Test Bank For Business Data Networks and Security 11th Edition Raymond R. Panko Julia L. Panko Raymond R. Panko 1 / 4
1 Copyright © 2019 Pearson Education, Inc.Business Data Networks and Security, 11e (Panko) Chapter 1 Core Network Concepts and Terminology
1) Flooding a host with traffic so that it cannot serve its legitimate users is a ________ attack.
- hacking
- virus
- malware
- DoS
Answer: D
Difficulty: Basic
Question: 1a
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology
2) The KrebsOnSecurity.com attack ________.
- was a denial of service attack.
- used IoT devices to attack the site
- both A and B
- neither A nor B
Answer: C
Difficulty: Basic
Question: 1b
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology, Analytical Thinking
3) Internet communication that does not involve a human is referred to with the term ________.
- World Wide Web
- impersonal
- anonymous
- IoT
Answer: D
Difficulty: Difficult
Question: 1c
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology, Analytical Thinking
- / 4
2 Copyright © 2019 Pearson Education, Inc.4) If a host cannot reach a DNS server, it ________.
- cannot have a host name
- will have to rely on host names
- will need to use a DHCP server
- is unlikely to be able to communicate with most server hosts
Answer: D
Difficulty: Difficult
Question: 1d
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology, Analytical Thinking
5) The Mirai bots in the KrebsOnSecurity.com attack were ________.
- client hosts
- server hosts
- IoT devices
- all of the above
Answer: C
Difficulty: Basic
Question: 1e
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology
6) ISPs ________.
- carry traffic in the Internet
- connect users to the Internet
- both A and B
- neither A nor B
Answer: C
Difficulty: Basic
Question: 3a
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology, Analytical Thinking
- / 4
3 Copyright © 2019 Pearson Education, Inc.7) A packet sent from one host to another over the Internet will ALWAYS pass through
________.
- a single ISP
- more than 2 ISPs
- exactly 2 ISPs
- none of the above
Answer: D
Difficulty: Difficult
Question: 3c
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.AACSB: Applying Information Technology, Analytical Thinking, Application of Knowledge
8) We call any device connected to the Internet a(n) ________.
- IP
- client
- router
- host
Answer: D
Difficulty: Basic
Question: 4a
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology
9) Which of the following is a host when it's on a network?
- a client PC
- a server
- a mobile phone
- all of the above
Answer: D
Difficulty: Basic
Question: 4b
Objective: Discuss how the Internet is changing and the security challenges these changes are creating.
AACSB: Applying Information Technology
- / 4