Filters
Question type

Study Flashcards

To protect a computer or a server,a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.


A) ethernet
B) firewall
C) protocol
D) rootkit

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

After receiving an email from what appeared to be your bank,why did you become suspicious that this was a phishing email?


A) It did not include a promotional offer.
B) It was written in an overly formal tone.
C) The signature was consistent with other emails from your bank.
D) It contained typos and other grammatical errors.

E) B) and D)
F) A) and B)

Correct Answer

verifed

verified

After your last family vacation,everyone uploaded their photos to a NAS device so everyone would have access to view them.

A) True
B) False

Correct Answer

verifed

verified

Which of the following would be considered a strong password?


A) Password123
B) Abc123456789
C) CatCatCatCat
D) Wbcm2!4!820!

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

When it comes to secure data storage on a network,which of the following statements is true?


A) Encrypted files are not able to be saved on a network attached storage device.
B) Passwords are the safest method for protecting files on a network.
C) Roles can be granted to individuals to view files and make changes to files on a network.
D) Files stored on a network are accessible to all who can access that network.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

How does a wireless network key work with an encrypted wireless network?


A) The wireless key is the encryption code needed by the receiver to decode the file.
B) The sending and receiving devices must know the wireless network key to communicate.
C) The wireless network needs the key to decode the data before sending.
D) The wireless network key is your password for logging onto an Internet email system to receive files.

E) None of the above
F) C) and D)

Correct Answer

verifed

verified

To protect confidential company information from hackers while at a work conference,you must be sure to use which of the following networks when accessing the Internet at a hotel?


A) Extranet
B) Intranet
C) Wireless network
D) Virtual private network

E) A) and D)
F) A) and C)

Correct Answer

verifed

verified

In order for your router to access Internet connections,it must be connected to a _____.


A) network
B) hub
C) switch
D) modem

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Which of the following could indicate a DoS attack on your company server?


A) Customers are required to enter personal information as they complete an order form.
B) Customers are receiving too many emails about special offers.
C) Customers cannot view the website on their device because the page will not load.
D) Customers cannot download the most recent newsletter.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

To encrypt data sent between devices,a wireless network key that uses a series of letters and symbols is often used.

A) True
B) False

Correct Answer

verifed

verified

What hardware is essential to creating a home Wi-Fi network?


A) Printer
B) Router
C) Monitor
D) Ethernet cord

E) A) and C)
F) None of the above

Correct Answer

verifed

verified

How will cellular networks challenge cable and DSL providers in the future?


A) Cellular providers are continuing to increase their speeds and decrease bandwidth causing users to drop cable and DSL services.
B) Cellular providers are able to offer data plans that are the same price as cable and DSL yet offer more services.
C) Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services.
D) Cellular providers are able not regulated by the FCC so they are able to avoid the ISP net neutrality rules that cable and DSL must adhere to.

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?


A) Social engineering
B) A zombie attack
C) An evil twin
D) Spyware

E) C) and D)
F) All of the above

Correct Answer

verifed

verified

Which of the following is true about broadband connections?


A) Broadband connections turn off after lack of activity for a period of time,similar to when computers go to sleep.
B) Broadband connections are "always-on" with devices connected to them.
C) Broadband connections are difficult to find as there are few of them around today.
D) Broadband connections require a wireless router in order to increase their speed.

E) A) and B)
F) None of the above

Correct Answer

verifed

verified

What internal device does a computer use to connect to a wired or a wireless network?


A) Motherboard
B) Hub
C) Switch
D) Network interface card

E) B) and D)
F) All of the above

Correct Answer

verifed

verified

Why is a cable modem classified as a digital model?


A) It only sends digital data over a digital line.
B) It sends and receives digital data over a digital line.
C) It only receives digital data over a digital line.
D) It uses copper wires to enable efficient digital data transfers.

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

If you connect to a Wi-Fi network that does not require a wireless network key,it is still secure enough to send private information because wireless networks encrypt all data anyway.

A) True
B) False

Correct Answer

verifed

verified

In a _____ network,each device on the network is attached to a central server.If the server fails,then the other devices will be unable to communicate,but if a connected device fails,then all other devices will still be able to communicate.


A) Bus
B) Ring
C) Star
D) Mesh

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

4G and 5G networks provide slower speed data transmission.

A) True
B) False

Correct Answer

verifed

verified

Why does net neutrality affect Internet connections?


A) Because it is a global resource,Internet services can be restricted by content or bandwidth.
B) Because it selects websites by content,Internet services can be restricted by bandwidth.
C) Because it supports all websites in the same way,Internet services cannot be restricted by content or bandwidth.
D) Because it selects websites by amount of bandwidth needed,Internet services can be restricted by content.

E) None of the above
F) B) and C)

Correct Answer

verifed

verified

Showing 21 - 40 of 45

Related Exams

Show Answer