BCIS Study Guide

Ace your homework & exams now with Quizwiz!

What is an ISP?

A telecommunications company that sells Internet access

Why does net neutrality affect Internet connections?

Because it supports all websites in the same way, Internet services cannot be restricted by content or bandwidth.

Which of the following is true about broadband connections?

Broadband connections are "always-on" with devices connected to them

What does a DSL modem use to send and receive digital data?

Copper telephone wiring

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

Encrypt the data in the report.

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet

Which of the following statements do opponents of net neutrality agree with?

ISPs should charge more for high-bandwidth connections

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet

After receiving an email from what appeared to be your bank, why did you become suspicious that this was a phishing email?

It contained typos and other grammatical errors.

Which of the following statements is NOT true about a local firewall?

It is also called software firewall.

When describing a client/server network, which of the following would be considered a client?

Laptop

Which of the following statements is true about public networks?

Many public networks are not secure.

To access the Internet, a router must be connected to a _____.

Modem

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

My Verizon VPN

What internal device does a computer use to connect to a wired or a wireless network?

Network interface card

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

Protocol

When it comes to secure data storage on a network, which of the following statements is true?

Roles can be granted to individuals to view files and make changes to files on a network.

What hardware is essential to creating a home Wi-Fi network?

Router

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?

She has a home network with smart home devices.

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

Social engineering

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

Standards

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages?

The company would have to use an IrDA network protocol within close proximity.

As you consider the different methods of sharing files, which of the following is a disadvantage of cloud computing?

The inability to access your files if you lose your Internet connection.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.

In a connected network, how are hubs and switches similar to one another?

They provide a central point for cables in a network.

What is the U.S. Federal Communication Commission's role in regard to Internet access?

To release rules surrounding Internet access

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

Virtual private network

When using encryption from your home computer, how would you configure the router?

You can use the wireless router to set the encryption key and type of encryption.

As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?

You could encrypt the data in the report that only you can decode.

Devices on a _____ area network are connected via Bluetooth.

personal


Related study sets

Ch. 25 Pharm EAQ antidysrhythmics

View Set

Managerial Accounting: Chapter 1

View Set

Biology 1050 practice exam questions

View Set

MKTG 3313 Final question practice

View Set

Chapter 48: Skin Integrity and Wound Care (Skin Integrity and Wound Care - Implementation and Evaluation)

View Set

Phonic, spelling and word study - Vocabulary

View Set

Water: Mountains to Sea Last Exam Slide Notes (lectures 19-24)

View Set