Question 1
Which of these is one of the strongest cryptographic algorithms to break?
Advanced Encryption Standard (AES)
Symmetric Key Encryption
Public Key Encryption
Private Key Encryption
Question 2
For what reason would Local Area Networks (LAN's) NOT be more advantageous over other networks?
Enable people to work together
Shared networked hardware can reduce costs
Sharing data can increase productivity
Sharing a single copy of software across multiple computers
Question 3
A network device is defined as:
any electronic device that broadcasts network data, boosts signals, or routes data to its destination.
a Network Interface Card (NIC)
a node
a circuit
Question 4
Which Internet connection links your computer to an Internet Service Provider (ISP) from a stationary point?
Portable Internet Access
Mobile Internet Access
Fixed Internet Access
Symmetric Internet Access
Question 5
Which Internet protocol creates connections and exchanges packets of data?
User Datagram Protocol (UDP)
Transmission Control Protocol (TCP)
Hypertext Transfer Protocol (HTTP)
File Transfer Protocol (FTP)
Question 6
Create a checklist of steps you should take to secure your computer from Internet based intrusions, and discuss the steps in some detail.
Question 7
Define what a protocol is and identify the specific responsibilities of the communication protocol. What is the purpose of communication protocols?
Question 8
Identify two examples of synchronous and asynchronous communications that are offered on the Internet and briefly define synchronous and asynchronous communications.