Description : Which of the following records logons and deletions? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen captures
Last Answer : c. Log analysis tools
Description : Which of the following captures screen images? a. Key logger b. Packet sniffer c. Log analysis tools d. Screen capture software
Last Answer : d. Screen capture software
Description : What is a program, when installed on a computer, records every keystroke and mouse click? a. Key logger software b. Hardware key logger c. Cookie d. Adware
Last Answer : a. Key logger software
Description : Which one is a communication channel threat? a. Sniffer programs b. Cyber vandalism c. Integrity threats d. All of the above
Last Answer : d. All of the above
Description : Which of the following is a characteristic of a firewall? a. Examines each message as it seeks entrance to the network b. Blocks messages without the correct markings from entering the network c. Detects computers communicating with the Internet without approval d. All of the above
Description : What is software that comes hidden in free downloadable software and tracks your online movements, mines the information stored on your computer, or uses your computer's CPU and storage for some task you know ... about? a. Web log b. Clickstream c. Anonymous Web browsing service d. None of the above
Last Answer : d. None of the above
Description : Do Hubs come with hardwire Firewalls like routers"?
Last Answer : Most do not, you can buy a standalone hardware firewall if you wish to do so.
Description : How To Choose Between Network Hubs And Switches?
Last Answer : If you are setting up a local area network (LAN), don’t get confused by the terms network hub and network switch. They refer to completely different devices. A hub allows all computers connected to the ... where, and so can pass data on to the specific computer the sender is trying to reach.Swit
Description : Do I need crossover cables for hubs and switches?
Last Answer : An eathernet cross over cable is suggested when using a hub.
Description : Network Hubs and Switches?
Last Answer : Setting up a network in a home or office is quite a task. Determining where your computers will be, how to get an Ethernet cable to those that need them, and making sure they can all talk to ... a single network. Which and how to use them are entirely up to the individual(s) building the network.
Description : Advantages of Network Switches Over Hubs?
Last Answer : Most networks used in home and small office environments use Ethernet as the physical media. In an Ethernet network, devices are connected together using either hubs or switches. This ... throughput applications. Networks that include file servers or extreme gaming systems fall into this category.
Description : What is the difference between a switch and a hub? A. Switches operate at physical layer while hubs operate at data link layer B. Switches operate at data link layer while hubs operate at ... hubs operate at physical layer D. Switches operate at transport layer while hubs operate at physical layer
Last Answer : C. Switches operate at data link layer while hubs operate at physical layer
Description : Which of the following statements accurately describe the differences between a hub and a switch? Check all that apply. A. A switch remembers which devices are connected on each interface, while a hub does not. B. A hub is a ... versions of switches. a. A,B b. A,B,C c. A,B,C,D d. A,C,D
Last Answer : b. A,B,C
Description : What's a good packet sniffer for OS X?
Last Answer : answer:Here are some that I really like: Eavesdrop: http://www.baurhome.net/software/eavesdrop/ Ettercap: http://ettercap.sourceforge.net/ KisMAC: http://kismac.macpirate.ch/about.php I still have yet to find a remarkably fast packet sniffer, but these are certainly satisfactory.
Description : Public key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Private key b. Symmetric c. Asymmetric d. None
Last Answer : c. Asymmetric
Description : Private Key cryptography is also known as ‐‐‐‐‐‐‐‐‐‐‐‐‐‐‐cryptography. a. Public key b. Symmetric c. Asymmetric d. None
Last Answer : b. Symmetric
Description : Secret key is used for a. Public key cryptography b. Private key cryptography c. Asymmetric key cryptography d. None of these
Last Answer : b. Private key cryptography
Description : What checks out your computer or network for potential weaknesses? a. Encryption b. Public key encryption c. Security‐auditing software d. None of the above
Last Answer : c. Security‐auditing software
Description : What looks for people on the network who shouldn't be there or who are acting suspiciously? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : c. Intrusion‐detection software
Description : What is an encryption system that uses two keys: a public key that everyone can have and a private key for only the recipient? a. Encryption b. Public key encryption c. Intrusion‐detection software d. Security‐auditing software
Last Answer : b. Public key encryption
Description : What scrambles the contents of a file so you can't read it without having the right decryption key? a. Encryption b. Intrusion‐detection software c. Security‐auditing software d. All of the above
Last Answer : a. Encryption
Description : Public key encryption uses multiple keys. One key is used to encrypt data, while another is used to decrypt data. The key used to encrypt data is called the _____ key, while the key used to ... the _____ key. a. encryption, decryption b. private, public c. encryption, public d. public, private
Last Answer : d. public, private
Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system
Last Answer : d. Messaging‐based workflow system
Description : The network layer contains which hardware device? a. Routers, Bridges b. Bridges only c. Bridges and switches d. Routers, Bridges and Switches
Last Answer : d. Routers, Bridges and Switches
Description : Congestion in a network or internetwork occurs because routers and switches have _______. A. tables B. queues C. crosspoints D. none of the above
Last Answer : B. queues
Description : Congestion in a network or internetwork occurs because routers and switches have _______
Last Answer : queues
Description : Which of the following assertions is FALSE about the Internet Protocol (IP)? a. It is possible for a computer to have multiple IP addresses b. IP packets from the same source to the same ... outgoing packets; the route is determined only by the routing tables in the routers on the way
Last Answer : d. The packet source cannot set the route of an outgoing packets; the route is determined only by the routing tables in the routers on the way
Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.
Last Answer : c. Prevent packets from looping indefinitely
Description : In screen analysis, the notation +5 mm/-10 mm means particles passing through (A) 10 mm screen and retained on 5 mm screen (B) 5 mm screen and retained on 10 mm screen (C) Both 5 mm and 10 mm screens (D) Neither 5 mm nor 10 mm screen
Last Answer : (A) 10 mm screen and retained on 5 mm screen
Description : Companies can gather information about employees and potential employees from which of the following places? a. Job applications b. Credit reports c. Companies that track Web surfers d. All of the above
Description : A technique used to gain personal information for the purpose of identity theft, often by e‐mail, is called? a. Phishing b. Carding c. Brand spoofing d. All of the above
Description : Which of the following is not a common approach to phishing? a. Send an official-looking e-mail asking for confidential information b. Ask people to fill out and return a fake letter using postal mail ... open a submission form on a web page d. All of the above are uncommon approaches to phishing
Last Answer : b. Ask people to fill out and return a fake letter using postal mail
Description : Which of the following is not a dimension of privacy? a. Need for personal space b. Need to feel in control of our possessions c. Need to feel in control of our personal information d. All of the above are dimensions of privacy
Last Answer : d. All of the above are dimensions of privacy
Description : Which is the most important component of IT? a. Information b. People c. Information technology d. Computers
Last Answer : b. People
Description : What is the process of making a copy of the information stored on a computer? a. Backup b. Anti‐virus c. Firewall d. Biometrics
Last Answer : a. Backup
Description : Who breaks into other people's computer systems and steals and destroys information? a. Hackers b. softwares c. Hacktivists d. Script kiddies
Last Answer : a. Hackers
Description : Which service encompasses all technologies used to transmit and process information on an across a network? a. Interoperability b. Scalability c. Benchmarking d. Web services
Last Answer : d. Web services
Description : Which factor ensures your IT systems are functioning correctly and providing accurate information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : c. Reliability
Description : Which factor determines who has the right to access different types of IT systems and information? a. Availability b. Accessibility c. Reliability d. Scalability
Last Answer : b. Accessibility
Description : What charts (1) the cost to your organization of the unavailability of information and technology and (2) the cost to your organization of recovering from a disaster over time? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : d. Disaster recovery cost curve
Description : What is a detailed process for recovering information or an IT system in the event of a catastrophic disaster such as a fire or flood? a. Disaster recovery plan b. Hot site c. Cold site d. Disaster recovery cost curve
Last Answer : a. Disaster recovery plan
Description : The practice of forging a return address on an e‐mail so that the recipient is fooled into revealing private information is termed? a. hacking b. cracking c. dumpster diving d. spoofing
Last Answer : d. spoofing
Description : Secure Sockets Layers does which of the following? a. creates a secure, private connection to a web server b. encrypts information c. sends information over the internet d. all of the above
Last Answer : d. all of the above
Description : What is the name for direct computer‐to‐computer transfer of transaction information contained in standard business documents? a. internet commerce b. e‐commerce c. transaction information transfer d. electronic data interchange
Last Answer : d. electronic data interchange
Description : A combination of software and information designed to provide security and information for payment is called a what? a. digital wallet b. pop up ad c. shopping cart d. encryption
Last Answer : a. digital wallet
Description : What are plastic cards the size of a credit card that contains an embedded chip on which digital information can be stored? a. Customer relationship management systems cards b. E‐government identity cards c. FEDI cards d. Smart cards
Last Answer : d. Smart cards
Description : Is it possible to put a key logger,or in any other way, spy on an iPad that uses a data plan?
Last Answer : It is not hard at all. There are plenty of legitimate tools out there that do this very thing. We utilize one tool called spector soft360 to monitor suspect employee activity.
Description : Do you know where I can buy a free remote key logger?
Last Answer : There are many key loggers available on the internet today due to all of the security issues on the internet. Webwatchers is one of these sites that you can access. I think that you would be very satisfied using this site.
Description : Key logger is a a) Firmware b) Antivirus c) Spyware d) All of the above
Last Answer : c) Spyware