NETWORKING REVIEW

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What type of network sends signals through airwaves and usually does not require cables?

wireless network

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it

What is an ISP?

A telecommunications company that sells Internet access.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Which of the following network standards applies to cellular networks?

LTE -- (Computers and devices communicating with each other on a network must do so while following a common set of rules for exchanging information, or protocol. An IrDA network protocol uses remoted controls or other data transmission within close proximity.)

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure

What does a DSL modem use to send and receive digital data?

copper telephone wiring

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

intranet

When describing a client/server network, which of the following would be considered a client?

laptop

To access the Internet, a router must be connected to a _____.

modem

What internal device does a computer use to connect to a wired or a wireless network?

network interface card

Devices on a _____ area network are connected via Bluetooth.

personal

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

What hardware is essential to creating a home Wi-Fi network?

router

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

social engineering

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards -- (Net neutrality supports the concept that the Internet should be neutral and all traffic should be treated equally.)

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

star

Why would you want to connect your computer to a network?

to access shared resources, such as hardware, software, data, and information

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

virtual private network


संबंधित स्टडी सेट्स

International Business Final Exam Review

View Set

*****compiled Exam 2 sos please send help

View Set

Ch. 6 Emerging Technologies - Adaptive Learning Assignment

View Set

Unit 10: Closing Procedures/Closing the Real Estate Transaction

View Set

CompTIA Project+ Practice Assessment

View Set

Chemistry Chapter 9 Powerpoint Review

View Set

Exam 1: Unit 14 - The Real Estate Business

View Set