NETWORKING REVIEW
What type of network sends signals through airwaves and usually does not require cables?
wireless network
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it
What is an ISP?
A telecommunications company that sells Internet access.
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Bluetooth
Which of the following network standards applies to cellular networks?
LTE -- (Computers and devices communicating with each other on a network must do so while following a common set of rules for exchanging information, or protocol. An IrDA network protocol uses remoted controls or other data transmission within close proximity.)
Which of the following is a disadvantage of using cloud computing to share files?
The inability to access your files if you lose your Internet connection.
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
The network connection is probably not secure
What does a DSL modem use to send and receive digital data?
copper telephone wiring
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
intranet
When describing a client/server network, which of the following would be considered a client?
laptop
To access the Internet, a router must be connected to a _____.
modem
What internal device does a computer use to connect to a wired or a wireless network?
network interface card
Devices on a _____ area network are connected via Bluetooth.
personal
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
What hardware is essential to creating a home Wi-Fi network?
router
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
social engineering
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
standards -- (Net neutrality supports the concept that the Internet should be neutral and all traffic should be treated equally.)
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
star
Why would you want to connect your computer to a network?
to access shared resources, such as hardware, software, data, and information
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
virtual private network