II, and III

Correct answer is (b)

________________________________________

10.Which of the following is (are) true regarding computer network intrusion


detection systems?

I. They compare traffic against a database of known attack signatures.

II. They can generate false alarms.

(a) II only

(b) None

(c) I and II

(d) I only

Correct answer is (c)

________________________________________________________________

11.Which of the following is (are) important to ensuring computer security?

I. Keep applications and operating system updated with the latest security
patches.

II. Replace motherboard batteries regularly.


Use firewalls

(a) III only

(b) I, II, and III

(c) I and III only

(d) II and III only

Correct answer is (c)

______________________________________________________

12.The security of data can be violated through which of the following?

I. Malicious acts

II. User errors

Disasters

(a) I, II, and III

(b) II and III only

(c) I only

(d) I and III only

Correct answer is (a)

______________________________________________

13.Which of the following is (are) true of computer network intrusion detection


systems?

I. They typically block malicious traffic.

II. They are not needed if a firewall is in place.

I only

(b) I and II

(c) None

(d) II only

Correct answer is (c)

____________________________________________________

14.Examples of network monitoring tools include which of the following?

I. Packet sniffers

II. Antivirus software


Security patches

(a) I and III only

(b) II only

(c) I, II, and III

(d) I only

Correct answer is (d)

______________________________________________________

15.Which of the following recommendations should be followed when designing a


backup plan?

I. Scan for viruses before you backup.

II. Before you depend on your backups, make sure that you can restore data from
your backup to your hard disk.

III. Keep your backup media close to your computer so that you can access it
quickly.

(a) I and II only

(b) II only

(c) I and III only

(d) I, II, and III

Correct answer is (a)

________________________________________

16.A full backup was performed on Monday and incremental backups were performed on
each of the next two days.

What is the correct search order for finding the most recent version of a backed-up
file?

(a) The full backup, the last incremental backup, the first incremental backup

(b) The last incremental backup, the first incremental backup, the full backup

(c) The full backup, the first incremental backup, the last incremental backup

(d) The first incremental backup, the last incremental backup, the full backup

Correct answer is (b)

_______________________________________________

17.A differential backup is a copy of the files that have changed since the

(a) last full backup


(b) last incremental backup

(c) first full backup

(d) last differential backup

Correct answer is (a)

Vous aimerez peut-être aussi