Networking quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is an ISP?

A telecommunications company that sells Internet access.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/ 9 meters

Bluetooth

Which of the following is an authentication method to keep your data safe

Fingerprint scanner

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Which of the following statements is true about public networks

Many public networks are not secure.

What internal device does a computer use to connect to a wired or a wireless network

Network Interface Card

Computer communicating on a network must follow a ___, a common set of rules for exchanging information.

Protocol

What hardware is essential to creating a home WiFi network

Router

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this

She has a home network with smart home devices.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information

Social engineering

In a _____network each device on the network is attached to a central server. If the server fails, then the other device will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another

They provide a central point for cables in a network.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual Private Network

Which of the following would be considered a strong password ?

Wbcm2!4!820!

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

To access the internet, a router must be connected to a

modem

Devices on a _____ area network are connected via Bluetooth.

personal


Conjuntos de estudio relacionados

Cell Biology Exam 2 (Intracellular Membrane Traffic)

View Set

Smooth Endoplasmic Reticulum (Smooth ER/SER)

View Set

Usage 3: Pronoun-Antecedent Agreement

View Set

MGMT Ch.6 Quiz Org. Structure& Design

View Set

Clinical Interview Quiz Questions

View Set

Business Income or Loss (Tax course)

View Set