TEST 2 Flashcards

(10 cards)

1
Q

Which layer of the OSI model is responsible for encoding and decoding data?

A. Application Layer
B. Presentation Layer
C. Session Layer
D. Transport Layer

A

PRESENTATION LAYER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of network connects systems over a large geographical area?

A. Local Area Network (LAN)
B. Wide Area Network (WAN)
C. Metropolitan Area Network (MAN)
D. Personal Area Network (PAN)

A

WIDE AREA NETWORK

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which device connects two or more networks and manages data packet
transfer?

A. Switch
B. Hub
C. Router
D. Firewall

A

ROUTER

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the primary purpose of Network Address Translation (NAT)?

A. To increase data transmission speed
B. To provide encryption for data
C. To allow multiple devices to share a single public IP
D. To control access to network resources

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following is NOT a common type of Denial-of-service (DoS) attack?

A. SYN Flood
B. ICMP Ping Flood
C. Wi-Fi Spoofing
D. UDP Flood

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which act was established to prevent computer fraud and abuse?
A. HIPAA
B. CFAA
C. DMCA
D. FOIA

A

B

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the primary purpose of the HIPAA Act?
A. Protect national security
B. Prevent software piracy
C. Safeguard health information privacy
D. Regulate online transactions

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following is NOT considered intellectual property?
A. Patent
B. Copyright
C. Public Domain
D. Trade Secret

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following are the viruses that target the software startup function?
A. File infector
B. Data infector
C. System infector
D. Master Boot Record

A

D

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which captures keystroke or user entries and then forward to attackers and they
can enable them to logon information?
A. Home Page Hijacking
B. Hoaxes and Myths
C. Keystroke Logger
D. Web Page Defacement

A

C

How well did you know this?
1
Not at all
2
3
4
5
Perfectly