Exam 3 Quiz 10

Ace your homework & exams now with Quizwiz!

Which of the following describes an evil twin? A device infected with malware that an attacker uses to control the device remotely. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened. An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

Liesel is working on a research paper on a computer at her school's library. She saves the document to the cloud, signs off, and then packs her book bag so she can get to class on time. On what device is her document stored? Her USB flash drive The library's computer A remote server Her smartphone

A remote server

What is an ISP? A telecommunications company that sells Internet access. A communications device that connects to a communications channel. A central point for cables in a network for data sharing, A system of two or more devices linked by wires, cables, or a telecommunications system.

A telecommunications company that sells Internet access.

Which of the following is true about broadband connections? Broadband connections turn off after a specified amount of idle time. Broadband connections are "always-on" connections. Only a few of today's Internet connections are broadband connections. Broadband connections require a wireless router to increase their speed.

Broadband connections are "always-on" connections

When your computer accesses a webpage, what role is your computer filling in the network architecture? Peer Server Client Administrator

Client

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it? Store the report on a flash drive that you have password-protected with the president's name. Encrypt the data in the report. Send the email without attaching the report and ask the president to call you. Transfer the report to the cloud.

Encrypt the data in the report.

A router is a system of two or more devices linked by wires or cables. True False

False

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication. True False

False

Which of the following is an authentication method to keep your data safe? Fingerprint scanner Body area network Encryption Software firewall

Fingerprint scanner

What can you use as a protective barrier on a network to keep out unauthorized traffic? Firewall Network attached storage (NAS) Encryption Biometric devices

Firewall

Donna is setting up her own web server to provide information to her clients. How will her web server be uniquely identified on the Internet? IP address Username and password Email address Network Security Key

IP address

Which of the following statements do opponents of net neutrality agree with? Access to websites should not be restricted based on content. All Internet traffic should be treated equally. The same level of service should be provided to all websites, regardless of purpose. ISPs should charge more for high-bandwidth connections.

ISPs should charge more for high-bandwidth connections

Which of the following items is NOT required to have a functioning network? Software Data Hardware Internet

Internet

If you want to share information with individuals who are internal to your organization, which type of network would you want to use? Wired network Intranet Extranet Virtual private network

Intranet

Which of the following statements is NOT true about a local firewall? It is a physical device that acts as a protective barrier. It is also called software firewall. It is often built into a company's operating system. It inspects data being transmitted to or from a network.

It inspects data being transmitted to or from a network.

Which of the following statements is NOT true about a local firewall? It is a physical device that acts as a protective barrier. It is also called software firewall. It is often built into a company's operating system. It inspects data being transmitted to or from a network.

It is a physical device that acts as a protective barrier

Which network topology is most likely to continue to function well even if one device fails? Star network Ring network Bus network Mesh network

Mesh network

Sandhya is installing a security camera at the entrance to her office. The camera needs power and network access, but there's no power outlet near the door. What technology can Sandhya use to get power to the security camera? Wi-Fi PoE TCP/IP LTE

POE

When it comes to secure data storage on a network, which of the following statements is true? You cannot save encrypted files on a network attached storage device. Wireless network keys are the safest method for protecting files on a network. Roles can be granted to individuals to view files and make changes to files on a network. Files stored on a network are accessible to all who can access that network.

Roles can be granted to individuals to view files and make changes to files on a network

A modem can also function as what other piece of hardware? A hub A switch A router A network interface card

Router

Zeke is settling in at a coffee shop for some study time before his next class. He notices the coffee shop's wireless network is secured and not open. What information does he need to ask from the barista so he can access the wireless network and get onto the Internet? Username Rootkit Firewall password Security key

Security key

You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this? She uses a hub at her home that she connects to through the app. She has installed switches that interact with the installed app on her phone. She has a home network with smart home devices. She dialed into her home modem through the app and sent a command through the router.

She has a home network with smart home devices.

Which of the following is an example of a personal area network? computers connected within a city computers connected within a home smartwatch and phone connected via Bluetooth phone and computer connected via Wi-Fi

Smart watch and phone connected via Bluetooth

Nancy receives a call from someone claiming to work for the local Sheriff's Department. The caller says Nancy hasn't paid her speeding ticket, and she's about to be arrested unless she pays the fine with a credit card over the phone. What kind of attack is this? Social engineering Denial of service Phishing Trojan

Social engineering

What does a DSL modem use to connect to an ISP? TV cable Ethernet cable Telephone cable Power cable

Telephone cable

Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network? He can use the network only for a limited time. The network connection is probably not secure. He cannot connect to the Internet from the network. The network most likely uses a firewall for protection

The network connection is probably not secure.

In a connected network, how are hubs and switches similar to one another? They are interchangeable terms for the same hardware. They provide a central point for cables in a network. They transfer data to all devices.

They provide a central point for cables in a network.

Why would you want to connect your computer to a network? to keep up with computing trends for added security to access shared resources to use the network's operating system

To use the networks operating system

If you upload photos to a NAS device, everyone on the network can access them. True False

True

Tyler recently discovered that his neighbors have been using his wireless network to stream movies in the evening. This has caused slower network performance for Tyler, who likes to play Internet games after work. What can Tyler do to protect his wireless network from his neighbors? Use a strong password for authentication Add a firewall to the network Change the key on his door Use a VPN

Use a strong password for authentication

How can smartphones without Wi-Fi access connect to the Internet? Using near field communication Using a Bluetooth connection Using a cellular network Using an Ethernet connection

Using a cellular network

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection? mobile hotspot Bluetooth connection virtual private network cell phone hotspot

Virtual private network

Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?

mobile hotspot

When an ISP must provide the same level of service to all websites, regardless of their content or purpose, what concept is being supported? Social engineering Freedom of choice Net neutrality Network security

net neutrality

A network administrator is usually not required on a _____ network.

peer-to-peer

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information? Social engineering A zombie attack An evil twin Spyware

Social engineering

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology. topologies architectures standards protocols

Standards

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate. Bus Ring Star Mesh

Star


Related study sets

Course 1 - QUIZ: Requirements and Architecture

View Set

ch. 14, 15 & 16 Career counseling

View Set

Interactive Animation: Stream Processes: Oxbow Lakes and Floodplain Development

View Set

RSM: Introduction to Business Midterm

View Set