mod 6; networking

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

What internal device does a computer use to connect to a wired or a wireless network? Group of answer choices

Network interface card

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

Which of the following is true about broadband connections? Group of answer choices

broadband connections are "always on" connections

4G and 5G networks provide slower data transmission speeds than 3G networks.

false

Bandwidth is a term that describes the number of devices connected to a network.

false

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

false

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

false Near field communication (NFC) is used in credit cards, smartphones, and tickets to facilitate close-range communication.

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

Which of the following is a disadvantage of using cloud computing to share files?

inability to access your files if you lose your internet connection

Why is a cable modem classified as a digital model?

it sends and receives digital data over a digital line

Which of the following statements is true about public networks? Group of answer choices

many public networks are not secure

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

she has a home network with smart home devices

What is an ISP? (internet service provider)

telecommunications company that sells internet access

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

the network connection is probably not secure

What is a MAC address?

unique hardware address for your device

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? Group of answer choices

vpn (virtual private network)


Ensembles d'études connexes

Ch 7 Warm up ​________ are taxes placed on imported goods that increase the final purchase price for consumers.

View Set

Chapter 5 - Fair Housing Laws - Mini Quiz

View Set

Charlie and the Chocolate Factory Chapter 23-25 Vocabulary Words

View Set