Module 8 Quiz: Networking
Which of the following describes as evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
A modem can also function as what other piece of hardware?
A router
What is an ISP?
A telecommunications company that sells Internet access.
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
A s chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
A router is a system of two or more devices linked by wires or cables. (T/F)
False
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway. (T/F)
False
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. (T/F)
False
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
It contained typos and other grammatical errors
Which of the following statements is NOT true about a local firewall?
It is also called a hardware firewall
When describing a client/server network, which of the following would be considered a client?
Laptop
When it comes to secure data storage on a network, which of the following statements is true?
Roles can be granted to individuals to view files and make changes to files on a network.
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
In a _______ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
What is one way hackers can trick you into transmitting personal data over a public network without your knowledge?
They disguise the network as an evil twin
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network.
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Virtual private network
To access the Internet, a router must be connected to a _______.
modem
Computers communicating on a network must follow a _______, a common set of rules for exchanging information.
protocol
Why would you want to connect your computer to a network?
to access shared resources
To protect a computer or a server, a(n) _______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
firewall
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
mobile hotspot