Filters
Question type

Study Flashcards

Why is a cable modem classified as a digital model?


A) It only sends digital data over a digital line.
B) It sends and receives digital data over a digital line.
C) It only receives digital data over a digital line.
D) It uses copper wires to enable efficient digital data transfers.

E) None of the above
F) A) and C)

Correct Answer

verifed

verified

Which of the following is an example of a personal area network?


A) computers connected within a city
B) computers connected within a home
C) smartwatch and phone connected via Bluetooth
D) phone and computer connected via Wi-Fi

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

C

Which of the following could indicate a DoS attack on your company server?


A) Customers are required to enter personal information as they complete an order form.
B) Customers are receiving too many emails about special offers.
C) Customers cannot view the website on their device because the page will not load.
D) Customers cannot download the most recent newsletter.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?


A) VPN
B) Extranet
C) Wi-Fi
D) Intranet

E) All of the above
F) None of the above

Correct Answer

verifed

verified

In a connected network, how are hubs and switches similar to one another?


A) They are interchangeable terms for the same hardware.
B) They provide a central point for cables in a network.
C) They transfer data to all devices.
D) They can only connect to a single device.

E) A) and B)
F) B) and C)

Correct Answer

verifed

verified

Which of the following describes an evil twin?


A) A device infected with malware that an attacker uses to control the device remotely.
B) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
C) A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
D) An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.

E) B) and C)
F) B) and D)

Correct Answer

verifed

verified

A network administrator is usually not required on a _____ network.


A) peer-to-peer
B) client/server
C) intranet
D) metropolitan area

E) B) and D)
F) A) and D)

Correct Answer

verifed

verified

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?


A) Extranet
B) Intranet
C) Wireless network
D) Virtual private network

E) All of the above
F) None of the above

Correct Answer

verifed

verified

D

Bandwidth is a term that describes the number of devices connected to a network.

A) True
B) False

Correct Answer

verifed

verified

False

A router is a system of two or more devices linked by wires or cables.

A) True
B) False

Correct Answer

verifed

verified

While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?


A) My Verizon VPN
B) Starbucks Wi-Fi
C) Jenn's iPhone
D) xfinitywifi

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

Which of the following statements is NOT true about a local firewall?


A) It is a physical device that acts as a protective barrier.
B) It is also called software firewall.
C) It is often built into a company's operating system.
D) It inspects data being transmitted to or from a network.

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.


A) Bus
B) Ring
C) Star
D) Mesh

E) A) and C)
F) C) and D)

Correct Answer

verifed

verified

How does a wireless network key work with an encrypted wireless network?


A) The wireless key is the encryption code needed by the receiver to decode the file.
B) The sending and receiving devices must know the wireless network key to communicate.
C) The wireless network needs the key to decode the data before sending.
D) The wireless network key is your password for logging onto an Internet email system to receive files.

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.

A) True
B) False

Correct Answer

verifed

verified

Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.

A) True
B) False

Correct Answer

verifed

verified

To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.


A) ethernet
B) firewall
C) protocol
D) rootkit

E) None of the above
F) A) and B)

Correct Answer

verifed

verified

What hardware is essential to creating a home Wi-Fi network?


A) Printer
B) Router
C) Monitor
D) Ethernet cable

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

When using encryption from your home computer, how would you configure the router?


A) You can use the wireless router to set the encryption key and type of encryption.
B) You can use the wireless router to intercept encrypted information and block it from entering the network.
C) You can use the wireless router to verify the security certificate of the encrypted data being sent.
D) You can use the wireless router to encrypt and then decode the encryption on information sent and received.

E) B) and C)
F) A) and C)

Correct Answer

verifed

verified

Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.


A) topologies
B) architectures
C) standards
D) protocols

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

Showing 1 - 20 of 52

Related Exams

Show Answer