Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
62 Cards in this Set
- Front
- Back
1)The attack on GHOSTNET began with ________.A)a wireless vulnerability B)a social engineering attack C)malicious mobile code D)an insider attack |
Social Engineering |
|
2)The Trojan horse placed on the first compromised GHOSTNET client could________.A)conduct audio and video surveillance B)delete files C)both A and B D)neither A nor B |
conduct audio and video surveillance |
|
3)A networked application is an application that requires a network to operate. |
true
|
|
4)The way in which application layer functions are spread among computers to deliverservice to users is called ________. A)distributed processing B)peer-to-peer computing C)client/server computing D)an application architecture |
an application architecture
|
|
5)Users are primarily concerned with the ________ layer. A)application B)transport C)internet D)physical |
application
|
|
6)The advance that made the client/server application architecture possible was________. A)the Internet B)client processing power C)application sophistication D)input/output methods |
client processing power
|
|
7)Typically, the most common way for an attacker to get extensive privileges on acomputer is to ________. A)take over an application program B)take over the operating system C)take over a computer's hardware D)privilege escalation after an initial takeover |
take over an application program
|
|
8)Having all privileges on a computer is known as having ________. A)access B)omniscience C)root privileges D)mojo |
root privileges
|
|
9)In XSS, the malicious script that gets placed in a webpage sent to a target is________. A)created by a Trojan horse B)sent by someone who has compromised the webserver C)embedded in a database the user queries D)sent by a user |
sent by a user
|
|
10)A lesson of XSS is that programmers should never trust ________. A)contractors B)their own staff colleagues C)databases D)user input |
user input
|
|
11)In SQL injection attacks, the attacker sends ________. A)a legitimate SQL query B)a malformed SQL query C)user input that is used in an SQL query D)an SQL query in malware that is delivered to the target computer |
user input that is used in an SQL query
|
|
12)RFC 822 and RFC 2822 standards govern ________. A)plain text content of e-mail messages B)HTTP page contents C)HTML page contents D)pages written in any language |
plain text content of e-mail messages
|
|
13)E-mail bodies that have non-English text use ________. A)RFC 822 and RFC 2822 B)HTTP C)MIME D)UNICODE |
UNICODE
|
|
14)A traditional e-mail user sending messages to his or her mail server would mostlikely use ________. A)IMAP standard B)POP standard C)either IMAP or POP standard D)SMTP standard |
SMTP Standard
|
|
15)Mail servers communicate with each other by using ________. A)POP B)HTTP C)RFC 2822 D)SMTP |
SMTP
|
|
16)A traditional e-mail user retrieving messages from his or her mail server coulduse ________. A)IMAP standard B)POP standard C)either IMAP or POP standard D)SMTP standard |
either IMAP or POP standard |
|
17)Which of the following allows you to read your e-mail easily on an Internetcafé's computer? A)POP B)Web-enabled e-mail C)both A and B D)neither A nor B |
Web-enabled e-mail
|
|
18)Antivirus software checks e-mail attachments for ________. A)viruses B)Trojan horses C)both A and B D)neither A nor B |
both A and B: viruses and Trojan horses
|
|
19)If companies place antivirus software on all of their client PCs, this willstop almost all virus infections. |
false
|
|
20)Which of the following offers more reliable antivirus protection? A)antivirus software on user PCs B)antivirus software on the mail server C)Both A and B are about equally reliable. |
antivirus software on the mail server
|
|
21)According to the principle of defense in depth, antivirus filtering should bedone in at least ________ location(s). A)1 B)2 C)3 D)4 |
2
|
|
22)When an e-mail user encrypts an outgoing messages with SSL/TLS, how far willthis encryption extend? A)to the sender's e-mail server B)to the receiver's e-mail server C)to the receiver's client host D)to an application program on the receiver's client host |
to the sender's email server
|
|
23)Which of the following provides end-to-end encryption? A)SSL/TLS B)PGP C)both A and B D)neither A nor B |
PGP
|
|
24)What is the almost universal standard for end-to-end encryption? A)SSL/TLS B)IPsec C)PGP D)There is no almost universal standard for end-to-end encryption. |
There is no almost universal standard for end to end encryption |
|
25)VoIP ________ uses the Internet Protocol for transmission. A)always B)usually C)seldom D)never |
always
|
|
26)The main promise of VoIP is to ________. A)add video B)improve voice quality C)improve reliability D)reduce cost |
reduce cost
|
|
27)Telephones that can plug directly into a VoIP network are called PCs withmultimedia hardware and added software. |
false
|
|
28)Speech codecs ________. A)translate human voice signals into digital signals for transmission B)translate human voice signals into analog signals for transmission C)both A and B D)neither A nor B |
translate human voice signals into digital signals for transmission
|
|
29)A media gateway connects a client computer or VoIP phone to the VoIP network. |
false
|
|
30)A media gateway translates ________ transmissions. A)signaling B)transport C)both A and B D)neither A nor B |
both signaling and transport (both A and B)
|
|
31)SIP is a ________ protocol for VoIP. A)signaling B)transport C)both A and B D)neither A nor B |
signaling
|
|
32)Which of the following signaling standards is likely to dominate in VoIP? A)SIP B)H.323 |
SIP
|
|
33)The SIP invite is transmitted to the ________.A)called party's SIP proxy server B)called party's VoIP phone or computer C)both A and B D)neither A nor B |
both a and b: called party's SIP proxy server and called party's VoIP phone or computer
|
|
34)VoIP users have ________ in their phones or on their computers. A)media gateways B)codecs C)both A and B D)neither A nor B |
codecs
|
|
35)Speech codecs vary with respect to ________.A)compression B)voice quality C)both A and B D)neither A nor B |
both A and B: compression and voice quality
|
|
36)For the transport layer, VoIP uses ________ for transport transmission. A)TCP B)UDP C)SIP D)IP |
UDP
|
|
37)RTP supports ________. A)faster transmission speed B)jitter control C)both A and B D)neither A nor B |
jitter control
|
|
38)Which header comes SECOND in a VoIP transport packet? A)RTP B)UDP C)TCP D)Application |
UDP
|
|
39)Codec data comes after the ________ header in VoIP transport frames. A)IP B)TCP C)UDP D)RTP |
RTP
|
|
40)Which of the following is used to retrieve Web pages? A)HTTP B)HTML C)RTP D)SQL |
HTTP
|
|
41)Which of the following is used to define webpage bodies? A)HTTP B)HTMLC )both A and B D)neither A nor B |
HTML
|
|
42)How many HTTP request-response cycles are needed to transfer a webpagecontaining three graphics images? A)1 B)2 C)3 D)none of the above |
None of these
|
|
43)How many HTTP request-response cycles are needed to transfer a webpagecontaining 88 lines of text and three different images? A)3 B)4 C)88 D)91 |
4
|
|
44)Which of the following is considered a bigger problem with traditionalclient/server based architectures than with peer-to-peer architectures? A)underutilized processing capacity of client PCs B)potential for essential data/services to become unavailable as a device isturned off C)both A and B D)neither A nor B |
underutilized processing capacity of client PCs
|
|
45)Transient client presence tends to be a problem in ________. A)P2P applications B)client/server applications C)both A and B D)neither A nor B |
P2P applications
|
|
46)In ________ file retrieval, your computer downloads a file from a server. A)P2P B)client/server C)BitTorrent D)none of the above |
BitTorrent
|
|
47)In BitTorrent, a(n) ________ website is a site the BitTorrent client programgoes to in order to get .torrent files. A)swarm B)index C)tracker D)none of the above |
index
|
|
48)BitTorrent's .torrent files are stored on the ________. A)swarm B)index server C)tracker D)individual peers |
index server
|
|
49)In BitTorrent, a(n) ________ is a server that coordinates the file transfer. A)swarm B)index C)tracker D)none of the above |
tracker
|
|
50)In BitTorrent, the group of all connected computers that have all or part ofthe file to be downloaded is called the ________. A)swarm B)index peers C)trackers D)none of the above |
swarm
|
|
51)Which of the following is a security risk associated with BitTorrent? A)danger caused by opening ports on the firewall B)danger that an employee may download an infected file that cannot be rejectedby filteringC)both A and B D)neither A nor B |
Both A and B: a danger caused by opening ports on the firewall and danger that an employee may download an infected file that cannot be rejected by filtering
|
|
52)The main advantage of ________ file sharing is that it brings cost savings byusing clients rather than server processing power. A)BitTorrent B)client/server C)both A and B D)neither A nor B |
BitTorrent
|
|
53)Skype offers ________. A)free calling among Skype customers B)free calling to and from Public Switched Telephone Network customers C)both A and B D)neither A nor B |
free calling among Skype customers
|
|
54)Which of the following is NOT one of the main elements of the Skype network? A)login server B)proxy server C)host node D)super node |
proxy server
|
|
55)In Skype, ________ is the process where a Skype application looks up theusername and IP address of the party it wants to contact. A)login B)directory search C)transport D)signaling |
directory search
|
|
56)Which element of the Skype network is in charge of signaling? A)the login server B)host nodes C)super nodes D)media gateways |
super nodes
|
|
57)Which element of the Skype network is in charge of transport? A)the login server B)the calling and called host nodes C)super nodes D)media gateways |
the calling and called host nodes
|
|
58)Which of the following steps are done in order during a call with Skype? A)login, signaling, transport B)signaling, transport, end a call C)login, signaling, end a call D)none of the above |
login, signaling, trasnport
|
|
59)Which of the following is a processor-sharing application? A)BitTorrent B)SETI@home C)SIP D)Skype |
SETI@home
|
|
60)Tor was created to improve ________. A)anonymity B)end-to-end encryption C)file download speed D)all of the above |
anonymity
|
|
61)Tor provides confidentiality ________. A)all the way to the destination host B)up to the entry P2P node C)up to the exit P2P node D)Tor does not provide confidentiality. |
up to the exit P2P node
|
|
62)Most P2P applications use servers. |
true |