ICT
Предмет
Тип работы
Факультет
Преподаватель
// Начало вопроса: ВопрМножВыбор
1.Which of the following is (are) true about computers?
\n I.They accept input.\
n II.They store data.
\n III.They produce output.{
// Начало вопроса: ВопрМножВыбор
2. A computer processes data in a device called the {
~server
~CPU
~device driver
~URL
}
3. A computer file is a named collection of data that exists on which of the following?
\n I.Optical disk (CD or DVD)
\n II.Floppy disk
\n III.Hard disk {
4. Computers that operate in essentially the same way are said to be {
~compatible
~compound
~user-friendly
~integrated
}
5. Which of the following can supply input to a computer?
\n I.A person
\n II.The environment
\n Another computer {
6. Software has two categories: operating system software and application software.{
Тут нет вариантов ответа, судя по логике будет True
}
7. Operating system software example:{
~Microsoft Word
~Unix
~Chrome
~Macromedia Dreamweaver
}
8. Computers perform all basic operations except:{
~Input data
~Process data
~Protect data
~Output data
}
9. Which of the following can supply input to a computer?
I. A person
II. The environment
III. Another computer{
10. The ASCII code for the character 'a' is 97. How can the character 'a' be represented in binary using ASCII codes?{
01100001
}
11. Which of the following represents the decimal number sequence 0, 1, 2, 3 in binary?{
~0000, 0001, 0010, 0100
~0001, 0010, 0011, 0100
~None of the above
~0000, 0001, 0010, 0011
}
12. Which of the following is the binary representation of decimal number 16?{
~1100
~1111
~1110
~None of the above
}
13. How many hexadecimal digits are needed to represent the decimal number 32?{
~1
~4
~8
~2
}
14. Which of the following is the binary representation of decimal number 23?{
~11000
~11110
~10111
~None of the above
}
15. All of them example of input devices except?{
~keyboard
~mouse
~printer
}
16. All of them example of output devices except?{
-_- net variantov
}
17. Digital computer breaks all types of information into tiny units and use numbers to represent those pieces of information{
~True
~False
}
18. An analog computer recognizes data as a continuous measurement of a physical property.{
~True
~False
}
19. Information is a collection of raw facts and figures. It may consist of numbers, characters, symbols or pictures etc.{
~True
~False
}
20. All of them are examples of hardware except:{
~CPU
~I/O
~Memory
~Mac OS
}
21. Information technology (IT) is the use of any computers, storage, networking and other physical devices, infrastructure and processes to create, process, store, secure and exchange all forms of electronic data.{
~True
~False
}
22. All of them are examples of storage devices on the computer except:{
~CD-ROM
~CD-RW
~Floppy disk
~Scanner
}
23. All of them are true about software except:{
Мұнда ештеңе жоқ
}
24. All electronic components in the system unit are connected to motherboard{
true
}
25. Storage Devices are used to store data permanently even when the computer is turned off{
Тут нет вариантов ответа, судя по логике будет True
}
26. Which of the following memory types holds data but requires very little power to retain its contents?{
CMOS memory
}
27. The list of instructions that a CPU can execute is known as its{
instruction set
}
28. CPU performance is influenced by which of the following?
\n I. Word size
\n II. Clock rate
\n III. Instruction set size{
29. What is an area in the computer system unit that temporarily holds data before and after it is processed until the computer is turned off?{
RAM
}
30. When a computer is turned on, the central processing unit performs instructions specified by the _____ that searches the disk drive for the main operating system files.{
ROM BIOS
}
31. Which of the following explains Latency?{
}
32. Which of the following is the primary function of a CPU?{
}
33. Where is a computer's CPU located?{
motherboard
}
34. A computer clock with a speed of 100 MHz cycles how many times per second?{
100.000.000
}
35. Which of the following components is (are) typically found on the motherboard of a computer?
\n I. Expansion slots
\n II. The microprocessor
\n III. The CMOS memory chip{
}
36. Consider Computer A, which uses a 1.2-GHz CPU, and Computer B, which uses a 1-GHz CPU. For any given program P, which of the following is true?{
It cannot be determined whether program P will run faster on computer A or on computer B without knowing more about program P.
}
37. Which of the following can be an advantage of buying a computer that contains a widely-used CPU or its equivalent clone?
\n I. A lot of established computer suppliers provide products using that type of CPU.
\n II. The cost of the CPU is likely to be lower because of the large quantities of the CPU that have been sold.
\n III. There will be more operating systems that work with that type of CPU.{
}
38. Which of the following kinds of projects typically requires a special type of CPU that would not be found in a desktop or mainframe computer?{
Monitoring the operation of an automobile engine
}
39. Which of the following is (are) true of modern microprocessors?
\n I. Microprocessor chips are typically the size of a deck of cards.
\n II. Microprocessors typically contain millions of transistors.{
}
40. Of the following types of storage, which provides the fastest access to data?{
RAM
}
41. The microprocessor in a multi-purpose computer is also known as the{
CPU
}
42. Components of the CPU typically include which of the following?
\n I. The control unit
\n II. The Level 1 cache memory
\n III. The Arithmetic/Logic Unit{
43. An Arithmetic/Logic Unit typically performs which of the following operations?
\n I. Retrieval of instructions from RAM
\n II. Performance of greater-than and less-than comparisons{
}
44. Of the following, which best describes what happens when a user opens a document for editing?{
45. Which of the following is (are) true of ROM?
\n I. ROM stores data until computer is turned off.
\n II. The instructions needed to boot a computer are typically stored in ROM.{
}
46. Which of the following types of memory typically holds computer configuration settings and is powered by a small battery?{
~ROM
~Cache
~Flash
~CMOS
}
47. Of the following types of memory, which is least expensive and is not located on the microprocessor?{
~ L1 Cache
~ L2 Cache
~ Register
~ DRAM
}
48. Which of the following is (are) true of a bus on the motherboard?
\n I.A bus is not critical to the overall performance of a computer system
\n II.A bus is used to transport data between components on the motherboard.
\n III.The CPU and other components use a bus to read and write data into RAM.{
49. Which of the following are important considerations when purchasing a monitor?
\n I.The number of resolution modes supported
\n II.The different levels of color depth supported
\n III.The size of the viewing area that can be projected{
~I and II only
~I and III only
~II and III only
~I, II, and III
}
50. Which of the following are true of Universal Serial Bus (USB)?
I.Many devices can potentially be interconnected using the USB.
II.It is used with many types of devices for transferring large amounts of data.
III.It supports existing serial- and parallel-port devices.{
~I and III only
~II and III only
~I, II, and III
~I and II only
}
51. Which of the following are primarily input devices?
I.Mouse II.Scanner III.Printer{
52. A monitor is primarily which kind of device?{
~An output device
~An input device
~A memory device
~A storage device
}
53. The speed of a computer bus is measured in _____, whereas the transfer rate is measured in _____.{
Hertz and BPS
54. Input devices for a computer include which of the following?
I.Digital cameras II.Scanners III.Speakers{
~I, II, and III
~I and III only
~III only
~I and II only
}
55. Computer output devices include which of the following?
\n I.Projector\
n II.Microphone
\n III.Printer{
}
56. Which of the following correctly represents the layers of software in a computer system (from lowest level to highest level of abstraction)? {
~BIOS, Operating System, Application, Runtime Library, User Interface, Application Program Interface
~Operating System, BIOS, Runtime Library, Application Program Interface, User Interface
~BIOS, Operating System, Application Program Interface, Runtime Library, Application, User Interface
~BIOS, User Interface, Operating System, Application, Runtime Library, Application Program Interface
}
57. Which of the following statements is true? {
~RAM is slower than ROM.
~CMOS stores configurations.
~Initially, when the computer is turned on, only the operating system can be found in the RAM.
~Private files are protected by the BIOS.
}
58. Which of the following best describes preemptive multitasking? {
Preemptive multitasking is task in which a computer operating system uses some criteria to decide how long to allocate to any one task before giving another task a turn to use the operating system.
}
59. Which of the following operations cause(s) a fault to occur? \
I. The hardware is asked to do something it cannot do.
II. The memory's error correction circuitry detects an uncorrectable error.
III. The program attempts to execute an illegal machine instruction. {
}
60. Encapsulation is:{
Encapsulation means that each layer needs only a limited amount of knowledge to do its job }
61. Hardware is: {
The physical components from which the computer system is constructed }
62. Application Program Interface (API):{
A set of routines, protocols, and tools for building software applications
}
63. User interface:{
Responsible for the communication between the application and the user
}
64. Which of the following deals directly with the signals that control each hardware component? {
BIOS
}
65. Operating systems can be classified into two categories: server operating system and desktop operating system.{
true
}
66. An E-Commerce system consists of the following components. Which of these same components must be included in a database?
\n I. The data, such as information about the goods available for sale, customers, orders placed, shipping information, etc
.\n II. A database must include a collection of programs that control the data, such as programs to create, maintain, and manipulate the data. These programs can be easily used to create, maintain, and manipulate data in other domains.
\n III. A database must include a collection of programs that operate on the data, but are specific to the E-commerce system. These programs enable users to browse through the store-items, place orders, track shipping, etc.{
67. Which of them is not true about data files? {
68. Cloud Computing refers to ... the applications online, except this action (select wrong answer){
Вот эти правильные- manipulating, configuring, and accessing
Потом выберете то чего тут нет
Ну вы поняли
}
69. Cloud Computing has those advantages except this (select wrong answer){
Вот эти правильные –Scalability, Virtualization, Lower Infrastructure Cost, Elasticity
Потом выберете то чего тут нет
Ну вы поняли
}
70. An E-Commerce system consists of the following components. Which of the same components must be included in a database management system?
I. The data, such as information about the goods available for sale, customers, orders placed, shipping information, etc.\
II.A collection of programs must be included that control the data, such as programs to create, maintain, and manipulate the data. These programs can be easily used to create, maintain, and manipulate data in other domains, such as in a library information system
III.A collection of programs that operate on the data, but are specific to the E-commerce system. These programs enable users to browse through the store-items, place orders, track shipping, etc.{
71. An E-Commerce system consists of the following components. Which of these same components will constitute a database system?
\n I. The data, such as information about the goods available for sale, customers, orders placed, shipping information, etc.
\n II.A collection of programs that control the data, such as programs to create, maintain, and manipulate the data constitutes a database system. These programs can be easily used to create, maintain, and manipulate data in other domains such as in a library information system.
\n III.A collection of programs that operate on the data, but are specific to the E-commerce system, constitutes a database system. These programs enable users to browse through the store-items, place orders, track shipping, etc.{
}
72. The foreign key in a table T1_____ the same _____ as the corresponding primary key in table T2.
I. must have, name
II. need to have, name
III. must have, id number{
}
73. A software system that enables users to define the data, maintain it and control its access is called?
Database management system
74. Which of them is not component of the database system? {
~ An application specific database
~ A DBMS that maintains this database
~ Application Software that manipulates the database
~ Application programmers
}
75. Which of them is not type of the DBMS? {
~ Oracle
~ Microsoft Access
~ MySQL
~ Web Application
}
76. The standard data model for modern databases is the relational in the table form. {
true
}
77. A primary key, also called a primary keyword, is a key in a relational database that is unique for each record. {
true
78. DBMS uses Structured Query Language(SQL) for data manipulation. {
true
}
79. Database is a shared collection of logically related data and a self-describing collection of integrated records. {
true
80. There are two ways to store data: data files, in database; {
81. The generic term node or host refers to {
~ device on a network
~ network connection
~ the speed with which data is moved
~ physical wires or cables
}
82. Which of them is used to translate hostnames into numeric IP addresses {
~ TCP
~ DNS
~ IP
~ UDP
}
83. Which of them provides reliable connection? {
TCP
}
84. Data confidentiality is {
~ data is not altered unintentionally
~ data access is restricted to authorized personnel
~ services that enable data access are operational
~ malicious programs disabling the system
}
85. Brute force: {
~ matching every word in the dictionary against the password
~ trying all different alphanumeric combinations
~ captures data packets as they are transmitted through the network
~ refers to the action of tricking people into providing information needed to gain access to systems
}
86. Social engineering: {
~ trying all different alphanumeric combinations
~ matching every word in the dictionary against the password
~ refers to the action of tricking people into providing information needed to gain access to systems
~ captures data packets as they are transmitted through the network
}
87. Packet sniffing: {
~ captures data packets as they are transmitted through the network
~ trying all different alphanumeric combinations
~ matching every word in the dictionary against the password
~ refers to the action of tricking people into providing information needed to gain access to systems
}
88. IP spoofing: {
~ to detect security weaknesses in a remote or local host
~ is a technique used to gain unauthorized access to computers, whereby the intruder sends messages to a computer with an IP address indicating that the message is coming from a trusted host
~ where an attacker fakes an email header to make it appear as if it came from somewhere or someone other than the actual source
~ refers to the action of tricking people into providing information needed to gain access to systems
}
89. Virus: {
~ attaches itself to a file or software application
~ is a program that appears to be performing one task while executing a malicious task in the background
~ is malicious software that can execute itself on a vulnerable remote machine
~ penetrate computer systems more easily because they do not need a user to execute them
}
90. Worm: {
~ the objective of the attacker is to exhaust system resources
~ attaches itself to a file or software application, and then replicates itself on the host computer
~ horse is a program that appears to be performing one task while executing a malicious task in the background
~ penetrate computer systems more easily because they do not need a user to execute them
}
91. Encryption: {
~ a message to be encrypted
~ is the process of transforming encrypted information so that it is intelligible to the intended recipient.
~ is the process of transforming information so it is unintelligible to eavesdroppers.
~ the encrypted version of the text
}
92. Decryption: {
~ is the process of transforming information so it is unintelligible to eavesdroppers.
~ is the process of transforming encrypted information so that it is intelligible to the intended recipient
~ A message to be encrypted
~ The encrypted version of the message
}
93. Peer to Peer Network {
~ Each workstation has equivalent capabilities and responsibilities
~ Usually requires a Modem
~ the most common type is called Ethernet
~ have been developed in and around large cities
}
94. Star Topology {
~ Each device is connected directly to two other devices, one on either side of it.
~ All devices are connected to a central hub
~ All devices are connected to one another in the shape of a closed loop.
~ There are terminators at each end of the bus that stops the signal and keeps it from traveling backwards.
}
95. Which of them is not true about Firewalls {
~ A firewall is a software that can be loaded on to a network that can serve as a barrier that keeps destructive forces away from a network of computers
~ Packets of data are analyzed against a set of criteria or standards called filters.
~ Filters block certain designated IP addresses.
~ Provides other companies or individuals with access to the Internet
}
96. A digital subscriber line {
~ converts computer data into an analog audio signal for transfer over a telephone line, and then a modem at the destination converts it back again into data
~ uses the same line that your cable TV signals come in on to transfer the data back and forth
~ uses regular copper phone lines to transfer digital data to and from the phone company's central office
~ wireless connection
}
97. Which of the following services use TCP?
\n a. DHCP\n b. SMTP c. HTTP\n d. TFTP\n e. FTP {
98. Using Substitution encryption encrypt following:\n plaintext: GAR \n encryption key: shift right by two character {
99. Hostname is an unique identification that specifies a particular computer on the Internet {
100. Network software translates a hostname into its corresponding IP address
For example: 205.39.145.18 {
False
101. File server a computer that stores and manages files for multiple users on a network {
True
}
102. In a denial of service (DoS) attack, the objective of the attacker is to exhaust system resources such as network connectivity and network bandwidth to prevent legitimate traffic from being transmitted and processed.{
True
103. A Trojan horse is a program that appears to be performing one task while executing a malicious task in the background. {
False
104. Web server a computer dedicated to responding to requests (from the browser client) for web pages {
True
105. To improve the efficiency of transferring information over a shared communication line, messages are divided into fixed-sized, numbered packets {
True
106.Network Service Provider (NSP):{
~ maintains a series of communication links for internet data.
~ carry internet data from an inter-linked communications network.
~ is a standard set of communication rules used by every computer that connects to the internet.
~ is a major internet communication links.
107. Server is: {
~ Any computer on the network that requests services from another computer on the network
~ Any computer that receives requests from client computers, processes and sends the output
~ Any page that is hosted on the Internet
~ The process of creating, modifying web pages
108. Web Page is:{
~ The process of creating, modifying web pages
~ Any computer on the network that requests services from another computer on the network
~ Any computer that receives requests from client computers, processes and sends the output
~ Any page that is hosted on the Internet
109. Web Development is:{
~ The process of creating, modifying web pages
~ Any computer that receives requests from client computers, processes and sends the output
~ Any computer on the network that requests services from another computer on the network
~ Any page that is hosted on the Internet
}
110. Which of them is not true about WEB server ? {
~ used to host the web sites
~ used to retrieve web sites
~ used to monitor access
~ used to control logging
}
111. The web information is stored in the Web pages {
~ In HTML format
~ In the Web server file system
~ In XML format
~ In HTTP form
}
112. Which of the following is not true about HTTP ? {
}
113. Client-side scripting{ javascript
}
114. TCP/IP (Transport control Protocol/Internet Protocol): {
}
115. Server side code { HTTP
}
116. Which of them is the server-side language? { HTTP
}
117. Which of them is the client-side language? { HTML, CSS, and JavaScript
}
118. Define the attribute name: align\~ "right"; {
}
119. Cables, wires and satellites {
}
120. Web browser {
}
121. HTTP { HyperText Transport Protocol
}
122. Client is { A client is a piece of computer hardware or software that accesses a service made available by a server.
}
123. HTML is the standardized markup language that structures and formats content on the web. Page elements like the titles, headings, text and links are included. { true
}
124.. CSS allows a programmer to define the look and format of multiple webpages at once; elements like color, layout and fonts are specified in one file that(tm)s kept separate from the core code of the webpage. { true
}
125. JavaScript is the programming language that brings animation, games, apps, interactivity and other dynamic effects to life.{ true
}
126. Client-side scripting simply refers to any code that facilitates the transfer of data from that web server to a browser. It also refers to any code used to build a database or manage data on the web server itself.{ true
}
127. Server-side scripts run on the web server, which has the power and resources to run programs that are too resource intensive to be run by a web browser.{ true
}
128. The first part of the URL address indicates what protocol to use, and the second part specifies the IP address or the domain name where the resource is located.{ true
}
129. The Internet is a collection of documents that are interconnected by hyper-links. { true
}
130. The Web is a collection of computers or networking devices connected together. { true
}
131. Which of the following correctly represents the layers of software in a computer system (from lowest level to highest level of abstraction)? {
132. Which of the following E-Commerce types refers to the consumers make known a particular need for a product or service, and suppliers compete to provide the product or service to consumers? {
Consumers-to-businesses (C2B)
133. Which of the following statements is true? {
134. Which of the following best describes preemptive multitasking? {
135. What does ECDL stand for? { European Computer Driving Licence
136. Which of the following operations cause(s) a fault to occur?
I. The hardware is asked to do something it cannot do.
II. The memory's error correction circuitry detects an uncorrectable error.
III. The program attempts to execute an illegal machine instruction. {
137. Encapsulation is: { Encapsulation means that each layer needs only a limited amount of knowledge to do its job
138. Hardware: { The physical components from which the computer system is constructed
139. Application Program Interface (API): { A set of routines, protocols, and tools for building software applications
140. User interface:{ Responsible for the communication between the application and the user
141. Which of the following deals directly with the signals that control each hardware component? {
BIOS
142. Operating systems can be classified into two categories\\: server operating system and desktop operating system.{
True
143. Moodle stands for ...{ Moodle is a user-friendly open source and free application that is designed to help educators create online courses with opportunities for rich interaction and collaboration.
144. Electronic Retailing (E-Tailing) is? {
145. EFT (Electronic Funds Transfer) is?{
146. EDI (Electronic Data Interchange) is?{
147. How many forms does E-Learning have? {
148. Similar to face-to-face experience but on a massive global scale refers to which feature of E-Commerce? { Interactivity
}
149. Choose the feature of E-Commerce? { 1Ubiquity 2Global 3Reach Universal 4Standards 5Richness Interactivity 6Information Density 7Customization
Чо нибудь из этого будет
150. Which of them is not type of Synchronous e-learning? {
}
151. Which of them belongs to Asynchronous e-learning? {
}
152. Which of them is not characteristics of E-Learning? {
}
153. Which of them is not advantages of e-commerce? {
Вот это advantages: Able to conduct business 24 x 7 x 365
Access the global marketplace
Speed
Opportunity to reduce cost
Platform independent
Customer self service
Large purchase per transaction
People can shop in different ways
Large catalogs
Improved customer relation
}
154. To which type of E-Governance online training and online conference belong? {
Government 2 employee
}
155. Student directed learning refers to the ... type of E-Learning {
}
156. E-Commerce is? {
}
157. Electronic Retailing (E-Tailing) is? {
}
158. A website that is dedicated to exchange of information, goods and services to other business rather than final consumers. { Business-to-Business(B-to-B) site
159. A website where all transactions take place between a business house and the final consumer {
Business-to-Customer(B-to-C) site
}
160. A website where all the transactions take place between a consumer and the website acting as a platform that brings the buyer and the seller together. {
Consumer-to-consumer (C2C
}
161. E-learning is a wide set of applications and processes which use all available electronic media to deliver vocational education and training more flexibly. {
True
}
162. Asynchronous e-learning is student directed, self-paced learning. {
True
}
163. Mission of European Computer Driving License (ECDL)В is to enable proficient use of ICT that empowers individuals, organizations and society, through the development, promotion and delivery of quality certification programs throughout the world.{
True
}
164. Open university is a private learning and research university. {
}
165. Electronic Document Signature (EDS) is dataВ in electronic form, which is logically associated with other data in electronic form and which is used by the signatory to sign. {
True
}
166. // Начало вопроса: ВопрМножВыбор
Google Docs is a type of cloud computing {
True
}
167.// Начало вопроса: ВопрМножВыбор
Which one of these is not a cloud computing pricing model {
Ladder
}
.
168.// Начало вопроса: ВопрМножВыбор
Which of these is not a major type of cloud computing usage {
· Hardware as a service√
}
169.// Начало вопроса: ВопрМножВыбор
An Internet connection is necessary for cloud computing interaction {
True
}
170.// Начало вопроса: ВопрМножВыбор
"Cloud" in cloud computing represents what {
Internet
}
171.// Начало вопроса: ВопрМножВыбор
Which of these should a company consider before implementing cloud computing technology. \n I: Employee satisfaction, \n II: Potential cost reduction, \n III: Information sensitivity {
All the above
}
172.// Начало вопроса: ВопрМножВыбор
What exactly is cloud computing {
}
173.// Начало вопроса: ВопрМножВыбор
What widely used service is built on cloud-computing technology? \n I: Twitter, \n II: Skype, \n III: Gmail, \n IV: YouTube. {
Gmail
}
174.// Начало вопроса: ВопрМножВыбор
Cloud computing embraces many concepts that were previously touted as the next big thing in information technology. Which of these is not an antecedent of the cloud? {
· Desktop computing√
}
175.// Начало вопроса: ВопрМножВыбор
What does SQL stand for {
Structured Query Language
}
176.// Начало вопроса: ВопрМножВыбор
Which SQL statement is used to extract data from a database? {
Select
}
177.// Начало вопроса: ВопрМножВыбор
Computerized representations of models and attributes of real or simulated entities are? {
Data
}
178.// Начало вопроса: ВопрМножВыбор
Representation of the results of a computational process, such as statistical analysis, or the transcripts of some meanings assigned by human beings is {
Information
}
179.// Начало вопроса: ВопрМножВыбор
Representation of the results of a computer-simulated cognitive process, such as perception, learning, association, and reasoning is {
Knowledge
}
180.// Начало вопроса: ВопрМножВыбор
Continuous representation, similar to the actual information it represents is {
Analog data
}
181.// Начало вопроса: ВопрМножВыбор
A discrete representation, breaking the information up into separate(discrete) elements is {
Digital Data
}
182// Начало вопроса: ВопрМножВыбор
Two bits can represent {
Two things
}
183.// Начало вопроса: ВопрМножВыбор
The extended version of the ASCII character set is not enough for international use {
True
}
184.// Начало вопроса: ВопрМножВыбор
The Unicode character set uses _________ per character {
16 bits
}
185.// Начало вопроса: ВопрМножВыбор
The first 256 characters in the Unicode character set correspond exactly to the extended ASCII character set {
True
}
186.// Начало вопроса: ВопрМножВыбор
List the levels of computer systems from top to down {
· users, application software, operating system software, and the hardware system
}
187.// Начало вопроса: ВопрМножВыбор
List the levels of computer systems from bottom to up {
· hardware system, operating system software, application software, and users
}
188.// Начало вопроса: ВопрМножВыбор
What is the name of the Internet protocol used to make sure messages are reliably transmitted and received by the destination computer? {
TCP
}
189.// Начало вопроса: ВопрМножВыбор
The World Wide Web is {
WWW is a component of the internet that provides access to large amount of information located on many different servers.
}
190.// Начало вопроса: ВопрМножВыбор
When a fully explicit URL such as http://www.iitu.kz is provided to an Internet browser, "http" refers to the name of the {
· protocol used to perform the operation
191.// Начало вопроса: ВопрМножВыбор
IP host addresses on the Internet are composed of which of the following? {
· Four decimal numbers ranging from 0 to 255
}
192.// Начало вопроса: ВопрМножВыбор
After gaining access to a computer system, hackers will typically do which of the following? \n I.Set up control for further attacks \n II.Take, alter, or delete data \n III.Use the computer system resources {
· I, II, and III √
}
193.// Начало вопроса: ВопрМножВыбор
Which of the following is (are) true regarding network bandwidth attacks? \n I.They can be used to launch a denial of service attack. \n II.They can cause a Web site to become unavailable. \n III.They work by flooding a network with traffic. {
III.They work by flooding a network with traffic.
}
194.// Начало вопроса: ВопрМножВыбор
Which of the following computer attacks is spoofing? {
· Using one computer to impersonate another
}
195.// Начало вопроса: ВопрМножВыбор
The method of cracking a password by trying all possible alphanumeric combinations is known as a _____ attack {
Brute Force attack
}
196.// Начало вопроса: ВопрМножВыбор
After loading a word processor document from a floppy, a user's computer begins to show symptoms of being infected by a virus. Which of the following is true concerning this situation? {
}
197.// Начало вопроса: ВопрМножВыбор
Which of the following is email spoofing? {
· Using one computer to impersonate another
}
198.// Начало вопроса: ВопрМножВыбор
Which of the following is (are) true regarding a Smurf attack? \n I.It can use the ping command to perform the attack.\n II.It allows a hacker to steal data from a computer.\n III.It uses other computers on a network to attack a single computer {
· I and III only √
}
199.// Начало вопроса: ВопрМножВыбор
Which of the following consequences of executing a virus on a PC is (are) possible? \n I.Files appear to be missing or deleted from the hard disk. \n II.Either the PC system board or a disk drive is physically damaged. \n III.There is low computer memory on disks. {
n · I and III only √
}
200// Начало вопроса: ВопрМножВыбор
Which of the following is (are) true regarding computer security attacks? \n I.Hackers can cause home computers to attack other computers. \n II.Organizations typically experience more computer security breaches from internal personnel than from people external to the organization. {
· I and II √
}
202.// Начало вопроса: ВопрМножВыбор
Which of the following can be used to prevent social engineering attacks? \n I.Verifying identities of people requesting sensitive information \n II.Using data encryption \n III.Being aware of computer fraud schemes {
· I and III only √
}
203.// Начало вопроса: ВопрМножВыбор
Which of the following is (are) true about encryption of data? \n I.Given the high speed and low cost CPUs available, even the most complex encrypted data is not entirely safe for a long period of time. \n II.The more bits in the key of the encryption algorithm, the harder it is to break the encryption. \n III.In public key encryption, the sender and the receiver of encrypted data both use the same key value to encrypt and decrypt the data. {
· I and II only √
}
204.// Начало вопроса: ВопрМножВыбор
How does a receiver of an encrypted message verify that the message originated from the sender? {
· The receiver compares the message hashed with the decrypted signature of the sender.
}
205.// Начало вопроса: ВопрМножВыбор
To encrypt a message using public-key encryption scheme, which of the following must be done? {
· Encrypt the message using the receiver's private key.
}
206.// Начало вопроса: ВопрМножВыбор
Which of the following must be included on a digital certificate? \n I.The name of the entity and the expiration date \n II.The number of times the certificate has been viewed \n III.The digital signature of the certificate authority {
· I, and III √
}
207.// Начало вопроса: ВопрМножВыбор
Encryption is used to {
· protect privacy by encoding data √
}
208.// Начало вопроса: ВопрМножВыбор
Of the following processes, which best characterizes the authentication process? {
· Establishing a user identity
}
209.// Начало вопроса: ВопрМножВыбор
Which of the following is (are) true regarding computer network intrusion detection systems? \n I.They compare traffic against a database of known attack signatures.\n II. They can generate false alarms. {
· I and II√
}
210.// Начало вопроса: ВопрМножВыбор
The security of data can be violated through which of the following? I.Malicious acts \n II.User errors \n III.Disasters {
· I, II, and III √
}
211.// Начало вопроса: ВопрМножВыбор
Which of the following is (are) true regarding computer security? \n I.Applying all available security measures may negatively impact system usability. \n II.Most intrusions result from exploitation of known vulnerabilities that remain unpatched. {
· I and II √
}
212.// Начало вопроса: ВопрМножВыбор
Good computer security practices include which of the following? \n I.Never shop online. \n II.Remove excess RAM from computers. \n III.Avoid sending email at night. {
· None √
}
213.// Начало вопроса: ВопрМножВыбор
Examples of network monitoring tools include which of the following? \n I.Packet sniffers \n II.Antivirus software \n III.Security patches {
· I only √
}
214.// Начало вопроса: ВопрМножВыбор
Which of the following is (are) true of anti-virus software?\n I. Typically, it scans both files and memory. \n II. It is ineffective unless it is updated frequently. \n III. It protects against network bandwidth attacks. {
· I and II only √
}
215.// Начало вопроса: ВопрМножВыбор
Which of the following is (are) important to ensuring computer security? \n I.Keep applications and operating system updated with the latest security patches. \n II.Replace motherboard batteries regularly. \n III.Use firewalls {
· I and III only √
}
216.// Начало вопроса: ВопрМножВыбор
Which of the following statements is (are) true about smart cards?\n I.They are vulnerable to Internet attacks.\n II.They can encrypt data. {
· II only √
}
217.// Начало вопроса: ВопрМножВыбор
Which of the following is correct with respect to customers providing highly personal information across the Internet through electronic commerce transactions? {
· Transactions are relatively secure between the consumer and a company's Web site if the data is encrypted. √
}
218.// Начало вопроса: ВопрМножВыбор
Which of the following comparisons between public-key encryption schemes and private-key encryption schemes is true? {
· Public-key encryption schemes involve more computations than private-key encryption schemes. √
}