COSC 1301 Final Review

Ace your homework & exams now with Quizwiz!

What is an evil twin in the computer world?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

What is an ISP?

A telecommunications company that sells Internet access. (Internet Service Provider).

How will cellular networks challenge cable and DSL providers in the future?

Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services. DSL: Digital Subscriber Line (Telephone Lines).

What does a DSL modem use to send and receive digital data?

Copper telephone wiring. A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line.

Which of the following could indicate a DoS attack on your company server?

Customers cannot view the website on their device because the page will not load. (Disk Operating System.)

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

Extranet. (partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely.)

Businesses use webinars for all of the following reasons except?

Group discussions

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

He can use remote wiping to retrace the thief's steps. Remote wiping is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

Intranet. An intranet is a private network, operated by a large company or other organisation, which uses internet technologies, but is insulated from the global internet.

Which of the following statements is NOT true about a local firewall?

It is also called software firewall.

Why is a cable modem classified as a digital model?

It sends and receives digital data over a digital line.

Which of the following is not a resource able to be shared in a network?

Motherboards

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

Requesting a credit report and freezing your credit.

In the email communication process, what is the role of the email server?

Routing email messages through the Internet or a private network

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

Star

What is a digital certificate?

Technology used to verify a user's identity.

How does a wireless network key work with an encrypted wireless network?

The sending and receiving devices must know the wireless network key to communicate.

How could an online attacker use your online profile to gather information about you to steal your identity?

Use your posts to figure out answers to possible security questions.

As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?

You could encrypt the data in the report that only you can decode.

A business can use a wiki in all the following ways EXCEPT for _____.

aggregating content

There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.

creating malware

In which of the following real-life situations would it be useful to use a digital certificate?

if you were emailing a friend

In which of the following real-life situations would it be useful to use a digital certificate?

if you were signing a rental lease

In order for your router to access Internet connections, it must be connected to a _____.

modem

You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.

naming your router something you'll remember, like your street address.

Devices on a _____ area network are connected via Bluetooth.

personal

You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened?

Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.

You just posted new photographs from your trek to Nepal up onto Shutterfly, and the site asks you to review the metadata. You would review all of the following EXCEPT _____.

The HTML coding

The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages?

The company would have to use an IrDA network protocol within close proximity. Infrared Data Association, or IrDA in short, is a group of device manufacturers that developed a standard for transmitting data via infrared (IR) light waves.

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

They disguise the network as an evil twin.


Related study sets

2.4b Immune Responses: Phagocytosis, Cell-Mediated, Humoral

View Set

Strategy Designer - Value Design (32%)

View Set

ATI Health Assess 2.0 General Survey

View Set

Chinese Phonetics- Lesson 1 How are you? 第一課 你好

View Set

Chapter 20- Documenting and Reporting

View Set

modern world-french revolution quiz

View Set

CH. 2, Chapter 5, Chapter 6, Chapter 7, Ch 7-8 T/F, Chapter 10, Chapter 8

View Set

ATI Leadership Practice Questions

View Set