Chapter 10, 12 Flashcards
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
They disguise the network as an evil twin.
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
What is a MAC address?
A unique hardware address for your device
When describing a client/server network, which of the following would be considered a client?
Laptop
Which of the following is an example of a personal area network?
phone and computer connected via Wi-Fi
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network.
What is the U.S. Federal Communication Commission’s role in regard to Internet access?
To release rules surrounding Internet access
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report.
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
Which of the following is true about broadband connections?
Broadband connections are “always-on” connections.
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card