1.
If a MIME designation in a file attached to an email has the name "text/html", then the client's email reader interprets this to mean which of the following?
(a) The HTML program file in the text folder should be used to interpret this file.
(b) The file should be saved to the client's disk using the name "text/html".
(c) The file is a text file that should be interpreted by a client application that understands HTML information.
(d) The file contains text-based information, requiring the use of a text editor.
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 5.1.1 of the course notes.
(a)
--------------------------------------------------------------------------------
2.
Networks typically use _____ cable.
(a) twisted pair
(b) wireless
(c) coaxial
(d) NIC
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See page 255 in the textbook.
(b)
--------------------------------------------------------------------------------
3.
What top-level domain belongs to computers in the category of commercial businesses?
(a) bus
(b) org
(c) com
(d) bsn
Correct answer is (c)
Your score on this question is: 4.00
Feedback:
See page 236 in the textbook.
(c)
--------------------------------------------------------------------------------
4.
Which of the following are valid examples of client-server systems on the Internet?
Reading messages on a newsgroup application
Reading and sending email messages through an email application
Receiving Web pages through a browser application
(a) I, II, and III
(b) I and III only
(c) I and II only
(d) II and III only
Correct answer is (a)
Your score on this question is: 4.00
Feedback:
See section 5.3.1 of the course notes.
(a)
--------------------------------------------------------------------------------
5.
For situations where extremely high bandwidth is required, _____ cable is the best solution.
(a) fiber-optic
(b) coaxial
(c) STP twisted-pair
(d) UTP twisted-pair
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See pages 221 in the textbook.
(c)
--------------------------------------------------------------------------------
6.
Which of the following are potential communications links?
Telephone wiring
Fiber-optic cable
Satellite
(a) I, II, and III
(b) III only
(c) I and II only
(d) II only
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See page 221 in the textbook.
(b)
--------------------------------------------------------------------------------
7.
Which of the following terms represents the transmission capacity of a communications channel?
(a) Bandwidth
(b) Resolution
(c) Frequency
(d) Indexing
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See page 222 in the textbook.
(c)
--------------------------------------------------------------------------------
8.
What is the protocol used to transfer Web pages?
(a) udp
(b) ftp
(c) http
(d) html
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 5.5 of the course notes.
(b)
--------------------------------------------------------------------------------
9.
With respect to the Internet, companies need to register a unique domain name when
(a) connecting a new computer to the Internet
(b) establishing an electronic commerce Web site
(c) buying a new computer
(d) buying a new modem
Correct answer is (b)
Your score on this question is: 0.00
Feedback:
See section 5.5 of the course notes.
(d)
--------------------------------------------------------------------------------
10.
IP host addresses on the Internet are composed of which of the following?
(a) A single decimal number ranging from 0 to 255
(b) A 24-bit number
(c) Any number of lowercase alphanumeric characters
(d) Four decimal numbers ranging from 0 to 255
Correct answer is (d)
Your score on this question is: 0.00
Feedback:
See section 5.5.1 of the course notes.
(b)
--------------------------------------------------------------------------------
11.
Which of the following computer attack methods does not require a hardware or software tool?
(a) Social engineering
(b) Packet sniffing
(c) Spoofing
(d) Port scanning
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See section 6.1.2, subsection "Social Engineering/Fraud," in the course notes.
(c)
--------------------------------------------------------------------------------
12.
Which of the following conditions on a user's computer might indicate the presence of a computer virus?
Certain files of the user are no longer present on the disk.
The system no longer boots.
Annoying messages appear on the display, and then disappear.
(a) I and III only
(b) II and III only
(c) I, II, and III
(d) I and II only
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 6.1.3 of the course notes.
(a)
--------------------------------------------------------------------------------
13.
Which of the following is true about private-key encryption schemes?
(a) The sender and the receiver use the same private key.
(b) The sender must notify the receiver before sending a message.
(c) The sender and the receiver have different private keys.
(d) The sender and the receiver have two private keys, one for encryption and one for decryption.
Correct answer is (a)
Your score on this question is: 0.00
Feedback:
See section 6.2.1, subsection "Private Key Encryption Scheme," in the course notes.
(d)
--------------------------------------------------------------------------------
14.
With respect to security on the Internet, what is the purpose of digital signatures?
(a) To encrypt mail messages
(b) To request receipts for all sent messages
(c) To verify the identity of a message sender
(d) To post anonymous messages to bulletin boards
Correct answer is (c)
Your score on this question is: 0.00
Feedback:
See section 6.2.3 of the course notes.
(a)
--------------------------------------------------------------------------------
15.
How does the secure socket layer (SSL) verify the identity of the Web server requesting confidential data?
(a) It uses the server's private key.
(b) It uses the server's password.
(c) It uses the server's public key.
(d) It uses the server's digital signature.
Correct answer is (c)
Your score on this question is: 4.00
Feedback:
See section 6.2.3, subsection "SSL Protocol," in the course notes.
(c)
--------------------------------------------------------------------------------
16.
Which of the following recommendations should be followed when designing a backup plan?
Scan for viruses before you backup.
Before you depend on your backups, make sure that you can restore data from your backup to your hard disk.
Keep your backup media close to your computer so that you can access it quickly.
(a) I and III only
(b) I, II, and III
(c) II only
(d) I and II only
Correct answer is (d)
Your score on this question is: 0.00
Feedback:
See page 196 in the textbook.
(b)
---------------------------------------------------------------