Computer Fundamentals Module 8 - Networking - Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

Devices on a _____ area network are connected via Bluetooth.

personal

Why would you want to connect your computer to a network?

to access shared resources

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

4G and 5G networks provide slower data transmission speeds than 3G networks.

False

A router is a system of two or more devices linked by wires or cables.

False

Bandwidth is a term that describes the number of devices connected to a network.

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

When describing a client/server network, which of the following would be considered a client?

Laptop

Which of the following statements is true about public networks?

Many public networks are not secure.

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

What hardware is essential to creating a home Wi-Fi network?

Router

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

True

What type of network sends signals through airwaves and usually does not require cables?

Wireless network

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

A network administrator is usually not required on a _____ network.

peer-to-peer

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

Which of the following statements is NOT true about a local firewall?

It is also called a hardware firewall.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual private network

What is an ISP?

A telecommunications company that sells Internet access.

What is a MAC address?

A unique hardware address for your device

Which of the following is true about broadband connections?

Broadband connections are "always-on" connections.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol


Conjuntos de estudio relacionados

Chapter 26: The Child with a Cardiovascular Disorder

View Set

Balancing Employer and Employee Interests

View Set

Carbohydrates, sugars, starch, and fiber

View Set

Microbiology Chapter 3 questions

View Set