ECE-6200 - Electronics 1: Electronic Devices and Circuits oed answer key

Showing 141 to 160 of 169 total answers.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

Fill in the blank. _________ is a group of compromised or hacked computers (bots) controlled by an individual with malicious intent.

Answer

botnet

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

How can users working on a shared computer keep their personal browsing history hidden from other workers that may use this computer?

Answer

Operate the web browser in private browser mode

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

The circuit wherein the during the negative alternation of the ac input voltage, the diode is reverse-biased and there is no current.

Answer

Full-wave rectifier

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

Answer

Snort

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

Which protocol is used by the Cisco Cyber threat Defense Solution to collect information about the traffic that is traversing the network?

Answer

NetFlow

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

A special purpose diode uses graded doping where the doping level of the semiconductive materials is reduced as the pn junction is approached.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

A mode wherein either one signal is applied to an input with the other input grounded or two opposite-polarity signals are applied to the inputs.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

A user is surfing the Internet using a laptop from a public WiFi cafe. What should be checked first when the user connects to the public network?

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

The bias wherein the negative side of external voltage is connected to the n region of the diode and its positive side is connected to the p region.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

The bias wherein the positive side is connected to the p region and the negative side of external voltage is connected to the n region of the diode.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

The bias wherein the positive side of external voltage is connected to the n region of the diode and its negative side is connected to the p region.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

The connection wherein the negative terminal of the source is connected to the anode side of the circuit and the positive terminal is connected to the cathode side.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

A type of input signal mode wherein either one signal is applied to an input with the other input grounded or two opposite-polarity signals are applied to the inputs.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

Refer to the exhibit. Rearrange the letters to fill in the blank The behavior-based analysis involves using baseline information to detect _______that could indicate an attack.

#ECE-6200
Awesome StudentQuestion • Electronics 1: Electronic Devices and Circuits

It is used as a dc-controlled microwave switch operated by rapid changes in bias or as a modulating device that takes advantage of the variable forward-resistance characteristic.

Page 8 of 9