CSIT101 COMPLETE FINAL REVIEW

Ace your homework & exams now with Quizwiz!

Which of the following describes an evil twin?

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it

What is an ISP?

A telecommunications company that sells Internet access.

Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

Bluetooth

How can you protect personal information gathered by legitimate organizations?

Create a separate email account for receiving information from websites.

What would a password manager allow you to do?

Create and store multiple strong passwords.

Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?

His phone can generate an alarm even if it is on mute.

Which of the following network standards applies to cellular networks?

LTE -- (Computers and devices communicating with each other on a network must do so while following a common set of rules for exchanging information, or protocol. An IrDA network protocol uses remoted controls or other data transmission within close proximity.)

What is a digital certificate?

Technology used to verify a user's identity

Which of the following is a disadvantage of using cloud computing to share files?

The inability to access your files if you lose your Internet connection.

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?

The network connection is probably not secure

Marley stayed up late to watch the planet Mars rise in the east. She had read online that Mars was unusually close to the Earth in its orbit and would look nearly as large as the moon. However, she only saw stars, and the next morning she ended up oversleeping because of her late bedtime. Marley was the victim of __________.

a hoax

Kristy just received a laptop from her employer so she can work from home. She wonders if she can also use the laptop for personal activity, such as streaming movies. What documentation should Kristy check to find the answer to her question?

acceptable use policy

Francis closely monitors customer reviews on Google for his landscaping business. Most customers post high praise for his work; however, today he discovered an extremely negative review posted by someone claiming the name "Superman." Clearly, this is a fake name, and Francis has no way of following up with the person to determine what he can do to resolve the problem or even to know if it's a real customer. This is an example of __________.

catfishing

What does a DSL modem use to send and receive digital data?

copper telephone wiring

Which of the following problematic behaviors relies on the use of digital technology?

cyberbullying

Creating a(n) _____ means copying files from a computer's hard drive and storing them in a remote location.

data backup

Curtis decided to leave his smartphone in his car as he heads out for a day long hike. This is an example of a ______________.

digital detox

Josie is scrolling through her social media newsfeed when she sees a photo of her that a friend posted. The photo is embarrassing and was taken without Josie's knowledge when she was staying at the friend's house. Josie requests the photo be taken down. Josie is managing her own ___________.

digital footprint

Brad donates his old phone to a nearby charity, which refurbishes phones and offers them at no cost to challenged populations in the area. These people can use the free phones to help them find housing, employment, and other community resources. This program supports ______________.

digital inclusion

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

intranet

When describing a client/server network, which of the following would be considered a client?

laptop

Which of the following is a characteristic of a strong password?

letters, numbers, and symbols

To access the Internet, a router must be connected to a _____.

modem

What rules should guide your behavior when you interact with friends and coworkers on social media?

netiquette

What internal device does a computer use to connect to a wired or a wireless network?

network interface card

Devices on a _____ area network are connected via Bluetooth.

personal

Which of the following forms of identity theft involves posing as a legitimate researcher to ask for personal information?

pretexting -- (Some of the actions that can be undertaken by identity thieves include: file for bankruptcy under the person's name, go on spending sprees, open a bank account in the person's name, obtain loans for expensive items such as cars.)

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

protocol

With more and more people using technology, what physical health diagnosis is on the rise?

repetitive strain injury

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

virtual private network

What type of network sends signals through airwaves and usually does not require cables?

wireless network

What is it called when an attacker convinces you to enter personal information at an imposter website after receiving an email from a person masquerading as an employee from your bank?

phishing

What hardware is essential to creating a home Wi-Fi network?

router

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

social engineering

Which of the following types of websites typically provides the least security?

social media sites

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.

standards -- (Net neutrality supports the concept that the Internet should be neutral and all traffic should be treated equally.)

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

star

You can monitor and protect your financial data in all of the following ways EXCEPT _____.

storing financial information in an unsent email message.

Why would you want to connect your computer to a network?

to access shared resources, such as hardware, software, data, and information

How can you protect a computer from electrical spikes and surges?

use a surge protector


Related study sets

SPN 312 examen 2: cap. 5, 7, 8, 10, y sor juana

View Set

Intro to Supply Chain Management Ch 1

View Set

Unit 4 - media and intrest groups ( ap gov and politics )

View Set

AP Psychology Chapter 2: Test Review

View Set