12.07.2015 Views

CIS 150 Final Exam Review Sheet Multiple Choice Identify the ...

CIS 150 Final Exam Review Sheet Multiple Choice Identify the ...

CIS 150 Final Exam Review Sheet Multiple Choice Identify the ...

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

____ 99. ____ refers to dialing directly into a private network’s or ISP’s remote access server to log on to a network.a. Dialed networking c. Dial-up networkingb. Traditional networking d. Virtual networking____ 100. ____ is an open source system designed to allow one workstation to remotely manipulate and receive screenupdates from ano<strong>the</strong>r workstation.a. Remote Desktop c. Citrixb. VNC d. Xen____ 101. In a ____ VPN, tunnels connect multiple sites on a WAN.a. site-to-site c. client-to-clientb. site-to-client d. link-to-line____ 102. On network diagrams, <strong>the</strong> Internet is frequently depicted as a ____.a. block c. lineb. cloud d. lightening bolt____ 103. In ____, each datagram can follow one of many paths to reach its destination.a. circuit switching c. packet switchingb. line switching d. data switching____ 104. ____ desktops are desktop operating environments hosted virtually, on a different physical computer from <strong>the</strong>one with which <strong>the</strong> user interacts.a. Virtual c. Materialb. Physical d. Guest____ 105. ____ is a social engineering practice in which a person attempts to glean access or au<strong>the</strong>ntication informationby posing as someone who needs that information.a. Cracking c. War drivingb. Hacking d. Phishing____ 106. ____ software searches a node for open ports.a. Phishing c. Au<strong>the</strong>nticationb. Sniffing d. Port scanner____ 107. A router that is not configured to drop packets that match certain or suspicious characteristics is an exampleof a risk associated with ____.a. people c. protocols and softwareb. transmission and hardware d. Internet access____ 108. A ____ attack occurs when a system becomes unable to function because it has inundated with requests forservices and can’t respond to any of <strong>the</strong>m.a. flashing c. war drivingb. denial-of-service d. phishing____ 109. A ____ firewall is a router (or a computer installed with software that enables it to act as a router) thatexamines <strong>the</strong> header of every packet of data it receives to determine whe<strong>the</strong>r that type of packet is authorizedto continue to its destination.a. packet-filtering c. proxyb. gateway d. selective____ 110. A ____ attack occurs when a hacker uses programs that try a combination of a user ID and every word in adictionary to gain access to <strong>the</strong> network.a. flashing c. dictionary

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!