Question: The novelty of packet switching is that:

It allows all users to be connected to all other users simultaneously.
It allowed instantaneous long-distance communications for the first time.
None of the above.
It enabled long-distance voice communication for the first time.

Answer: It allowed instantaneous long-distance communications for the first time.

 

Question: One feature common to most computer software and data communications is:

The use of layering to organize functionality.
The use of routing.
The use of packetization.
The use of signaling.

Answer: The use of layering to organize functionality.

 

Question: The novelty of multiplexing is that:

None of the above
It allows instantaneous long distance communications.

Answer: It allows instantaneous long distance communications.

 

Question: A benefit of using firewalls is that

Answer Options:
It can block traffic from any identified host or network
It can defend the organization even if an internal computer is compromised
It can protect servers accessible from the Internet (e.g., web and email servers)
Its effectiveness depends upon the abilities of the administrator

Answer: It can protect servers accessible from the Internet (e.g., web and email servers)

 

Question: The power of the federal government to regulate copyrights is by virtue of which of the following?

Common law.
Executive order.
Congressional mandate.
The U.S. Constitution.

Answer: The U.S. Constitution.

 

Question: Businesses generate more network data than consumers.

True
False

Answer: True

 

Question: The novelty of the Telegraph was that:

It allowed one wire to connect a set to multiple destinations.
It allowed people to talk to each other.
It allowed instantaneous long-distance communication over a wire.
It allowed users to draw graphs.

Answer: It allowed instantaneous long-distance communication over a wire.

 

Question: The Data Link layer in the TCP/IP stack is responsible for:

Identifying and locating the destination.
Signaling.
Error control.
Segmentation and reassembly of packets.

Answer: Error control.

 

Question: Authorization is

Answer Options:
Hiding information
Updating software to fix known software bugs
Providing an alternate identity
Granting certain specific privileges over information to a user

Answer: Granting certain specific privileges over information to a user

 

Question: The purpose of a trademark such as Starbucks’s is to do which of the following?

Patent the Starbucks method of making coffee.
Create a copyright.
Identify the Starbucks brand of coffee to the public.
Create a franchise.

Answer: Identify the Starbucks brand of coffee to the public.

 

Question: The novelty of switching is that:

It allows one wire to connect a user to multiple destinations.
It breaks data down into small units of information.
It allows instantaneous long-distance communications.
It allows one wire to carry multiple signals simultaneously.

Answer: It allows one wire to connect a user to multiple destinations.

 

Question: In the context of network security, the de-militarized zone

Answer Options:
None of the above
Contains the organization’s sensitive data
Contains the organization’s external services such as web and email servers
Is most useful in military networks

Answer: Contains the organization’s external services such as web and email servers

 

Question: The Physical layer in the TCP/IP stack is responsible for:

Error control.
Signaling.
Identifying and locating the destination.
Segmentation and reassembly of packets.

Answer: Signaling.

 

Question: A denial-of-service attack

Answer Options:
Compromises the integrity of information
Prevents a host from performing its legitimate functions
Blocks traffic from any identified host or network
Typically only affects military computers

Answer: Prevents a host from performing its legitimate functions

 

Question: Packetization is the process of:

Communicating between computer applications.
Sending letters to friends.
Breaking down user data into small segments.
Sending user data over networks.

Answer: Breaking down user data into small segments.