Module 8: Networking

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Peer-to-peer

A network administrator is usually not required on a _____ network.

It contained typos and other grammatical errors.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

Encrypt the data in the report

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Protocol

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

Personal

Devices on a _____ area network are connected via Bluetooth.

4G and 5G networks provide slower data transmission speeds than 3G networks. (T/F)

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. (T/F)

False

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. (T/F)

False

Intranet

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Mobile hotspot

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

Modem

To access the Internet, a router must be connected to a _____.

Firewall

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

Virtual Private Network (VPN)

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots. (T/F)

True

Which of the following would be considered a strong password?

Wbcm2!4!820!

A unique hardware address for your device

What is a MAC address?

Social engineering

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Laptop

When describing a client/server network, which of the following would be considered a client?

Roles can be granted to individuals to view files and make changes to files on the network

When it comes to secure data storage on a network, which of the following statements is true?

Bluetooth

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Smartwatch and phone connected via Bluetooth

Which of the following is an example of a personal area network?

Many public networks are not secure

Which of the following statements is true about public networks?

It sends and receives digital data over a digital line

Why is a cable modem classified as a digital model?

To access shared resources

Why would you want to connect your computer to a network?


Kaugnay na mga set ng pag-aaral

EXAM 2- Chapter 12 Quiz econ micro

View Set

Management of Discomfort, intrapartum: normal labor and birth

View Set

MTA HTML5 Application Development Fundamentals Training 1

View Set

PrepU Chp 28: Assessment of Hematologic Function and Treatment Modalities

View Set

Names of Plates ***= Major Plates **= Minor *= Micro/Tiny

View Set

Unit 1: Beginning in Computer Science

View Set

ALGEBRA 1: FOUNDATIONS FOR ALGEBRA

View Set

Nurs 204 - Chapter 15: Head and Neck (3)

View Set