Fill in the blank with the appropriate term. A ______________________ network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used for preventing the collision of data between two computers that want to send messages at the same time
FILL BLANK Fill in the blank with the appropriate term. A ______________________ network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used for preventing the collision of data between two computers that want...
Which of the following policies is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly?
Which of the following policies is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly?A . Information protection policyB . Remote access policyC . Group policyD . Password policyView AnswerAnswer: D Explanation: A password policy is a set of...
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?
Which of the following honeypots provides an attacker access to the real operating system without any restriction and collects a vast amount of information about the attacker?A . High-interaction honeypotB . Medium-interaction honeypotC . HoneydD . Low-interaction honeypotView AnswerAnswer: A Explanation: A high-interaction honeypot offers a vast amount of information...
Which of the following e-mail crimes is Peter committing?
Peter, a malicious hacker, obtains e-mail addresses by harvesting them from postings, blogs, DNS listings, and Web pages. He then sends a large number of unsolicited commercial e-mail (UCE) messages to these addresses. Which of the following e-mail crimes is Peter committing?A . E-mail spamB . E-mail stormC . E-mail...
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.
Which of the following analyzes network traffic to trace specific transactions and can intercept and log traffic passing over a digital network? Each correct answer represents a complete solution. Choose all that apply.A . Wireless snifferB . Spectrum analyzerC . Protocol analyzerD . Performance MonitorView AnswerAnswer: AC Explanation: Protocol analyzer...
Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers
FILL BLANK Fill in the blank with the appropriate term. A ______________ is a set of tools that take Administrative control of a computer system without authorization by the computer owners and/or legitimate managers.View AnswerAnswer: rootkit Explanation: A rootkit is a set of tools that take Administrative control of a...
Which of the following techniques is used for drawing symbols in public places for advertising an open Wi-Fi wireless network?
Which of the following techniques is used for drawing symbols in public places for advertising an open Wi-Fi wireless network?A . SpammingB . War drivingC . War dialingD . WarchalkingView AnswerAnswer: D Explanation: Warchalking is the drawing of symbols in public places to advertise an open Wi-Fi wireless network. Having...
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?
Which of the following types of VPN uses the Internet as its main backbone, allowing users, customers, and branch offices to access corporate network resources across various network architectures?A . PPTP VPNB . Remote access VPNC . Extranet-based VPND . Intranet-based VPNView AnswerAnswer: C Explanation: An extranet-based VPN uses the...
Which of the following is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN)?
Which of the following is a telecommunication service designed for cost-efficient data transmission for intermittent traffic between local area networks (LANs) and between end-points in a wide area network (WAN)?A . PPPB . Frame relayC . ISDNE . 25F . NoneView AnswerAnswer: B Explanation: Frame relay is a telecommunication service...
Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient
FILL BLANK Fill in the blank with the appropriate term. ________________________ is the complete network configuration and information toolkit that uses multi-threaded and multi-connection technologies in order to be very fast and efficient.View AnswerAnswer: NetRanger Explanation: NetRanger is the complete network configuration and information toolkit that includes the following tools:...