A) VPN
B) Extranet
C) Wi-Fi
D) Intranet
Correct Answer
verified
Multiple Choice
A) They use adware filling your screen with unwanted advertisements until you click on one.
B) They overload the server with network traffic so webpages will not load.
C) They disguise the network as an evil twin.
D) They encrypt your computer data and hold it hostage until you pay a fee,usually with bitcoins.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) The company would have to use RFID transmitted through radio signals.
B) The company would have to use an IrDA network protocol within close proximity.
C) The company would have to use NFC to facilitate close-range communication.
D) The company would have to use a high-speed data transmission with access to high bandwidth.
Correct Answer
verified
Multiple Choice
A) RFID
B) NFC
C) Bluetooth
D) IrDA
Correct Answer
verified
Multiple Choice
A) A hub
B) A switch
C) A router
D) A network interface card
Correct Answer
verified
Multiple Choice
A) A telecommunications company that sells Internet access.
B) A communications device that connects to a communications channel.
C) A central point for cables in a network for data sharing,
D) A system of two or more devices linked by wires,cables,or a telecommunications system.
Correct Answer
verified
Multiple Choice
A) It is a physical device that acts as a protective barrier.
B) It is also called software firewall.
C) It is often built into a company's operating system.
D) It inspects data being transmitted to or from a network.
Correct Answer
verified
Multiple Choice
A) Wired network
B) Intranet
C) Extranet
D) Virtual private network
Correct Answer
verified
Multiple Choice
A) The amount of space that files will take up on your computer.
B) The inability to access your files if you lose your Internet connection.
C) The files you will lose if your computer crashes.
D) How long it will take to access a backup of files.
Correct Answer
verified
Multiple Choice
A) They are interchangeable terms for the same hardware.
B) They provide a central point for cables in a network.
C) They transfer data to all devices.
D) They can only connect to a single device.
Correct Answer
verified
Multiple Choice
A) Wired network
B) Intranet
C) Wireless network
D) Virtual private network
Correct Answer
verified
Multiple Choice
A) Because of net neutrality,your ISP provider has reduced its bandwidth to cut costs,slowing the Internet for you.
B) Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.
C) Because of FCC rules,content that requires more bandwidth is given preference over content that does not require as much bandwidth.
D) Because of FCC rules,ISP providers are not allowed to restrict bandwidth and must provide high bandwidth in every location where low bandwidth is provided.
Correct Answer
verified
Multiple Choice
A) Copper telephone wiring
B) Cable TV connections
C) A wireless router
D) A network interface card
Correct Answer
verified
Multiple Choice
A) Many public networks are not secure.
B) All public networks are free.
C) Your home network is a public network.
D) Hackers cannot intercept data transmitted over public networks.
Correct Answer
verified
Multiple Choice
A) local
B) wide
C) metropolitan
D) personal
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A device infected with malware that an attacker uses to control the device remotely.
B) A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
C) A type of malware that disguises itself as or hides itself in a legitimate file,and then causes damage to programs and data when opened.
D) An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Correct Answer
verified
Multiple Choice
A) A unique hardware address for your device
B) The connection needed to access to a cellular network
C) An IP address unique to Apple's MAC computers
D) An alternate name Internet Protocol version 6
Correct Answer
verified
Multiple Choice
A) You could send a flash drive with the report on it that you have password protected with the president's name.
B) You could encrypt the data in the report that only you can decode.
C) You could send the email and then forget to attach the report causing the president to call and ask you about it.
D) You could encrypt the data and then use the company NAS device and assign permissions only to the president.
Correct Answer
verified
Showing 1 - 20 of 45
Related Exams