Fundamentals of IT

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

It defines protocols for the new standard to provide Quality of Service, QoS for 802.11 Wi-Fi applications

What does the Institute of Electrical and Electronics Engineers (IEEE) 802.11e standard define?

It defines the new cryptographic ciphers.

What does the Institute of Electrical and Electronics Engineers (IEEE) 802.11i standard define?

It requires the use of a public key infrastructure (PKI).

What is a characteristic of Layer 2 Tunneling Protocol (L2TP)?

A keyboard

What is an example of an input device?

A printer

What is an example of an output device?

It is the smallest of the non-portable personal computers

What is the characteristic of a small form factor (SFF) computer?

It only concerns itself with sending and receiving "Bits".

What is the characteristic of the Physical Layer of the Open Systems Interconnect (OSI) Reference Model?

Infrastructure Mode has an Access Point (AP) that coordinates all communication, whereas Ad-Hoc topology has no coordinating device.

What is the difference between Infrastructure mode and Ad-hoc topology in wireless network topologies?

It is responsible for character code translation.

What is the function of the Presentation layer in the Open Systems Interconnect (OSI) Reference Model?

It requires an enormous amount of cabling.

What is the main reason why a Mesh topology was very rarely used in a Local Area Network environment?

They have more expansion room than a small form factor (SFF) personal compute

What is the similarity between a minitower personal computer (PC) and a midtower personal computer (PC)?

In a CAN, the interconnecting hardware is typically owned by the same entity as the Local Area Network (LAN) hardware it services.

What is true of a Campus Area Network (CAN)?

They are separate pieces of equipment for desktop computers.

What is true of computer peripherals?

They act as a filter providing authorized access and denying unauthorized access.

What is true of firewalls?

Supernetting is the process of combining several sub networks, which have a common Classless Inter-

What is true of supernetting?

It is responsible for message segmentation.

What is true of the Transport Layer of the Open Systems Interconnect (OSI) Reference Model?

It increases the competition for bandwidth.

What problem arises when too many computers attempt to communicate on one network?

supernetting

What process is used to treat several consecutive networks as if they were all one?

Point to Point Tunneling Protocol (PPTP)

What type of Virtual Private Network (VPN) tunnel does NOT provide data integrity or data origin authentication?

Servers

What type of computers have redundancy, multiple drives, large amounts of memory, and multiple processors as their common features?

WEP

What type of wireless network security is shown to be easily broken and uses a fixed pre-shared key for encoding data?

A workstation

Which category of computer is a high performance version of the Personal Computer (PC)?

router

Which device receives a message from one network, builds a new message with the same data, and sends that message to another network?

A Switch

Which device replaced a hub in a Star topology in later deployments?

The Session Layer

Which layer of the Open Systems Interconnect (OSI) Reference Model is the last layer that is responsible for end-to-end communication?

The Mesh topology

Which network topology has every computer system directly connected to every other computer system via a dedicated cable?

A monitor

Which of the following is a peripheral?

The motherboard

Which part of a personal computer (PC) contains the processor, the RAM, and the expansion devices?

The principle of least privilege

Which principle of network security suggests that if all processes ran with the smallest set of privileges needed to perform the user's tasks, it would be more difficult for malicious software to infect a machine and propagate to other machines?

A Metropolitan Area Network (MAN)

Which type of network can be described as a localized Wide Area Network (WAN)?

Local Area Network (LANs)

Which type of networks is the smallest by definition?

To add peripherals and communication devices to the computer

Why are expansion cards used in a computer?

) Due to the limited number of unique Network IDs

Why are subnetting and supernetting needed?

Will only send a message to the device that needs or requests it, rather than broadcasting the same message out of each of its ports

Why is a Switch used in a network?

WEP

Ahmed's Internet security key was easily hacked. He had used a fixed pre-shared key to access the Internet. What type of security key did Ahmed most likely use?

A Mesh topology

An Independent Basic Service Set (IBSS) topology is most likely to resemble which type of topology?

A denial of service attack

BestBuy Corp. is an online retailer. An angry employee at BestBuy crashes the company's website by causing damage to the server. This blocks the website access to the customers causing a huge loss to BestBuy. In this scenario, what type of security issue is indicated?

By connecting the ends of a common Bus topology with transceivers

How can one create a Ring topology?

By exploiting the credulity of the staff

How do social engineering hackers try to gain unauthorized access to the computer systems?

In a CAN, the interconnecting services are typically owned by the same entity and the connected devices, whereas in a MAN, the interconnecting services are typically not owned by the same entity and the connected devices.

How does a Campus Area Network (CAN) differ from a Metropolitan Area Network (MAN)?

A breach of Confidentiality

In the context of network security, what causes an unauthorized disclosure of privileged information?

) The Network layer

In which layer of the Open Systems Interconnect (OSI) Reference Model is subnetting and routing accomplished?

The Data Link layer

In which layer of the Open Systems Interconnect (OSI) Reference Model, the controls for the Physical Layer take place?

The Bus topology

In which network topology is each computer or server connected to a single cable?

A Wide Area Network (WAN)

In which type of network does data being sent between hosts on a connected network crosses somebody else's network hardware?

Which statement best defines a computer network?

It is any group of computers capable of communicating directly with one another.

The Institute of Electrical and Electronics Engineers (IEEE) 802.11 standards

Most Wireless Networking is based on which standard?

A network that interconnects Local Area Networks (LANs) typically within the same city

Pick an example of a Metropolitan Area Network (MAN).

A breach of confidentiality

Sophie interns as a customer service representative at a leading bank. In her first week of the internship, she reveals a customer's bank details to a person who claims to be the customer's immediate family without conducting any verification. What type of security breach is depicted in this scenario?

Streaming a video

Zoya states that her current activity on the wireless network follows the Institute of Electrical and Electronics Engineers (IEEE) 801.11e protocol. In this case, Zoya is engaged in what type of activity?


Kaugnay na mga set ng pag-aaral

International Business - Chapter 11

View Set

Equitable Remedies and Remedies at Law

View Set

CFA_L1_Assignment_142_Lesson 3: Efficient Frontier and Investor's Optimal Portfolio

View Set