Which of the following is a characteristic of a firewall?
a. Examines each message as it seeks entrance to the network
b. Blocks messages without the correct markings from entering the network
c. Detects computers communicating with the Internet without approval
d. All of the above

1 Answer

Answer :

d. All of the above

Related questions

Description : What software detects and removes or quarantines computer viruses? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : b. Anti‐virus

Description : What is an internal organizational Internet that is guarded against outside access by a special security feature called a firewall (which can be software, hardware, or a combination of the two)? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : b. Intranet

Description : What is hardware and/or software that protects computers from intruders? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : c. Firewall

Description : Which of the following examines information passing through switches, hubs, or routers? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures

Last Answer : b. Packet sniffer

Description : E‐mail messages may be stored on which of the following computers? a. Sender's computer b. Sender's server c. Recipient's server d. All of the above

Last Answer : d. All of the above

Description : What harnesses far‐flung computers together by way of the Internet or a virtual private network to share CPU power, databases, and database storage? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : d. None of the above

Description : The study of encryption is called‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐ a. Decryption b. Cryptography c. Firewall d. All the above

Last Answer : b. Cryptography

Description : Which one is a threat for E‐commerce a. Trojan horse b. firewall c. encryption d. None

Last Answer : a. Trojan horse

Description : Smart card is better protected than other cards using a. Encryption b. Firewall c. Hub d. All the above

Last Answer : a. Encryption

Description : What is the use of physical characteristics — such as your fingerprint, the blood vessels in the retina of your eye, the sound of your voice, or perhaps even your breath — to provide identification? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : d. Biometrics

Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics

Last Answer : a. Backup

Description : Who protects system from external threats? a. firewall b. EDI c. ERP d. Script kiddies

Last Answer : a. firewall

Description : Which will not harm computer resources a. firewall b. Virus c. Trojan horse d. None of the above

Last Answer : a. firewall

Description : Which of the following is a useful security mechanism when considering business strategy and IT? a. encryption b. decryption c. firewall d. all the above

Last Answer : d. all the above

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : Digital signature is a a. Digital id,send as an attachment to a web page/e‐mail/message b. Is used for verifying the attachments send using web c. Both a and b d. None of these

Last Answer : c. Both a and b

Description : Which of the following is the primary characteristic of an intranet? a. People outside the organization can access it b. People inside the organization can't access it c. People outside the organization can't access it d. None of the above

Last Answer : c. People outside the organization can't access it

Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA

Last Answer : b. FTP

Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers

Last Answer : b. People

Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above

Last Answer : d. None of the above

Description : How the transactions occur in e‐commerce? a. Using e‐medias b. Using computers only c. Using mobile phones only d. None of the above

Last Answer : a. Using e‐medias

Description : Which item can a password be used to protect? a. Network b. File c. Folder d. All of the above

Last Answer : d. All of the above

Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above

Last Answer : c. Security‐auditing software

Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software

Last Answer : c. Intrusion‐detection software

Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services

Last Answer : d. Web services

Description : What determines the future IT infrastructure requirements for new equipment and additional network capacity? a. Flexibility b. Performance c. Capacity planning d. Benchmark

Last Answer : c. Capacity planning

Description : What is an intranet that is restricted to an organization and certain outsiders, such as customers and suppliers? a. Client/server network b. Intranet c. Extranet d. Thin client

Last Answer : c. Extranet

Description : ____intercepts all messages entering and leaving the network. The _____effectively hides the true network addresses: a) Circuit Level Gateway b) Proxy Server c) Packet Filter d) None of These

Last Answer : b) Proxy Server

Description : Which of the following an accurate statement about internet phone calls? a. They are possible but not yet free b. They are not possible c. They are currently standard practice d. None of the above is an accurate statement about internet phone calls

Last Answer : a. They are possible but not yet free

Description : Which type of technology will increase portability and mobility? a. Implant chips b. Micro‐payments c. Internet phone calls d. All of the above

Last Answer : d. All of the above

Description : Which of the following is not a reason why digital cash has turned out to be extremely difficult? a. If your system crashes you lose your money b. There is only one standard c. Digital ... makes money laundering easy d. Digital cash travels across the vast Internet and is susceptible to begin stolen

Last Answer : b. There is only one standard

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above

Last Answer : d. all of the above

Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange

Last Answer : d. electronic data interchange

Description : Which of the following permits the transmission of a bill, along with payment of that bill, to be conducted over the Internet? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : c. electronic bill presentment and payment

Description : If you need to transfer money to another person via the internet, which of the following methods could you use? a. financial cybermediary b. electronic check c. electronic bill presentment and payment d. all of the above

Last Answer : Answer: D

Description : Which of the following is an Internet‐based company that makes it easy for one person to pay another over the Internet? a. electronic check b. electronic bill presentment and payment c. conversion rates d. financial cybermediary

Last Answer : d. financial cybermediary

Description : What is the process in which a buyer posts its interest in buying a certain quantity of items, and sellers compete for the business by submitting successively lower bids until there is only one seller left? a. B2B marketplace b. Intranet c. Reverse auction d. Internet

Last Answer : c. Reverse auction

Description : Which products are people most likely to be comfortable buying on the Internet? a. Books b. PCs c. CDs d. All of the above

Last Answer : d. All of the above

Description : Which products are people most likely to be more uncomfortable buying on the Internet? a. Books b. Furniture c. Movies d. All of the above

Last Answer : b. Furniture

Description : A husband and wife are seated facing each other with a barrier between them. Each one takes turns communicating with the other, each speaking only two words at a time. After each two-word message is ... or frustrated with the person who shouted the four-word phrase. What is going on here? -Riddles

Last Answer : The husband and wife are playing the old game of BATTLESHIP. The two-word communications consist of a letter and a number for the coordinates of where the ships are hidden, and the one-word responses are ... ' or 'Miss'. The final four word phrase which ends the game is, 'You Sank My Battleship!

Description : Concerned about the impact on her firm's promotional messages, Karen Dickson of Magnum PLC., seeks an approach with immediate feedback. She is most likely to achieve this through. A)television advertising B)newspaper advertising C)publicity D)personal selling E)sales promotion

Last Answer : D)personal selling

Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above

Last Answer : a. Encryption

Description : Which type of e‐commerce focuses on consumers dealing with each other? a. B2B b. B2C c. C2B d. C2C

Last Answer : d. C2C

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description :  __________ is software that blocks unauthorized users from connecting to your computer. A. Firewall B. Quick lauch C. OneLogin D. Centrify

Last Answer : A. Firewall 

Description : Which of the following is not a characteristic observed in material failure by fatigue fracture? (A) Plastic deformation of material does not occur (B) Initiation of crack from below the surface does ... (D) Presence of both rough & smooth zone with conchoidal markings in smooth zone of the surface

Last Answer : Option B

Description : Once upon a time there was a beautiful princess named Anna. Anna's father, the King, wanted to be sure his daughter married an intelligent man. To test his daughter's suitors the King hid Anna's ... each suitor 'Only one of the three messages is correct.' Which box contained Anna's picture? -Riddles

Last Answer : The silver box contained Anna's picture. If her picture had been in the gold box, two statements would have been true. (The messages on both the gold box and the silver box.) If her picture had ... bronze box, two statements would have been true. (The messages on the bronze box and the silver box.)

Description : -Stalking the length of the cage, ignoring the visitors... The underlying message conveyed in this line could be best represented by which of the following ideas? (a) Man is not the only animal that seeks freedom ... kind, not just mankind! (d) The meaning of all life is to be loved and cared for!

Last Answer : (a) Man is not the only animal that seeks freedom and space.

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall