ITE 115 6 (10)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following network standards applies to cellular networks?

FINGERPRINT SCANNER

Which of the following network standards applies to cellular networks?

firewall

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

bluetooth

To access the Internet, a router must be connected to a _____.

modem

What is a MAC address?

A unique hardware address for your device

Which of the following is true about broadband connections?

Broadband connections are "always-on" connections.

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt

It contained typos and other grammatical errors.

Which of the following statements is NOT true about a local firewall?

It is a physical device that acts as a protective barrier.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line

Which of the following network standards applies to cellular networks?

LTE

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

What does a DSL modem use to send and receive digital data?

copper telephone wiring

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

extranet

When describing a client/server network, which of the following would be considered a client?

laptop

Which of the following statements is true about public networks?

many public networks are not secure

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

mobile hotspot

What internal device does a computer use to connect to a wired or a wireless network?

network interface card

Devices on a _____ area network are connected via Bluetooth.

personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

A modem can also function as what other piece of hardware?

router

What does a DSL modem use to send and receive digital data?

router

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

she has a home network with smart home devices

Which of the following is an example of a personal area network?

smartwatch and phone connected via Bluetooth

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

star

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

virtual private network

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

intranet

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

my verizon VPN

What type of network sends signals through airwaves and usually does not require cables?

wireless network

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

social engineering


संबंधित स्टडी सेट्स

exercise testing and prescription chapter 2

View Set

Defintion and Meaning of Constitutions

View Set

Chapter 7 Guided Reading Activity - Honors Bio

View Set

Ch 5 Small Business Entry: Paths to Part-Time Entrepreneurship

View Set