ITE115 Exam 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

A modem can also function as what other piece of hardware?

A router

What is a MAC address?

A unique hardware address for your device

A router is a system of two or more devices linked by wires or cables.

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

False

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

When describing a client/server network, which of the following would be considered a client?

Laptop

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

What hardware is essential to creating a home Wi-Fi network?

Router

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

If you upload photos to a NAS device, everyone on the network can access them.

True

Which of the following would be considered a strong password?

Wbcm2!4!820!

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

Devices on a _____ area network are connected via Bluetooth.

personal

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards

Why would you want to connect your computer to a network?

to access shared resources


Set pelajaran terkait

Art, Science, Philosophy, or Government To which one of these fields did each of the following individuals most contribute?

View Set

Diffusion, osmosis, active transport

View Set

07 Skeletal System (Name the bones)

View Set

Chapter 23: Nursing Care of the Newborn with Special Needs

View Set