BCIS Mod 10, 11, 14 Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

How would you design a webinar that would be interactive?

Add a poll

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Which of the following is true about broadband connections?

Broadband connections are "always-on" connections.

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

Which of the following problematic behaviors relies on the use of digital technology?

Cyberbullying

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

What hardware is essential to creating a home Wi-Fi network?

Router

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

Which of the following would be considered a strong password?

Wbcm2!4!820!

Bruce realizes he's getting a cramp in his neck after texting with his buddy for several minutes. He puts the phone down and takes his dog for a walk. This is an example of ____________.

digital citizenship

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

Posting hostile or insulting comments in response to someone else's blog post is called _____.

flaming

To access the Internet, a router must be connected to a _____.

modem

A network administrator is usually not required on a _____ network.

peer-to-peer

In the email communication process, what is the role of the email server?

Routing email messages through the Internet or a private network

Why would you want to connect your computer to a network?

to access shared resources

You just got back from vacation and are getting ready to post pictures online of all the fun you had. Which of the following photos would be appropriate to post on social media?

A photo of you horseback riding on the beach with friends.

A modem can also function as what other piece of hardware?

A router

What is an ISP?

A telecommunications company that sells Internet access.

What is a MAC address?

A unique hardware address for your device

You received an unpleasant email from a coworker and you want to discreetly notify your supervisor. Which of the following features could you use to do this?

BCC your supervisor in your response

Jason is reading a novel for school on his e-reader. He tries to print a portion of the novel so he can share it with a classmate who lost her copy. However, the e-reader will not allow the book to be printed. What content protection measure is preventing Jason from printing?

Digital rights management (DRM)

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

4G and 5G networks provide slower data transmission speeds than 3G networks.

False

Which of the following is an authentication method to keep your data safe?

Fingerprint scanner

Businesses use webinars for the following reasons EXCEPT _____.

Group discussions

What is one advantage of a company using an anonymous messaging app?

It allows for honest feedback without disclosing identities.

An online game developer has an issue with its most popular game and must take the server offline. The company posts an update on its social media page. How is this a positive use of social networking?

It allows the company to communicate to many users at once about an issue and release status updates.

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Which of the following statements is NOT true about a local firewall?

It is also called software firewall.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

Which of the following network standards applies to cellular networks?

LTE

When describing a client/server network, which of the following would be considered a client?

Laptop

Which of the following statements is true about public networks?

Many public networks are not secure.

To observe professional messaging guidelines, you should avoid using the following EXCEPT _____.

Meeting invites

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

What rules should guide your behavior when you interact with friends and coworkers on social media?

Netiquette

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

Paige is designing a web page that will contain instructions for how to use a new web conferencing tool at her work. She formats best practice tips in green, and she formats warning information in red. Which employees might struggle with this formatting?

People with color blindness

Which of the following is NOT a responsible way to dispose of an old smartphone after removing your data from the device?

Remove the battery and throw it in the trash.

Genevieve loves playing video games with friends on her Xbox connected to her TV. However, she's careful to get up, stretch, and walk around at least once every hour. What problem is this habit most likely helping her avoid?

Repetitive strain injury

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

In business, what has replaced social bookmarking in helping users find the most relevant, high-quality information, collect it, and share it with others?

Social curation sites

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

Alvaro is having lower back pain from working long hours on his computer. Which of the following strategies could help him solve this problem? Choose two.

Switch to a standing desk. Take frequent breaks.

You just posted new photographs to Shutterfly, and the site asks you to review the metadata. Metadata includes the following information EXCEPT _____.

The HTML coding

Which of the following is a step in the email communication process?

The message travels along Internet routers to the recipient.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

If you do not want to use your Internet service provider (ISP) for your email account, how can you acquire a webmail account?

Through an online service

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

True

Social networking can leave you exposed to criminal activity in the following ways EXCEPT _____.

Using your photos and posts to form impressions about your character

Which of the following is an example of someone who is NOT practicing good netiquette?

Vance found pictures of Dorie in a bikini on Facebook and texted them to other men in the office.

Edward shares a blog post on social media that says the Centers for Disease Control (CDC) has changed their recommendation for flu shots. He is quickly bombarded by other people saying his information is wrong. What did Edward fail to do?

Verify the content with an authoritative source.

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual private network

In his small business, Adrian wants to use his laptop to place and receive phone calls. What type of service should he use?

Voice over Internet Protocol (VoIP)

Daniela's company has decided to allow employees to work from home. What can the company use to let employees continue to meet and collaborate on group projects?

Web conferences

Bailey reads wikis at the beginning of his research project to get his bearings on the topic. He switches to peer-reviewed journals and professional publications for his formal sources. Why does Bailey not use wikis as formal sources?

Wikis can be heavily biased.

What type of network sends signals through airwaves and usually does not require cables?

Wireless network

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

How would you describe the social networking site YouTube?

YouTube is a media-sharing network.

Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

a hoax

A business can use a wiki in the following ways EXCEPT _____.

aggregating content

If you want to remove an older email from your inbox, but not permanently delete it, you can _____ it.

archive

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

catfishing

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

digital detox

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

digital footprint

Social networking includes the following positive effects EXCEPT _________.

increasing your privacy

Gwen is starting a blog about vegetable gardening. What information should she include on the blog's home page?

list of posts with the most recent ones at the top

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

Devices on a _____ area network are connected via Bluetooth.

personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

Which of the following is typical content for a podcast?

radio shows

On what type of network can you rent things such as cars, tools, and rooms?

sharing economy network

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

Acceptable use policy (AUP)

Laney just bought a new smartphone. She's already downloaded her contacts information and other data from the cloud. Now she's copying her photos from her old phone onto the new device. Once her new phone has all her data, what should she do next with the old phone?

Reset the old phone to factory settings.

Hunter has dyslexia and struggles to understand text when he reads it to himself. It seems assigned class readings always make more sense when someone else reads them to him. What tool can help Hunter study more independently?

Screen reader

You are using a social network and want to let others know that you are interested in their posts. Which of the following could you use to alert them to your interest?

Share the post on your news feed.

How might a business use a blog?

To communicate with customers

Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

digital inclusion

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

During a regional state of emergency, an Internet service provider offered three months of free Internet access to anyone affected by the crisis. This effort was intended to help reduce the impact of ___________.

the digital divide

When Hafsa writes a research paper for her psychology class, ________________ allow(s) her to quote small portions of a research study published by an industry leading expert without asking his permission first.

the fair use doctrine


संबंधित स्टडी सेट्स

Chapter 28 - Infection Prevention & Control

View Set

Conceptual Overview - Chapter 5 - Accounting for Merchandising Businesses

View Set

Russian DLI Mod 1 Lesson 2 Active and Extension

View Set

Colorado Property and Casualty Insurance

View Set

Geometry: Quiz 2: Similarity; Triangle Theorems

View Set