Module 8 Quiz: Networking

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following describes as evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

A modem can also function as what other piece of hardware?

A router

What is an ISP?

A telecommunications company that sells Internet access.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load.

A s chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

A router is a system of two or more devices linked by wires or cables. (T/F)

False

If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. (T/F)

False

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. (T/F)

False

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?

It contained typos and other grammatical errors

Which of the following statements is NOT true about a local firewall?

It is also called a hardware firewall

When describing a client/server network, which of the following would be considered a client?

Laptop

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

In a _______ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

What is one way hackers can trick you into transmitting personal data over a public network without your knowledge?

They disguise the network as an evil twin

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual private network

To access the Internet, a router must be connected to a _______.

modem

Computers communicating on a network must follow a _______, a common set of rules for exchanging information.

protocol

Why would you want to connect your computer to a network?

to access shared resources

To protect a computer or a server, a(n) _______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

firewall

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot


Set pelajaran terkait

Chapter 21,22 and 24 Test Review

View Set

Life Insurance License Study Set (FULL) Indiana

View Set

ULL FNAN 320 Justin Callais Exam 2

View Set

ENSP Test 3 Review Clemson: Chapter 14

View Set

Exam 1- Drug and Alcohol Education

View Set

Introduction To Matrices Quizlet

View Set

Enterprise LAN Design and Tech Questions

View Set