Chapter 10, 12 Flashcards
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
They disguise the network as an evil twin.
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
What is a MAC address?
A unique hardware address for your device
When describing a client/server network, which of the following would be considered a client?
Laptop
Which of the following is an example of a personal area network?
phone and computer connected via Wi-Fi
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network.
What is the U.S. Federal Communication Commission’s role in regard to Internet access?
To release rules surrounding Internet access
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report.
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
Which of the following is true about broadband connections?
Broadband connections are “always-on” connections.
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
Which of the following network standards applies to cellular networks?
LTE
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Virtual private network
What does a DSL modem use to send and receive digital data?
Copper telephone wiring
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers’ sales transactions from his laptop as he travels.
CRM
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea’s normal shopping habits and identify it as credit card fraud?
Data analytics
Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?
SaaS. Cloud consumers most commonly interact with Software as a Service (SaaS), which is software that is distributed online. Zoom, an online conference call app, is a popular SaaS.
Terrance needs to set up a Windows server in his company’s public cloud. What kind of cloud service will work best for this situation?
IaaS (Infrastructure as a Service) is a type of cloud service that allows customers to configure cloud-based networking infrastructure the way they want, such as routing, servers, operating systems, storage spaces, and security settings.
Charlie’s company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?
Online storefront
What technology allows Siri to understand you when you request a route to a location in a nearby city?
Natural language processing (NLP)
Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina’s job role?
Receiving clerk
Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?
Video conferencing application
Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle’s car using?
Reinforcement learning
Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she’s away from home?
Bluetooth connection
As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian’s wait time?
Artificial intelligence (AI)
For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?
Omnichannel strategy
What special technology allows computers to perform the intense processing needed to perform machine learning?
ANN
Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she’s at home?
Broad network access