ITE 115 MOD 10
Which of the following could indicate a DoS attack on your company server?
If a server responsible for hosting websites is the recipient of a denial of service attack, it might be unable to display websites for visitors attempting to view them.
To access the Internet, a router must be connected to a _____.
modem
A network administrator is usually not required on a _____ network
peer-to-peer
Which of the following is an example of a personal area network?
smartwatch and phone connected via Bluetooth
If you upload photos to a NAS device, everyone with permissions to access the photos can access them.
true,Network attached storage (NAS) devices are one or more hard drives that connect directly to a network and provide a centralized location for storing programs and data on large and small networks. On a home network, you might store family photos and videos so that they are accessible to all members of your family.
What internal device does a computer use to connect to a wired or a wireless network?
A network interface card (NIC) is a circuit board that connects a computer to a wired or wireless network.
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
What is an ISP?
A telecommunications company that sells Internet access.
How does a wireless network key work with an encrypted wireless network?
Both the sending and receiving device must know the key to communicate on the wireless network.
Which of the following is not a safety precaution for securing a wireless network?
Disable WPA2
Which government agency is responsible for releasing the rules surrounding Internet access?
Federal Communications Commission (FCC)
Which of the following is an authentication method to keep your data safe?
Fingerprint scanner
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Which of the following statements is NOT true about a local firewall?
It is a physical device that acts as a protective barrier.Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system.
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
Which of the following is an advisable practice for securing data stored on a network?
Only grant access to data to those with a legitimate need.
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.
True
Which of the following is true about broadband connections?
broadband connections are "always-on" connections., which means that the computers and devices on the network are always connected to the Internet.
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
What hardware is essential to creating a home Wi-Fi network?
router
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
standars
How does a wireless network key work with an encrypted wireless network?
the sending and receiving devices must know the wireless network key to communicate.
When using encryption from your home computer, how would you configure the router?
u can use the wireless router to set the encryption key and type of encryption.