mod 6; networking
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
Bluetooth
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
What internal device does a computer use to connect to a wired or a wireless network? Group of answer choices
Network interface card
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate.
When using encryption from your home computer, how would you configure the router?
You can use the wireless router to set the encryption key and type of encryption.
Which of the following is true about broadband connections? Group of answer choices
broadband connections are "always on" connections
4G and 5G networks provide slower data transmission speeds than 3G networks.
false
Bandwidth is a term that describes the number of devices connected to a network.
false
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.
false
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.
false Near field communication (NFC) is used in credit cards, smartphones, and tickets to facilitate close-range communication.
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
Which of the following is a disadvantage of using cloud computing to share files?
inability to access your files if you lose your internet connection
Why is a cable modem classified as a digital model?
it sends and receives digital data over a digital line
Which of the following statements is true about public networks? Group of answer choices
many public networks are not secure
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
she has a home network with smart home devices
What is an ISP? (internet service provider)
telecommunications company that sells internet access
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
the network connection is probably not secure
What is a MAC address?
unique hardware address for your device
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel? Group of answer choices
vpn (virtual private network)