Technology for Success - Module 10 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is an evil twin in the computer world?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

A modem can also function as what other piece of hardware?

A router

What is an ISP?

A telecommunications company that sells Internet access.

Why does net neutrality affect Internet connections?

Because it supports all websites in the same way, Internet services cannot be restricted by content or bandwidth.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

Which of the following is true about broadband connections?

Broadband connections are "always-on" with devices connected to them.

How will cellular networks challenge cable and DSL providers in the future?

Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Which of the following statements is NOT true about a local firewall?

It is also called software firewall.

Which of the following is not a resource able to be shared in a network?

Motherboards

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?

You could encrypt the data in the report that only you can decode.

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall


संबंधित स्टडी सेट्स

React/Redux/Webpack/React Native

View Set

Chromatography Practical Questions

View Set

Chapter 51: Care of Patients with Musculoskeletal Trauma

View Set

Chapter 25, The Child with Gastrointestinal Dysfunction peds

View Set

Lipscomb Psychology 2301 Chapter 9 Themes and Variations 9E Intelligence

View Set