MIS 2223 Module 10
Which of the following devices connects a network to the Internet through an Internet Service Provider (ISP)? a. Router b. Modem c. Switch d. Hub
b. Modem
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. a. True B. False
B. False
What is a MAC address? a. A unique hardware address for your device b. The connection needed to access to a cellular network c. An IP address unique to Apple's MAC computers d. An alternate name Internet Protocol version 6
a. A unique hardware address for your device
What does a DSL modem use to send and receive digital data? a. Copper telephone wiring b. Cable TV connections c. A wireless router d. A network interface card
a. Copper telephone wiring
Computers communicating on a network must follow a _____, a common set of rules for exchanging information. a. standard b. protocol c. syntax d. topology
b. protocol
A modem can also function as what other piece of hardware? a. A hub b. A switch c. A router d. A network interface card
c. A router
Sonia works from home and uses the Internet often throughout the day. When they're home, Sonia's husband and children also use her network for gaming, social media, and streaming videos or music. Which of the following best describes Sonia's network? a. ISP network b. Business network c. Internet d. Home network
d. Home network
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt? a. It did not include a promotional offer. b. It was written in an overly formal tone. c. The signature was consistent with other emails from his bank. d. It contained typos and other grammatical errors.
d. It contained typos and other grammatical errors.
Which of the following would be considered a strong password? a. Password123 b. Abc123456789 c. CatCatCatCat d. Wbcm2!4!820!
d. Wbcm2!4!820!
If you want to share information with individuals who are internal to your organization, which type of network would you want to use? a. Wired network b. Intranet c. Extranet d. Virtual private network
b. Intranet
Which of the following network standards applies to cellular networks? a. Wi-Fi b. LTE c. Phoneline d. Ethernet
b. LTE
What hardware is essential to creating a home Wi-Fi network? a. Printer b. Router c. Monitor d. Ethernet cable
b. Router
When an ISP must provide the same level of service to all websites, regardless of their content or purpose, what concept is being supported? a. Social engineering b. Freedom of choice c. Net neutrality d. Network security
c. Net neutrality
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. a. True b. False
b. False
What does a DSL modem use to connect to an ISP? a. TV cable b. Ethernet cable c. Telephone cable d. Power cable
c. Telephone cable
Nancy receives a call from someone claiming to work for the local Sheriff's Department. The caller says Nancy hasn't paid her speeding ticket, and she's about to be arrested unless she pays the fine with a credit card over the phone. What kind of attack is this? a. Social engineering b. Denial of service c. Phishing d. Trojan
a. Social engineering
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? a. Social engineering b. A zombie attack c. An evil twin d. Spyware
a. Social engineering
Tyler recently discovered that his neighbors have been using his wireless network to stream movies in the evening. This has caused slower network performance for Tyler, who likes to play Internet games after work. What can Tyler do to protect his wireless network from his neighbors? a. Use a strong password for authentication b. Add a firewall to the network c. Change the key on his door d. Use a VPN
a. Use a strong password for authentication
Kabir is buying a new wireless router and wants to make sure his Internet communications are private. What feature should the new router include? a. WPA2 encryption b. High bandwidth c. Mobile hotspot creation d. High network standards
a. WPA2 encryption
A network administrator is usually not required on a _____ network. a. peer-to-peer b. client/server c. intranet d. metropolitan area
a. peer-to-peer
Which of the following statements is NOT true about a local firewall? a. It is a physical device that acts as a protective barrier. b. It is also called software firewall. c. It is often built into a company's operating system. d. It inspects data being transmitted to or from a network.
b. It is also called software firewall.
Which of the following is a disadvantage of using cloud computing to share files? a. The amount of space that files will take up on your computer. b. The inability to access your files if you lose your Internet connection. c. The files you will lose if your computer crashes. d. How long it will take to access a backup of files.
b. The inability to access your files if you lose your Internet connection.
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network? a. He can use the network only for a limited time. b. The network connection is probably not secure. c. He cannot connect to the Internet from the network. d. The network most likely uses a firewall for protection.
b. The network connection is probably not secure.
How does a wireless network key work with an encrypted wireless network? a. The wireless key is the encryption code needed by the receiver to decode the file. b. The sending and receiving devices must know the wireless network key to communicate. c. The wireless network needs the key to decode the data before sending. d. The wireless network key is your password for logging onto an Internet email system to receive files.
b. The sending and receiving devices must know the wireless network key to communicate.
In a connected network, how are hubs and switches similar to one another? a. They are interchangeable terms for the same hardware. b. They provide a central point for cables in a network. c. They transfer data to all devices. d. They can only connect to a single device.
b. They provide a central point for cables in a network.
Liesel is working on a research paper on a computer at her school's library. She saves the document to the cloud, signs off, and then packs her book bag so she can get to class on time. On what device is her document stored? a. Her USB flash drive b. The library's computer c. A remote server d. Her smartphone
c. A remote server
Marley is setting up Internet service with an ISP and wants to make sure she has a high-capacity connection for watching online movies. What type of connection should she request? a. Narrowband b. Powerline c. Broadband d. Bluetooth
c. Broadband
When your computer accesses a webpage, what role is your computer filling in the network architecture? a. Peer b. Server c. Client d. Administrator
c. Client
Which of the following could indicate a DoS attack on your company server? a. Customers are required to enter personal information as they complete an order form. b. Customers are receiving too many emails about special offers. c. Customers cannot view the website on their device because the page will not load. d. Customers cannot download the most recent newsletter.
c. Customers cannot view the website on their device because the page will not load.
Which of the following is the most secure SSID for a wireless network at a family residence? a. Poplar drive b. Linksys c. GoVols d. Thompson family Wi-Fi
c. GoVols
When it comes to secure data storage on a network, which of the following statements is true? a. You cannot save encrypted files on a network attached storage device. b. Wireless network keys are the safest method for protecting files on a network. c. Roles can be granted to individuals to view files and make changes to files on a network. d. Files stored on a network are accessible to all who can access that network.
c. Roles can be granted to individuals to view files and make changes to files on a network.
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge? a. They use adware to fill your screen with unwanted advertisements until you click one. b. They overload the server with network traffic so webpages will not load. c. They disguise the network as an evil twin. d. They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
c. They disguise the network as an evil twin.
How can smartphones without Wi-Fi access connect to the Internet? connect a. Using near field communication b. Using a Bluetooth connection c. Using a cellular network d. Using an Ethernet connection
c. Using a cellular network
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. a. topologies b. architectures c. standards d. protocols
c. standards
Why would you want to connect your computer to a network? a. to keep up with computing trends b. for added security c. to access shared resources d. to use the network's operating system
c. to access shared resources
Which network topology is most likely to continue to function well even if one device fails? a. Star network b. Ring network c. Bus network d. Mesh network
d. Mesh network
Zeke is settling in at a coffee shop for some study time before his next class. He notices the coffee shop's wireless network is secured and not open. What information does he need to ask from the barista so he can access the wireless network and get onto the Internet? a. Username b. Rootkit c. Firewall password d. Security key
d. Security key
What is the U.S. Federal Communication Commission's role in regard to Internet access? a. To rate Internet sites similar to movie ratings b. To restrict Internet access by location and population c. To regulate the bandwidth each website can have d. To release rules surrounding Internet access
d. To release rules surrounding Internet access
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? a. Extranet b. Intranet c. Wireless network d. Virtual private network
d. Virtual private network
To access the Internet, a router must be connected to a _____. a. network b. hub c. switch d. modem
d. modem
If you upload photos to a NAS device, everyone on the network can access them. a. True b. False
a. True
Which of the following describes an evil twin? a. A device infected with malware that an attacker uses to control the device remotely. b. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. c. A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. d. An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
b. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Which of the following statements do opponents of net neutrality agree with? a. Access to websites should not be restricted based on content. b. All Internet traffic should be treated equally. c. The same level of service should be provided to all websites, regardless of purpose. d. ISPs should charge more for high-bandwidth connections.
b. All Internet traffic should be treated equally.
Why is a cable modem classified as a digital model? a. It only sends digital data over a digital line. b. It sends and receives digital data over a digital line. c. It only receives digital data over a digital line. d. It uses copper wires to enable efficient digital data transfers.
b. It sends and receives digital data over a digital line.
Sandhya is installing a security camera at the entrance to her office. The camera needs power and network access, but there's no power outlet near the door. What technology can Sandhya use to get power to the security camera? a. Wi-Fi b. PoE c. TCP/IP d. LTE
b. PoE
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. a. Bus b. Ring c. Star d. Mesh
b. Ring
Quincy suspects that passwords and other personal information were electronically stolen from his computer. What kind of malware might be infecting his computer? a. Worm b. Spyware c. Trojan d. Ransomware
b. Spyware
Which network type is often used for vendor access? a. Intranet b. Intranet c. Extranet d. Wireless network
c. Extranet
Rachelle is an office manager for an active real estate agency. She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff. What technology can she use to solve this problem? a. VPN b. PAN c. NAS d. WAN
c. NAS
Which of the following is an authentication method to keep your data safe? a. Fingerprint scanner b. Body area network c. Encryption d. Software firewall
a. Fingerprint scanner
What can you use as a protective barrier on a network to keep out unauthorized traffic? a. Firewall b. Network attached storage (NAS) c. Encryption d. Biometric devices
a. Firewall
Donna is setting up her own web server to provide information to her clients. How will her web server be uniquely identified on the Internet? a. IP address b. Username and password c. Email address d. Network Security Key
a. IP address
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to? a. My Verizon VPN b. Starbucks Wi-Fi c. Jenn's iPhone d. xfinitywifi
a. My Verizon VPN
What device is most likely installed in your computer to connect it to a wired or wireless network? a. Network interface card (NIC) b. Router c. Ethernet cable d. Modem
a. Network interface card (NIC)
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? a. Store the report on a flash drive that you have password-protected with the president's name. b. Encrypt the data in the report. c. Send the email without attaching the report and ask the president to call you. d. Transfer the report to the cloud.
b. Encrypt the data in the report.
4G and 5G networks provide slower data transmission speeds than 3G networks. a. True b. False
b. False
A router is a system of two or more devices linked by wires or cables. a. True b. False
b. False
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? a. RFID b. NFC c. Bluetooth d. IrDA
c. Bluetooth