Professional Documents
Culture Documents
2 INCORRECT Which of the following choices best describes the utility of Telnet?
6 INCORRECT What is the correct syntax for user mary to rlogin to host bert?
9 CORRECT Which of the following is not a mode of a standard graphical FTP client?
A)Auto
B)Binary
C)GIF
D)ASCII
Feedback: Correct!
A)Binary
B)ASCII
C)GIF
D)Plaintext
Feedback: This is not correct.
11 INCORRECT Which of the following is not a valid command to type in to the Unix ftp prompt?
A)?
B)get
C)put
D)pwt
Feedback: This is a valid command.
Which Unix ftp command is used to list the directory contents of the remote
12 CORRECT
machine?
A)lcd
B)cd
C)ls
D)dir
Feedback: Correct!
A)Encrypt information.
B)Reduce storage space required for a file.
C)Hide information.
D)Recode the file into binary.
Feedback: This is not correct.
14 INCORRECT Which of the following is not a commonly used file compression utility?
A)PKZIP
B)gzip
C)compress
D)shrinker
Feedback: This is.
16 INCORRECT Anonymous file transfer is best used for which of the following?
A)Distributing freeware.
B)Distributing email.
C)File compression.
D)Letting people get secretive documents without revealing their
identities.
Feedback: Anonymous FTP would not be used for secretive.
A)A program that when run is able to replicate itself and then embed itself
within another program.
B)A series of bits that are spread via phone lines.
C)A file that contains binary data.
D)A computer hacker who spams other users in an annoying fashion.
Feedback: This is not a definition of a virus.
Which of the following is not something you would do to protect yourself from
20 INCORRECT
viruses?
A)Run antivirus software.
B)Download software from unknown sources.
C)Avoid pirated copies of software.
D)Backup your files regularly.
Feedback: This is something you would do.
A)The user's e-mail address as the account name and the word guest as
the password.
B)The user's e-mail address as the account name and the word
anonymous as the password.
C)The word anonymous as the account name and the user's e-mail
address as the password.
D)The word anonymous as the account name and the user's system
password as the password.
Feedback: Correct!
Ways to copy a file from one computer to another include all but which of the
22 INCORRECT
following?
A)Archie.
B)E-mail the file as an attachment.
C)FTP.
D)Copy the file onto a diskette and then "walk" the diskette over to the
other computer.
Feedback: E-mail is a way to send a file.
A)UNIX viruses are rare because hackers are more interested in PCs and
Macs.
B)Backing up your files regularly will not help in the event of a virus since
the backed-up version will probably be infected as well.
C)Nearly all viruses are operating-system specific.
D)If infected by a virus, damage will occur immediately as it fills all
available space on your hard drive.
Feedback: This is false - sometimes damage from a virus occurs later,
after an event triggers the virus to become active.