Which is the protocol used by the internet

Assignment Help Computer Network Security
Reference no: EM131060189

Question 1. A way to ensure that a company's site is on the first page users see when looking for a specific term is using __________ advertising.

A. stealth

B. viral

C. buzz

D. search

Question 2. Which of the following is likely to have the suffix ".edu" after the domain name in its URL?

A. Yahoo!

B. UNICEF

C. The Federal Reserve

D. Harvard Business School

Question 3. Which of the following computer networks is used for providing wireless communication between devices, using technologies such as Bluetooth?

A. Personal area network

B. Storage area network

C. Campus area network

D. Metropolitan area network

Question 4. Which of the following types of e-auction fraud is associated with the seller's failure to ship an item after the payment has been received?

A. Bid luring

B. Bid shielding

C. Non-shipment

D. Shipping fraud

Question 5. The protocol used by the Internet is called the:

A. Transmission Control Protocol (TCP).

B. Dynamic Host Configuration Protocol (DHCP).

C. Address Resolution Protocol (ARP).

D. Trivial File Transfer Protocol (TFTP).

Question 6. With respect to consumer-to-business e-commerce, __________ is used in order to have small, well-defined tasks performed by a scalable ad hoc workforce of everyday people.

A. nearshoring

B. insourcing

C. offshoring

D. crowdsourcing

Question 7. With respect to typical revenue models for electronic commerce businesses, PayPal.com, eBay.com, and Groupon.com are using a(n) __________ revenue model.

A. transaction fees

B. licensing

C. affiliate marketing

D. traditional sales

Question 8. With respect to typical revenue models for electronic commerce businesses, Symantec and Norton are using a(n) __________ revenue model.

A. subscription

B. licensing

C. affiliate marketing

D. brokerage

Question 9. Within the context of different types of e-auction fraud, bid shielding is sometimes called:

A. bid skimming.

B. bid luring.

C. reverse bidding.

D. shill bidding.

Question 10. EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true, would most undermine the decision to adopt a click-only strategy?

A. The company has limited access to funds and is looking to keep its costs low.

B. The public is wary of sharing confidential information after a recent spate of credit card scandals.

C. A competitor is facing severe backlash after inadvertently releasing sensitive data into the public domain.

D. Several companies who have switched from brick-and-mortar strategy to a click-only are experiencing severe channel conflicts

Question 11. With respect to computer networks, a typical __________ area network has a bandwidth of 10 Mbps to 1 Gbps.

A. personal

B. metropolitan

C. local

D. campus

Question 12. Which of the following statements is true about the platform as a service model?

A. The customer is provided with the basic capabilities of processing, storage, and networking.

B. The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.

C. The customer can run his or her own applications that are typically designed using tools provided by the service provider.

D. Only the basic capabilities of processing, storage, and networking are provided.

Question 13. Doug is a frequent visitor of online auction sites. He uses two different accounts to place a low followed by a very high bid on the desired item. This leads other bidders to drop out of the auction. He then retracts the high bid and wins the item at the low bid. This form of e-auction fraud is known as:

A. shill bidding.

B. bid luring.

C. rafter bidding.

D. mystery bidding

Question 14. Which of the following statements is true about electronic commerce?

A. Business-to-business is by far the largest form of electronic commerce in terms of revenues.

B. Electronic commerce is limited to transactions between businesses and consumers.

C. Electronic commerce between businesses and their employees is impossible.

D. All forms of electronic commerce involve business firms.

Question 15. With regard to the World Wide Web, Web pages are stored on Web:

A. consoles.

B. rings.

C. consortiums.

D. servers.

Question 16. Which of the following is a disadvantage of e-tailing?

A. It is limited by physical store and shelf space restrictions.

B. It requires additional time for products to be delivered.

C. It complicates the process of comparison shopping.

D. It restricts companies to effectively compete on price.

Question 17. Which of the following statements is true about a public cloud?

A. It gives the organization a high degree of customizability over their data and applications.

B. It can be used by any interested party on a pay-per-use basis.

C. It is internal to an organization.

D. It does not free an organization from the issues associated with managing the cloud infrastructure.

Question 18. A hypertext document is otherwise known as a:

A. Web page.

B. Web host.

C. Web ring.

D. Webmaster

Question 19. __________ is used to transmit voice and video communication over the Internet.

A. Edge computing

B. IP convergence

C. Distributed computing

D. IP routing

Question 20. Which of the following occurred in the 1946-1958 generation of computing?

A. The interpersonal computing era ended and the internetworking era began.

B. The internetworking era ended.

C. The mainframe era began.

D. The mainframe era ended and the personal computer era began.

Reference no: EM131060189

Questions Cloud

Synthesis on issues occurring within testament letters : Purpose - To provide a synthesis on specific issues occurring within the texts of the New Testament letters. This assessment task provides a student with the opportunity to explore a major theme in relation to New Testament letters
Finding the effective diameter : To water the yard, you use a hose with a diameter of 3.7 cm. Water flows from the hose with a speed of 1.3 m/s. If you partially block the end of the hose so the effective diameter is now 0.55 cm, with what speed does water spray from the hose?
New frequency of the string that was tightened : Two strings are adjusted to vibrate at exactly 260 Hz. Then the tension in one string is increased slightly. Afterward, three beats per second are heard when the strings vibrate at the same time. What is the new frequency of the string that was ti..
Thermal efficiency of the engine : a. If the engine receives 6.55 kJ of heat energy from the reservoir at 505 K in each cycle, how many joules per cycle does it reject to the reservoir at 300 K ? b. How much mechanical work is performed by the engine during each cycle? c. What is th..
Which is the protocol used by the internet : EZBiz, the brainchild of three college friends, is a startup venture which plans to produce and market sports gear. They are currently trying to decide between a bricks-and-clicks strategy and a click-only strategy. Which of the following, if true..
Problem regarding the suspension : Generally, you can't suspend an employee unless there's a suspension clause in the employment agreement. In very serious cases, you may be able to suspend someone while you investigate the misconduct, e.g. to protect your accounts from possible in..
Right process for managing misconduct : If you've followed the right process for managing misconduct, and given your employee a fair opportunity to improve their behavior, ongoing misconduct can lead to dismissal.
Health research paper : Your Health Research Paper must be 3 to 5 pages in length (not counting the title, abstract and reference pages), please select one health topic important to personal health and well-being.
Find the current in the resistor : Find the current in the resistor. Find the magnetic force on the bar. Find the power dissipation in the resistor.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Identify the responsibilities of a project manager

Identify the responsibilities of a Project manager when participating in a real world project and define the role of management in projects, particularly from the view point of the practitioner as a member of the project team;

  Write the symbolic logic for the 3des decryption

How would you protect the passwords on your system using some of the mechanisms we have studied? Discuss implementation strategies and explain your decisions.

  Implementation issues for it security policy development

Examine the implementation issues for IT security policy development. Determine which of these issues are the most challenging for organizations to overcome and explain why.

  Why will you choose a certain acquisition method

What tools listed in the text book are available and how do you plan to acquire the data? Why will you choose a certain acquisition method?

  Cyber weapon

Single Sign On (SSO), Single Sign On (SSO), netstat -an, arp -a, ipconfig /displaydns, MS Config. Means, MS Config. Means, network reconnaissance

  How many intermediate authorities do they employ

How many intermediate authorities do they employ? How many certificates have they signed? Do not limit yourself to these questions, but provide a thorough overview of how the CA is run.

  Secure the incident scene

Develop a detailed plan to approach and secure the incident scene based on the information you have from the scenario

  Business continuity plan or disaster recovery plan

In order for an organization to develop an effective business continuity plan or disaster recovery plan, it must know what information assets it has, their impact on business operations, and the criticality and priorities associated with the infor..

  What steps you will take if your network has been hacked

Explain what steps you will take if you discover your network has been hacked. Your paper should be AT LEAEST A 1,000 words OF CONTENT and should include citations

  Protect the system from these procedural attacks

Summarise the procedures and tools hackers use for information gathering, target systems scanning, back-door opening and log-file clean-up. Alternatively, give an account of a hacker story from a technical perspective, including the tools employed..

  Automated digital job application system

List down advantages that come about having an automated digital job application system

  Develop an ids with the use of the material

Develop an IDS with the use of the material provided. The ids must detect as many attacks as possible and you must report them in a human readable format.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd