The Internet Database Environment What is Hypertext Transfer Protocol (HTTP)? The hardware/software protocol that limits access to company data The transfer protocol to transfer Web pages to a browser The database access protocol for SQL statements The protocol to copy files between computers The hardware/software protocol that limits access to company data The transfer protocol to transfer Web pages to a browser The database access protocol for SQL statements The protocol to copy files between computers ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment An intrusion detection system does not perform which of the following? Set up deception systems that attempt to trap hackers. Tries to identify attempts to hack into a computer system. May monitor packets passing over the network. May transmit message packets to the correct destination. Set up deception systems that attempt to trap hackers. Tries to identify attempts to hack into a computer system. May monitor packets passing over the network. May transmit message packets to the correct destination. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Most browsers support e-mail, instant messaging, bookmarking of Websites, and Website addressing and searching. True False True False ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Virus detection is a problem with encrypted messages, because the virus may not be detectable until the message is unencrypted. False True False True ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment Which of the following is true concerning the standard network protocol for connecting a client to a Web or database server via the Internet? Both TCP and IP are needed. TCP is not needed but IP is needed. Neither TCP and IP are needed. TCP is needed but IP is not needed. Both TCP and IP are needed. TCP is not needed but IP is needed. Neither TCP and IP are needed. TCP is needed but IP is not needed. ANSWER DOWNLOAD EXAMIANS APP
The Internet Database Environment A proxy server is used for which of the following? To process client requests for database access To process client requests for Web pages To provide TCP/IP To provide security against unauthorized users To process client requests for database access To process client requests for Web pages To provide TCP/IP To provide security against unauthorized users ANSWER DOWNLOAD EXAMIANS APP