Concepts Module 10
Which of the following are risks associated with using a connected network? A) Spyware B) Adware C) All of the above D) Virus
All of the above
__________ is the process of converting data so that it is unrecognizable when it is transmitted on a network or stored on a storage device, except to users who enter the correct password. A) Protected Access B) Encryption C) Router Configuration D) Privatization
Encryption
A Wide Area network (WAN) connects computers and devices in a limited area, such as a home, school, or small office complex. True or False?
False
A hub transfers data only to the intended recipient. True or False?
False
Net neutrality is a common term used to describe the capacity of a communication channel. True or False?
False
Social engineering is a type of attack that is meant to overload the server with network traffic so that it cannot provide necessary services. True or False?
False
With a Ring Network, all devices attach to a central cable, which carries the data. True or False?
False
Which of the following statements is true about public networks? A) Many public networks are not secure. B) All public networks are free. C) Your home network is a public network. D) Hackers cannot intercept data transmitted over public networks.
Many public networks are not secure.
What hardware is essential to creating a home Wi-Fi network? A) Monitor B) Printer C) Router D) Ethernet Cord
Router
A mobile hotspot enables you to connect a phone, computer or other device to the Internet through the cellular network. True or False?
True
Cloud computing is Internet-based delivery of computing services, including data storage and apps. True or False?
True
Networks allow computers to share resources, such as hardware, software, data, and information. True or False?
True
Phishing is a type of email scam that tries to trick you into revealing personal or financial information. True or False?
True
The modem connects your network to the Internet through a telecommunications company that sells Internet access, known as an Internet Service Provider (ISP). True or False?
True
A __________ is a computer or mobile device on the network that relies on the server for its resources. A) hub B) switch C) client D) server
client
A __________ is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. A) switch B) router C) firewall D) modem
firewall
A __________ is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer. A) hub B) router C) modem D) switch
modem
A __________ is a device that connects two or more networks and directs, or routes, the flow of information along the networks. A) router B) Internet Service Provider (ISP) C) switch D) modem
router
A __________ is a computer on the network that controls access to hardware, software, and other resources. A) server B) modem D) router E) client
server
A __________ network sends signals through airwaves, and usually does not require cables. A) extranet B) wired C) wireless D) Intranet
wireless