A) It only sends digital data over a digital line.
B) It sends and receives digital data over a digital line.
C) It only receives digital data over a digital line.
D) It uses copper wires to enable efficient digital data transfers.
Correct Answer
verified
Multiple Choice
A) computers connected within a city
B) computers connected within a home
C) smartwatch and phone connected via Bluetooth
D) phone and computer connected via Wi-Fi
Correct Answer
verified
Multiple Choice
A) Customers are required to enter personal information as they complete an order form.
B) Customers are receiving too many emails about special offers.
C) Customers cannot view the website on their device because the page will not load.
D) Customers cannot download the most recent newsletter.
Correct Answer
verified
Multiple Choice
A) VPN
B) Extranet
C) Wi-Fi
D) Intranet
Correct Answer
verified
Multiple Choice
A) They are interchangeable terms for the same hardware.
B) They provide a central point for cables in a network.
C) They transfer data to all devices.
D) They can only connect to a single device.
Correct Answer
verified
Multiple Choice
A) A device infected with malware that an attacker uses to control the device remotely.
B) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
C) A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
D) An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Correct Answer
verified
Multiple Choice
A) peer-to-peer
B) client/server
C) intranet
D) metropolitan area
Correct Answer
verified
Multiple Choice
A) Extranet
B) Intranet
C) Wireless network
D) Virtual private network
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) My Verizon VPN
B) Starbucks Wi-Fi
C) Jenn's iPhone
D) xfinitywifi
Correct Answer
verified
Multiple Choice
A) It is a physical device that acts as a protective barrier.
B) It is also called software firewall.
C) It is often built into a company's operating system.
D) It inspects data being transmitted to or from a network.
Correct Answer
verified
Multiple Choice
A) Bus
B) Ring
C) Star
D) Mesh
Correct Answer
verified
Multiple Choice
A) The wireless key is the encryption code needed by the receiver to decode the file.
B) The sending and receiving devices must know the wireless network key to communicate.
C) The wireless network needs the key to decode the data before sending.
D) The wireless network key is your password for logging onto an Internet email system to receive files.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) ethernet
B) firewall
C) protocol
D) rootkit
Correct Answer
verified
Multiple Choice
A) Printer
B) Router
C) Monitor
D) Ethernet cable
Correct Answer
verified
Multiple Choice
A) You can use the wireless router to set the encryption key and type of encryption.
B) You can use the wireless router to intercept encrypted information and block it from entering the network.
C) You can use the wireless router to verify the security certificate of the encrypted data being sent.
D) You can use the wireless router to encrypt and then decode the encryption on information sent and received.
Correct Answer
verified
Multiple Choice
A) topologies
B) architectures
C) standards
D) protocols
Correct Answer
verified
Showing 1 - 20 of 52
Related Exams