Filters
Question type

Study Flashcards

A LAN would be used to ____.


A) connect personal computers within a very limited geographical area,such as a single building
B) connect several smaller networks together
C) provide high-speed connectivity for a metropolitan area
D) connect devices over a large geographical area

Correct Answer

verifed

verified

Symptoms of network problems include ____.


A) intermittent outages
B) slow response time
C) non-availability of network services to all workstations
D) all of the above

Correct Answer

verifed

verified

Wi-Fi signals cannot be disrupted by interference from devices such as microwave ovens,cordless telephones,and baby monitors._________________________

Correct Answer

verifed

verified

What is the difference between strong encryption and weak encryption? Explain how Public Key Encryption (PKE)can be used to provide strong encryption.

Correct Answer

verifed

verified

An encryption method is an example of we...

View Answer

An encrypted message is referred to as ____.


A) keytext
B) strong text
C) ciphertext
D) plaintext

Correct Answer

verifed

verified

Thomas is a network expert, having mastered the finer points of network structure, topology, and geographical scope. He has built many different types of networks at home, school, and work. He is now designing a home network for his friend. -Thomas's friend has a particular folder into which he wants to allow people to put files without allowing them to open,copy,or change any files in that folder.What kind of permission should Thomas assign to this folder?


A) Read only
B) Read and write
C) Homegroup
D) Write only

Correct Answer

verifed

verified

Bluetooth is often used to connect workstations to a LAN.

Correct Answer

verifed

verified

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security. -Esteban decides to install a wireless network.Which LAN technology will he most likely choose?


A) Bluetooth
B) WUSB
C) Infrared
D) Wi-Fi

Correct Answer

verifed

verified

A ____ is NOT a type of network device.


A) hub
B) switch
C) workstation
D) router

Correct Answer

verifed

verified

Most routers supply a WAN port designed for an Internet connection.

Correct Answer

verifed

verified

  -In the accompanying figure,the item on the left can be used with a laptop or desktop computer. -In the accompanying figure,the item on the left can be used with a laptop or desktop computer.

Correct Answer

verifed

verified

  -When network discovery is turned on in a wireless network,any Wi-Fi enabled device within range of your network,such as the one shown in the accompanying figure,can see its <u>URL</u>._________________________ -When network discovery is turned on in a wireless network,any Wi-Fi enabled device within range of your network,such as the one shown in the accompanying figure,can see its URL._________________________

Correct Answer

verifed

verified

MATCHING Identify the letter of the choice that best matches the phrase or definition. -Carries data signals only for short distances and with a clear line of sight


A) cryptographic key
B) ciphertext
C) gateway
D) node
E) narrowband
F) infrared light
G) communications protocol
H) bandwidth
I) MAC address
J) Ethernet adapter
K) packet
L) RF signals

Correct Answer

verifed

verified

  -In the accompanying figure,IWC-guest is a(n) <u>secure</u> network._________________________ -In the accompanying figure,IWC-guest is a(n) secure network._________________________

Correct Answer

verifed

verified

A storage device that directly connects to a network is called network peripheral storage._________________________

Correct Answer

verifed

verified

The Internet is the world's largest example of a(n) LAN._________________________

Correct Answer

verifed

verified

____ transforms a message in such a way that its contents are hidden from unauthorized readers.


A) Encryption
B) Encapsulation
C) Concatenation
D) Polymorphism

Correct Answer

verifed

verified

Two devices on a network might have to negotiate their communications protocols through a process called ____.


A) handshaking
B) synchronization
C) realization
D) introduction

Correct Answer

verifed

verified

A(n)____________________ is any device that contains network circuitry to directly connect to a network.

Correct Answer

verifed

verified

networked ...

View Answer

MATCHING Identify the letter of the choice that best matches the phrase or definition. -A unique number assigned to a network interface card when it is manufactured


A) cryptographic key
B) ciphertext
C) gateway
D) node
E) narrowband
F) infrared light
G) communications protocol
H) bandwidth
I) MAC address
J) Ethernet adapter
K) packet
L) RF signals

Correct Answer

verifed

verified

Showing 61 - 80 of 150

Related Exams

Show Answer