• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Business Data Networks and Security

Testbanks Dec 29, 2025 ★★★★★ (5.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Test Bank For Business Data Networks and Security 11th Edition Raymond R. Panko Julia L. Panko Raymond R. Panko 1 / 4

1 Copyright © 2019 Pearson Education, Inc.Business Data Networks and Security, 11e (Panko) Chapter 1 Core Network Concepts and Terminology

1) Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack.

  • hacking
  • virus
  • malware
  • DoS

Answer: D

Difficulty: Basic

Question: 1a

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology

2) The KrebsOnSecurity.com attack ________.

  • was a denial of service attack.
  • used IoT devices to attack the site
  • both A and B
  • neither A nor B

Answer: C

Difficulty: Basic

Question: 1b

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology, Analytical Thinking

3) Internet communication that does not involve a human is referred to with the term ________.

  • World Wide Web
  • impersonal
  • anonymous
  • IoT

Answer: D

Difficulty: Difficult

Question: 1c

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology, Analytical Thinking

  • / 4

2 Copyright © 2019 Pearson Education, Inc.4) If a host cannot reach a DNS server, it ________.

  • cannot have a host name
  • will have to rely on host names
  • will need to use a DHCP server
  • is unlikely to be able to communicate with most server hosts

Answer: D

Difficulty: Difficult

Question: 1d

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology, Analytical Thinking

5) The Mirai bots in the KrebsOnSecurity.com attack were ________.

  • client hosts
  • server hosts
  • IoT devices
  • all of the above

Answer: C

Difficulty: Basic

Question: 1e

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology

6) ISPs ________.

  • carry traffic in the Internet
  • connect users to the Internet
  • both A and B
  • neither A nor B

Answer: C

Difficulty: Basic

Question: 3a

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology, Analytical Thinking

  • / 4

3 Copyright © 2019 Pearson Education, Inc.7) A packet sent from one host to another over the Internet will ALWAYS pass through

________.

  • a single ISP
  • more than 2 ISPs
  • exactly 2 ISPs
  • none of the above

Answer: D

Difficulty: Difficult

Question: 3c

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge

8) We call any device connected to the Internet a(n) ________.

  • IP
  • client
  • router
  • host

Answer: D

Difficulty: Basic

Question: 4a

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology

9) Which of the following is a host when it's on a network?

  • a client PC
  • a server
  • a mobile phone
  • all of the above

Answer: D

Difficulty: Basic

Question: 4b

Objective: Discuss how the Internet is changing and the security challenges these changes are creating.

AACSB: Applying Information Technology

  • / 4

User Reviews

★★★★★ (5.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★★

I was amazed by the practical examples in this document. It helped me ace my presentation. Truly superb!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Testbanks
Added: Dec 29, 2025
Description:

Test Bank For Business Data Networks and Security 11th Edition Raymond R. Panko Julia L. Panko Raymond R. Panko Copyright © 2019 Pearson Education, Inc. Business Data Networks and Security, 11e (P...

Unlock Now
$ 1.00