ITE115 test2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Devices on a _____ area network are connected via Bluetooth.

personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

Why would you want to connect your computer to a network?

to access shared resources

Which company most likely relies almost solely on B2B transactions in their course of business?

Chemical supply company

True/False: 4G and 5G networks provide slower data transmission speeds than 3G networks.

False

True/False: RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

False

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

When describing a client/server network, which of the following would be considered a client?

Laptop

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address

A network administrator is usually not required on a _____ network.

peer-to-peer

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

A modem can also function as what other piece of hardware?

A router

How can an attacker execute malware through a script?

A script can run a series of instructions to download and run malware.

What is an ISP?

A telecommunications company that sells Internet access.

What is a MAC address?

A unique hardware address for your device

Brian needs to use an expensive application that his work provides on his computer at the office. However, he's traveling with his laptop and won't be back in his office for another week. Then Brian remembers his employer also makes the application available to employees through the cloud. What does Brian need to do next to use this application?

Access the application through his laptop's browser.

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian's wait time?

Artificial intelligence (AI)

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Which of the following is true about broadband connections?

Broadband connections are "always-on" connections.

Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers' sales transactions from his laptop as he travels.

CRM

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

Who enforces PCI compliance for merchants who accept credit card payments from customers?

Credit card companies

Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea's normal shopping habits and identify it as credit card fraud?

Data analytics

Which is a first step to deter thieves from accessing your financial information?

Do not provide personal information over the phone or through email.

True/False: All cloud technologies must be accessed over the Internet.

False

True/False: Bandwidth is a term that describes the number of devices connected to a network.

False

True/False: If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

True/False: Layton is retired and sells hand-crafted fishing rods as a home-based business for a little extra spending money. Because he processes less than a dozen credit card payments per year, he does not need to worry about PCI compliance requirements for handling his customers' payment information.

False

Frazer's mother recently experienced a stroke, and he needs to work from home for a while to help care for her. In what way will cloud computing most help Frazer in this situation?

He can remotely collaborate with teammates on projects, deadlines, and events.

Which kind of cloud service requires the most technical skill to use?

IaaS

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Which of the following statements is NOT true about a local firewall?

It is also called software firewall.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

Lauren programs her AI system to occasionally give a wrong answer to a question. What will this accomplish?

It will make the AI system sound more human.

Which of the following network standards applies to cellular networks?

LTE

Which of the following storage locations does NOT give you access to your files over the Internet by default?

Local hard drive

Nancy runs her students' research papers through a plagiarism checker tool before grading them. What technology enables the plagiarism checker to keep improving its detection of poorly paraphrased text?

Machine learning (ML)

Which of the following statements is true about public networks?

Many public networks are not secure.

Henry installed a smart thermostat to manage the temperature in his house. However, when Henry arrived home from work, the house was very cold. He's frustrated that this "smart" thermostat let the house get so cold. What does he need to provide the thermostat for it to do a better job in the future?

More information about his needs

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

What technology allows Siri to understand you when you request a route to a location in a nearby city?

Natural language processing (NLP)

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?

Omnichannel strategy

Missy's retail website suddenly starts getting a lot of traffic and orders due to a video that went viral on social media. Her cloud-based servers scale up automatically to handle the increased demand. What cloud characteristic supports this automatic adjustment?

Rapid elasticity

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina's job role?

Receiving clerk

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

What hardware is essential to creating a home Wi-Fi network?

Router

Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?

SaaS

Claire saves her school research paper on OneDrive cloud storage so she can access the most updated version both at school and at home. She's put a lot of time into this research paper. How can she make sure she won't lose access to it if something happens to her cloud storage space?

Save a copy of the file on her local hard drive.

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Storing financial information in an unsent email message.

What is a digital certificate?

Technology used to verify a user's identity

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

Emma downloaded a new game from an unfamiliar website. A few days later, Emma realized her system had been hacked and her credit card numbers were stolen. Without Emma knowing, what type of malware might she have downloaded to her computer?

Trojan

True/False: Business activities completed on a local, private network are examples of e-business even if cloud-hosted resources are not involved.

True

True/False: Many chatbot services provide support to employees and management rather than to customers.

True

True/False: Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

True

Which learning model allows an AI system to create its own categories of data without labeling those categories?

Unsupervised learning

Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?

Video conferencing application

What type of network sends signals through airwaves and usually does not require cables?

Wireless network

In which of the following situations is a digital certificate useful?

You are signing a rental lease.

Which of the following statements about browser security settings is false?

You must keep your accumulated web history as long as you use the browser.

During a meeting at work, your boss starts talking about something called Desktop as a Service (DaaS). What can you likely assume about this technology based on its name?

You'll access this service over the Internet.

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

What special technology allows computers to perform the intense processing needed to perform machine learning?

ANN

Hana just received a shipment of cleaning supplies for her coffee shop. What kind of transaction was this?

B2B

Cassidy is a medical assistant in a hospital and has access to many medical files. When she brings patients to the examining room, she can be observed swiping a card, typing in a password, and staring into what appears to be a camera, all attached to the computer. After completing her check-in, Cassidy leaves the patient in the examining room waiting on the doctor. It is important that she logs out of the system so the patient does not have access to the information stored in the hospital's database. Based on Cassidy's actions what systems do you think the hospital has in place to protect the patient medical records?

Biometrics

Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she's away from home?

Bluetooth connection

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she's at home?

Broad network access

Cindy wants to sell her bicycle so she can upgrade to a newer one. What kind of transaction will most likely take place when Cindy sells her older bike?

C2C

Jerry has a problem with a package he just received—two items from his order are missing. Who should he contact to resolve the problem?

Customer service representative

Which of the following could indicate a DDoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

Which term refers to the science that specifies the design and arrangement of items you use so you interact with the items efficiently and safely?

Ergonomics

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

True/False: To work with AI technologies, you must understand how AI commands are programmed into the computer and phrase your commands exactly the way the AI system expects.

False

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote tracking to retrace the thief's steps.

Lately, Marcus has noticed a lot of customer complaints that items purchased from his web store don't meet expectations. What improvement to the website will best help to solve this problem so customers know better what to expect when they buy items from his website?

High-quality product photos

How will you decide which browser security settings to allow and which ones to block?

I will need to review each browser security setting and use my best judgement.

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

Terrance needs to set up a Windows server in his company's public cloud. What kind of cloud service will work best for this situation?

IaaS

Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle's car using?

Reinforcement learning

Which learning model allows an AI system to develop its own strategies for solving problems or completing tasks?

Reinforcement learning

Kason spends several hours a week generating reports on sick hours used across his company. The task eats up his available work hours and prevents him from doing other jobs he needs to do. What technology could take over this task and free up his time for more productive work?

Robotic process automation (RPA)

Kevin runs a small auto body shop and has recently started accepting credit card payments. He's concerned about how to comply with PCI DSS security requirements. What kind of cloud solution would most easily help Kevin meet these requirements?

SaaS

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

Josh is concerned about protecting his home while he's away on vacation. He wants to leave a radio playing music so it sounds like someone is home. However, he wants the radio to turn on and off at different times so it appears that someone is interacting with it. What IoT device will allow Josh to turn the radio on and off using the Alexa app on his smartphone while he's traveling?

Smart plug

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual private network

Conducting a staff meeting online so employees from around the globe can join the discussion is an example of _____________.

e-business

To access the Internet, a router must be connected to a _____.

modem

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

research spoofing

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards


Ensembles d'études connexes

TEAS Practice English Questions

View Set

Mgmt 383 ch 11, Mgmt 383 Ch10, Mgmt 383 CH1, Mgmt 383 ch2, MGMT 383 CH3, Mgmt 383 Ch 4, Mgmt 383 Ch 5, Mgmt 383 Ch 6, Mgmt 383 Ch 7

View Set