1nbspstandard voice telephone lines such as those found in


1. Standard voice telephone lines, such as those found in residences, limit bandwidth to:

A. 300 Hz B. 3,400 Hz
C. 8,000 Hz D. 20,000 Hz

2. When using data communications with 8-bit codes, the number of alphabetic symbols

A. must be greater than 256 B. must be 256 or greater than 256

C. must be fewer than 256 D. must be 256 or fewer than 256

3. A(n) __________ looks for user behavior that differs from that expected from a legitimate user.

A. ACK B. IDS

C. SSL D. TLS

4. Historically, the most commonly used text code is the _________, in which each character I this code is represented by a unique 7-bit pattern.

A. UTF-8 B. IRA

C. Morse code D. none of the above

 

5. __________ is a monitored behavior

  • a Attempts to open, view, delete, and/or modify files
  •   b Attempts to format disk drives and other unrecoverable disk operations
  • c Modification to the logic of executable files or macros
  • d All of the above

 

6. Which of the following describes class B networks?

a Many networks, each with a few hosts

b Medium number of networks, each with a medium number of hosts

c Few networks, each with many hosts

d A network dedicated to multicast applications

 

7. The IP address is assigned to a network interface on a host when ________.

A. the OS boots up B. the PC connects to the Internet

C. an application is run D. the user requests one

 

8. A practical application for multicasting is:

A. teleconferencing B. multimedia

C. database D. all of the above

9. One type of attack on the security of a computer system or network that impacts the availability of a system (e.g. destruction of a resource in the system) is referred to as ___________.

A. interruption B. interception

C. modification D. all of the above

10. The type of attack on communications lines and networks known as traffic analysis belongs to the general category of ____________.

A. active attacks B. passive attacks

C. administrative attacks D. none of the above

11. Which of the following is not an example of intrusion:

a guessing and cracking passwords

b running a packet sniffer on a workstation to capture user names and passwords

c using an unattended, logged-in workstation without permission

d all of the above are examples of intrusion

 

12. A virus can be attached to a program by _________.

a prepending

b postpending

c embedding other than at the beginning or end

d all of the above

13. Which of the following statements regarding macro viruses is true?

a macro virus is platform independent

b macro viruses infect documents, not executable portions of code

c macro viruses are easily spread

d all of the above

14. Which of the following is a type of scanning strategy?

A. hit list B. topological

C. local subnet D. all of the above

15. The WiFi standard known as Privacy with message integrity can be described as follows:

a way of ensuring the privacy of the individual using WiFi

  b technique that ensures that the data transmitted using WiFi have not been altered

  c way of providing mutual authentication between a user and an AS

d none of the above

Request for Solution File

Ask an Expert for Answer!!
Basic Computer Science: 1nbspstandard voice telephone lines such as those found in
Reference No:- TGS01086578

Expected delivery within 24 Hours