ITE115 Exam 2
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
A modem can also function as what other piece of hardware?
A router
What is a MAC address?
A unique hardware address for your device
A router is a system of two or more devices linked by wires or cables.
False
If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.
False
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
It contained typos and other grammatical errors.
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
When describing a client/server network, which of the following would be considered a client?
Laptop
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
What hardware is essential to creating a home Wi-Fi network?
Router
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
The network connection is probably not secure.
What is the U.S. Federal Communication Commission's role in regard to Internet access?
To release rules surrounding Internet access
If you upload photos to a NAS device, everyone on the network can access them.
True
Which of the following would be considered a strong password?
Wbcm2!4!820!
When using encryption from your home computer, how would you configure the router?
You can use the wireless router to set the encryption key and type of encryption.
Devices on a _____ area network are connected via Bluetooth.
personal
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
standards
Why would you want to connect your computer to a network?
to access shared resources