CIT Exam 4

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A modem can also function as what other piece of hardware?

A router

What is a MAC address?

A unique hardware address for your device

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

T/F 4G and 5G networks provide slower data transmission speeds than 3G networks

False

T/F If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

T/F RFIDis a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Which of the following statements is true about public networks?

Many public networks are not secure.

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

What hardware is essential to creating a home Wi-Fi network?

Router

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

T/F Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

True

Which of the following is an authentication method to keep your data safe?

encryption

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

To access the Internet, a router must be connected to a _____.

modem

Devices on a _____ area network are connected via Bluetooth.

personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

the network most likely uses a firewall for protection


Kaugnay na mga set ng pag-aaral

Chapter 28: Management of Patients with Structural, Infectious and Inflammatory Cardiac Disorders: Part 3

View Set

Surgery (3) اسئلة الامتياز

View Set

Chapter 5: Devices and Infrastructure 5.9-5.13

View Set

Anatomy and Physiology Ch. 3 (Exam 1)

View Set

Chapter 12 Misc Commercial Policies

View Set

SOCIAL RESPONSIBILITY AND GOOD GOVERNANCE ChAPTER 1

View Set

Fin 314 chapter 17 concept questions

View Set

Hinkle 55: Management of Patients With Urinary Disorders

View Set

Артикли - Упражнения 5,6 - Перевод

View Set