CIS 207T Week 3 WileyPLUS Weekly Exam

0 items
CIS 207T Week 3 WileyPLUS Weekly Exam
CIS 207T Week 3 WileyPLUS Weekly Exam
$20.00
  • Description

CIS 207T Week 3 WileyPLUS Weekly Exam

For this activity, you will take a graded exam. You should complete this exam after you have completed all of the other materials and activities for this week.

Complete this graded exam by doing the following:

1. Click the link to begin the graded exam.

2. Read the exam policies carefully.

3. Click the Next button to begin the exam.

4. Read each question carefully. Then, answer the question and click the Submit Answer button to submit each answer for grading.

Question 1

Place the different types of computer networks in size order, ranging from smallest to largest.

PAN-MAN-WAN-LAN

PAN-MAN-LAN-WAN

LAN-PAN-MAN-WAN

PAN-LAN-MAN-WAN

Question 2

__________ are high speed central networks to which multiple smaller networks connect

Network servers

Local area networks

Routers

Corporate backbone networks

Question 3

Watch the following video and answer the question below.

Networks enable organizations to meet rapidly changing business conditions.

True

False

Question 4

Watch the following video and answer the question below.

A network that connects computing devices within the same building is

LAN.

WAN.

enterprise network.

Question 5

Watch the following video and answer the question below.

A high-speed network that connects a firm’s LANs and WANS is

backbone network.

LAN.

WAN.

Question 6

The following can be considered as broadband technologies (choose all that are correct):

DSL

Dial-up

Cable

All of these

Question 7

A collection of the following devices — two desktop computers, three laptops, two smart phones and a printer — can be described as a(n):

LAN.

Network server.

WAN.

All of these

Question 8

A legacy IT system can be easily transferred to cloud computing.

True

False

Question 9

Least privilege is a concept associated with ___________________.

Legacy IT systems

Security

Reliability

Privacy

Question 10

Safe harbors address the concerns associated with __________.

Criminal use of cloud computing

Reliability of cloud computing services

Legacy IT systems

The regulatory and legal environment

Question 11

Anonymity on the internet enhances the problems associated with _______.

Criminal use of cloud computing

Legacy IT systems

Reliability of cloud computing services

The regulatory and legal environment

Question 12

Web services are applications delivered over ______________ that MIS professionals can select and combine through almost any device.

an intranet

the internet

the telephone

an extranet

Question 13

A collection of web services constitutes a ___________.

service-oriented architecture

Software-as-a-Service package

service-level package

self-service architecture

Question 14

Which of the following is NOT a web service protocol?

EDI

SOAP

XML

UDDI

Question 15

_______ describes how data should look on a web site; ______ describes data being exchanged between business partners.

EDI; HTML

HTML; XML

EDI; XML

XML; HTML

Question 16

__________ is a set of rules that define how messages can be exchanged among different network systems and applications through the use of XML.

WSDL

SOAP

UDDI

HTML

Question 17

__________ is used to create the XML document that describes the tasks performed by the various web services.

SOAP

WSDL

HTML

UDDI

Question 18

_________ is a registry for searching web services.

SOAP

WSDL

UDDI

XML

Question 19

Utility computing service providers charge a flat rate for the computer services they provide.

True

False

Question 20

The US-China Safe Harbor is a streamlined process for US companies to comply with the Chinese directive on the protection of personal data.

True

False

Question 21

PCI compliance addresses reliability issues in cloud computing.

True

False

Question 22

HTML and XML are both used to design web pages.

True

False

Question 23

The traditional IT department

owns their hardware, software and networks

stores all their data off-premise

spends very little on IT infrastructure

none of these

Question 24

In cloud computing, multiple virtual servers can be created on a single physical server.

True

False

Question 25

All of the following are cloud computing security issues except

sensitive data access

privacy

users technical ability

malicious insiders