Deck 6: The Internet
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/48
Play
Full screen (f)
Deck 6: The Internet
1
A news article states that hackers tried to redirect unsuspecting users to infected sites using a technique called
cache poisoning. (Hint: Use the acronym.)

Domain Name Sever
• The technique used to redirect web site from one to another when DNS is malfunctioned is called DNS Cache Poisoning.
• Therefore, the hacker used this DNS Cache Poisoning technique to divert the website.
Therefore, the appropriate word to fill in the blank is DNS.
• The technique used to redirect web site from one to another when DNS is malfunctioned is called DNS Cache Poisoning.
• Therefore, the hacker used this DNS Cache Poisoning technique to divert the website.
Therefore, the appropriate word to fill in the blank is DNS.
2
Your friend is setting up a cable Internet connection. You recommend that she connect a router between her computer and the cable modem, and explain that network
translation can help to secure her computer against intrusions.

Address
• Network Address Translation (NAT) is used to keep track of the packets with respect to their IP address.
• Since, it is used as a security technique, I request my friend to use NAT between the router and system or computer to set a cable internet connection.
Therefore, the appropriate word to fill in the blank is Address.
• Network Address Translation (NAT) is used to keep track of the packets with respect to their IP address.
• Since, it is used as a security technique, I request my friend to use NAT between the router and system or computer to set a cable internet connection.
Therefore, the appropriate word to fill in the blank is Address.
3

WIMAX
WIMAX stands for worldwide interoperability for microwave access. It is also designated as IEEE 802.16 by Ethernet compatibility network.
It acts as an alternative to DSL where cable service or telephone lines are not available such as in rural area.
A WIMAX sends and receive data with the help of WIMAX antennas. A WIMAX is capable of covering approximate 8 KM area. It can transmit data at 70Mbps rate.
Therefore, the appropriate word to fill in the blank is WIMAX.
WIMAX stands for worldwide interoperability for microwave access. It is also designated as IEEE 802.16 by Ethernet compatibility network.
It acts as an alternative to DSL where cable service or telephone lines are not available such as in rural area.
A WIMAX sends and receive data with the help of WIMAX antennas. A WIMAX is capable of covering approximate 8 KM area. It can transmit data at 70Mbps rate.
Therefore, the appropriate word to fill in the blank is WIMAX.
4
Make a timeline of events associated with the evolution of the Internet.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
5
Give examples of synchronous and asynchronous communications offered on the Internet.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
6

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
7
You're installing a high-speed Internet connection. The modem has a cable like the one shown at right. This modem is designed to connect to a computer's
port.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
8
Explain how Voice over IP works, and compare it to cell phone and land line services.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
9
A Wi-Fi
is an area in which the public can access a Wi-Fi network that offers Internet service.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
10
Draw a conceptual diagram illustrating the Internet backbone, NAPs, NSPs, routers, and ISPs. Extend the diagram to show how computers on a LAN access the Internet through a single DSL modem.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
11
List two examples of distributed grid computing and two examples of cloud computing.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
12

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
13
Your Internet access seems very slow one day. You might be able to use a networking utility called
to discover the source of the slowdown.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
14
Draw diagrams to illustrate how FTP, the original Napster, and Bit Torrent work.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
15
WAP devices have been replaced by devices that use mobile
technologies offering the full Internet experience.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
16
List at least five protocols used on the Internet and describe what they are used for.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
17
Make a list of security concerns that are related to Internet access.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
18
Portable
technology can be used to access the Internet from remote locations where there are no cable, WiMAX, or cellular networks.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
19
Suppose that you decide to open a little Web store to sell handcrafted pottery. Your Web site will need a(n)
name.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
20
Make a checklist of steps you can take to secure your computer from Internet-based intrusions.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
21

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
22
Explain the differences between static IP addresses, dynamic IP addresses, private IP addresses, and domain names.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
23
TCP\
is the primary protocol suite used on the Internet.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
24
Instant messaging, chat, and VoIP are classified as
communications because both parties have to be online.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
25
You frequently use public Wi-Fi hotspots in cafes and other locations. To keep your passwords and other confidential data safe, you work with your employer to install a(n)
that encrypts the data you transmit over the Internet. (Hint: Use the acronym.)

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
26
204.127.129.1 is an example of an IPv4 address. True or false


Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
27
VoIP quality can be affected by
that results from too much packet latency.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
28
Describe the difference between Ping and Traceroute by giving an example of when each would be used.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)
name server maintains a database of IP addresses that correspond to addresses such as www.nike.com.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
30
On some sites,
FTP can be used to upload and download files even if you don't have an account on the FTP server.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
31
Suppose you have installed a cable modem on a standalone PC. To secure your computer, you should activate
software to filter packets entering and leaving your computer.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
32
If you ping Google from your computer and get a result of 46 ms, you have a relatively slow Internet connection. True or false


Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
33

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
34
List the advantages and disadvantages of dial-up, cable, DSL, satellite, and fixed wireless Internet services. List the Internet access methods in which upstream transmission rates differ from downstream rates.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
35
Most ISPs offer
Internet connections, meaning the downstream speed is faster than the upstream speed.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
36
Hackers use
scanning software to look for computers connected to the Internet that are vulnerable to intrusions.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
37
Your friend, a film student, has created a 20-minute short film that she wants to distribute to friends. The file is much too large to be an e-mail attachment and she doesn't have access to a(n)
server. You suggest that she try posting it at a(n)
P2P file sharing site where a swarm of computers can assist with the downloads.


Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
38
Dial-up and DSL Internet access use the telephone cables already installed in a home or business. True or false


Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
39

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
40
List the options for mobile and portable Internet access, and explain their strengths and weaknesses.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
41
Always-on connections are not a security risk because they use DOCSIS. True or false


Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
42
One of the best defenses against intrusions is to install a(n)
between your standalone computer or LAN and your Internet connection device.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
43
Your friend wants you to follow her tweets and asks if you have a(n)
account.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
44
The two requirements for cable Internet service are circuitry to handle
protocols and a cable modem.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
45
A(n)
IP address is a non-routable IP address that can be used within a LAN, but not for Internet data transport.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
46
Explain the advantages of mobile broadband services compared to WAP service.
Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
47
Satellite Internet service typically has a high
rate, which is unsuitable for some online gaming and Voice over IP.

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck
48
When using a public Wi-Fi hotspot, you can use a personal
to encrypt data that travels from your computer. (Hint: Use the acronym.)

Unlock Deck
Unlock for access to all 48 flashcards in this deck.
Unlock Deck
k this deck