• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/62

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

62 Cards in this Set

  • Front
  • Back

1)The attack on GHOSTNET began with ________.A)a wireless vulnerability


B)a social engineering attack


C)malicious mobile code


D)an insider attack

Social Engineering

2)The Trojan horse placed on the first compromised GHOSTNET client could________.A)conduct audio and video surveillance


B)delete files


C)both A and B


D)neither A nor B

conduct audio and video surveillance

3)A networked application is an application that requires a network to operate.

true

4)The way in which application layer functions are spread among computers to deliverservice to users is called ________.


A)distributed processing


B)peer-to-peer computing


C)client/server computing


D)an application architecture

an application architecture

5)Users are primarily concerned with the ________ layer.


A)application


B)transport


C)internet


D)physical

application

6)The advance that made the client/server application architecture possible was________.


A)the Internet


B)client processing power


C)application sophistication


D)input/output methods

client processing power

7)Typically, the most common way for an attacker to get extensive privileges on acomputer is to ________.


A)take over an application program


B)take over the operating system


C)take over a computer's hardware


D)privilege escalation after an initial takeover

take over an application program

8)Having all privileges on a computer is known as having ________.


A)access


B)omniscience


C)root privileges


D)mojo

root privileges

9)In XSS, the malicious script that gets placed in a webpage sent to a target is________.


A)created by a Trojan horse


B)sent by someone who has compromised the webserver


C)embedded in a database the user queries


D)sent by a user

sent by a user

10)A lesson of XSS is that programmers should never trust ________.


A)contractors


B)their own staff colleagues


C)databases


D)user input

user input

11)In SQL injection attacks, the attacker sends ________.


A)a legitimate SQL query


B)a malformed SQL query


C)user input that is used in an SQL query


D)an SQL query in malware that is delivered to the target computer

user input that is used in an SQL query

12)RFC 822 and RFC 2822 standards govern ________.


A)plain text content of e-mail messages


B)HTTP page contents


C)HTML page contents


D)pages written in any language

plain text content of e-mail messages

13)E-mail bodies that have non-English text use ________.


A)RFC 822 and RFC 2822


B)HTTP


C)MIME


D)UNICODE

UNICODE

14)A traditional e-mail user sending messages to his or her mail server would mostlikely use ________.


A)IMAP standard


B)POP standard


C)either IMAP or POP standard


D)SMTP standard

SMTP Standard

15)Mail servers communicate with each other by using ________.


A)POP


B)HTTP


C)RFC 2822


D)SMTP

SMTP

16)A traditional e-mail user retrieving messages from his or her mail server coulduse ________.


A)IMAP standard


B)POP standard


C)either IMAP or POP standard


D)SMTP standard

either IMAP or POP standard

17)Which of the following allows you to read your e-mail easily on an Internetcafé's computer?


A)POP


B)Web-enabled e-mail


C)both A and B


D)neither A nor B

Web-enabled e-mail

18)Antivirus software checks e-mail attachments for ________.


A)viruses


B)Trojan horses


C)both A and B


D)neither A nor B

both A and B: viruses and Trojan horses

19)If companies place antivirus software on all of their client PCs, this willstop almost all virus infections.

false

20)Which of the following offers more reliable antivirus protection?


A)antivirus software on user PCs


B)antivirus software on the mail server


C)Both A and B are about equally reliable.

antivirus software on the mail server

21)According to the principle of defense in depth, antivirus filtering should bedone in at least ________ location(s).


A)1


B)2


C)3


D)4

2

22)When an e-mail user encrypts an outgoing messages with SSL/TLS, how far willthis encryption extend?


A)to the sender's e-mail server


B)to the receiver's e-mail server


C)to the receiver's client host


D)to an application program on the receiver's client host

to the sender's email server

23)Which of the following provides end-to-end encryption?


A)SSL/TLS


B)PGP


C)both A and B


D)neither A nor B

PGP

24)What is the almost universal standard for end-to-end encryption?


A)SSL/TLS


B)IPsec


C)PGP


D)There is no almost universal standard for end-to-end encryption.

There is no almost universal standard for end to end encryption

25)VoIP ________ uses the Internet Protocol for transmission.


A)always


B)usually


C)seldom


D)never

always

26)The main promise of VoIP is to ________.


A)add video


B)improve voice quality


C)improve reliability


D)reduce cost

reduce cost

27)Telephones that can plug directly into a VoIP network are called PCs withmultimedia hardware and added software.



false

28)Speech codecs ________.


A)translate human voice signals into digital signals for transmission


B)translate human voice signals into analog signals for transmission


C)both A and B


D)neither A nor B

translate human voice signals into digital signals for transmission

29)A media gateway connects a client computer or VoIP phone to the VoIP network.

false

30)A media gateway translates ________ transmissions.


A)signaling


B)transport


C)both A and B


D)neither A nor B

both signaling and transport (both A and B)

31)SIP is a ________ protocol for VoIP.


A)signaling


B)transport


C)both A and B


D)neither A nor B

signaling

32)Which of the following signaling standards is likely to dominate in VoIP?


A)SIP


B)H.323

SIP

33)The SIP invite is transmitted to the ________.A)called party's SIP proxy server


B)called party's VoIP phone or computer


C)both A and B


D)neither A nor B

both a and b: called party's SIP proxy server and called party's VoIP phone or computer

34)VoIP users have ________ in their phones or on their computers.


A)media gateways


B)codecs


C)both A and B


D)neither A nor B

codecs

35)Speech codecs vary with respect to ________.A)compression


B)voice quality


C)both A and B


D)neither A nor B

both A and B: compression and voice quality

36)For the transport layer, VoIP uses ________ for transport transmission.


A)TCP


B)UDP


C)SIP


D)IP

UDP

37)RTP supports ________.


A)faster transmission speed


B)jitter control


C)both A and B


D)neither A nor B

jitter control

38)Which header comes SECOND in a VoIP transport packet?


A)RTP


B)UDP


C)TCP


D)Application

UDP

39)Codec data comes after the ________ header in VoIP transport frames.


A)IP


B)TCP


C)UDP


D)RTP

RTP

40)Which of the following is used to retrieve Web pages?


A)HTTP


B)HTML


C)RTP


D)SQL

HTTP

41)Which of the following is used to define webpage bodies?


A)HTTP


B)HTMLC


)both A and B


D)neither A nor B

HTML

42)How many HTTP request-response cycles are needed to transfer a webpagecontaining three graphics images?


A)1


B)2


C)3


D)none of the above

None of these

43)How many HTTP request-response cycles are needed to transfer a webpagecontaining 88 lines of text and three different images?


A)3


B)4


C)88


D)91

4

44)Which of the following is considered a bigger problem with traditionalclient/server based architectures than with peer-to-peer architectures?


A)underutilized processing capacity of client PCs


B)potential for essential data/services to become unavailable as a device isturned off


C)both A and B


D)neither A nor B

underutilized processing capacity of client PCs

45)Transient client presence tends to be a problem in ________.


A)P2P applications


B)client/server applications


C)both A and B


D)neither A nor B

P2P applications

46)In ________ file retrieval, your computer downloads a file from a server.


A)P2P


B)client/server


C)BitTorrent


D)none of the above

BitTorrent

47)In BitTorrent, a(n) ________ website is a site the BitTorrent client programgoes to in order to get .torrent files.


A)swarm


B)index


C)tracker


D)none of the above

index

48)BitTorrent's .torrent files are stored on the ________.


A)swarm


B)index server


C)tracker


D)individual peers

index server

49)In BitTorrent, a(n) ________ is a server that coordinates the file transfer.


A)swarm


B)index


C)tracker


D)none of the above

tracker

50)In BitTorrent, the group of all connected computers that have all or part ofthe file to be downloaded is called the ________.


A)swarm


B)index peers


C)trackers


D)none of the above

swarm

51)Which of the following is a security risk associated with BitTorrent?


A)danger caused by opening ports on the firewall


B)danger that an employee may download an infected file that cannot be rejectedby filteringC)both A and B


D)neither A nor B

Both A and B: a danger caused by opening ports on the firewall and danger that an employee may download an infected file that cannot be rejected by filtering

52)The main advantage of ________ file sharing is that it brings cost savings byusing clients rather than server processing power.


A)BitTorrent


B)client/server


C)both A and B


D)neither A nor B

BitTorrent

53)Skype offers ________.


A)free calling among Skype customers


B)free calling to and from Public Switched Telephone Network customers


C)both A and B


D)neither A nor B

free calling among Skype customers

54)Which of the following is NOT one of the main elements of the Skype network?


A)login server


B)proxy server


C)host node


D)super node

proxy server

55)In Skype, ________ is the process where a Skype application looks up theusername and IP address of the party it wants to contact.


A)login


B)directory search


C)transport


D)signaling

directory search

56)Which element of the Skype network is in charge of signaling?


A)the login server


B)host nodes


C)super nodes


D)media gateways

super nodes

57)Which element of the Skype network is in charge of transport?


A)the login server


B)the calling and called host nodes


C)super nodes


D)media gateways

the calling and called host nodes

58)Which of the following steps are done in order during a call with Skype?


A)login, signaling, transport


B)signaling, transport, end a call


C)login, signaling, end a call


D)none of the above

login, signaling, trasnport

59)Which of the following is a processor-sharing application?


A)BitTorrent


B)SETI@home


C)SIP


D)Skype

SETI@home

60)Tor was created to improve ________.


A)anonymity


B)end-to-end encryption


C)file download speed


D)all of the above

anonymity

61)Tor provides confidentiality ________.


A)all the way to the destination host


B)up to the entry P2P node


C)up to the exit P2P node


D)Tor does not provide confidentiality.

up to the exit P2P node

62)Most P2P applications use servers.

true