chapt 10 ite

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

An extranet might be used if a supplier needs to check a customer's inventory levels before deciding whether to ship additional product.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

Which of the following statements do opponents of net neutrality agree with?

The concept of net neutrality is that one website has the same value or priority as other websites, resulting in equal, unrestricted access to each site.

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

Which of the following would be considered a strong password?

Wbcm2!4!820!

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

When you connect to a public Wi-Fi network, be careful not to enter confidential information on websites or send personal data in an email message. Your smartphone or personal VPN are secure networks.

Home networks usually do what?

exist in a single structure and are easy to install and configure, provide home users with the following capabilities: Smart home devices such as thermostats, light switches, smart speakers, and personal assistants can connect to the Internet and apps on your smartphone

4G and 5G networks provide slower data transmission speeds than 3G networks.

false

Bandwidth is a term that describes the number of devices connected to a network.

false

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

false

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

false

Which of the following is an authentication method to keep your data safe?

fingerprint scanner

When describing a client/server network, which of the following would be considered a client?

laptop

A network administrator is usually not required on a _____ network.

peer to peer

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

true


Conjuntos de estudio relacionados

Quiz 5- Integrated Business Policy and Strategy

View Set

Earch Science 9th grade modules 1 and 2

View Set

HPE 171 Ch 1 assessing your health

View Set

Physical Health Quiz 1 (guercio)

View Set

Tar, archiving and compressing files

View Set