Chapter 10, 12 Flashcards

1
Q

Which of the following describes an evil twin?

A

A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

A

protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?

A

They disguise the network as an evil twin.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following could indicate a DoS attack on your company server?

A

Customers cannot view the website on their device because the page will not load.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is a MAC address?

A

A unique hardware address for your device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When describing a client/server network, which of the following would be considered a client?

A

Laptop

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is an example of a personal area network?

A

phone and computer connected via Wi-Fi

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

In a connected network, how are hubs and switches similar to one another?

A

They provide a central point for cables in a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the U.S. Federal Communication Commission’s role in regard to Internet access?

A

To release rules surrounding Internet access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How does a wireless network key work with an encrypted wireless network?

A

The sending and receiving devices must know the wireless network key to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?

A

Encrypt the data in the report.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following statements do opponents of net neutrality agree with?

A

ISPs should charge more for high-bandwidth connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following is true about broadband connections?

A

Broadband connections are “always-on” connections.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What internal device does a computer use to connect to a wired or a wireless network?

A

Network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following network standards applies to cellular networks?

A

LTE

17
Q

Why is a cable modem classified as a digital model?

A

It sends and receives digital data over a digital line.

18
Q

To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?

A

Virtual private network

19
Q

What does a DSL modem use to send and receive digital data?

A

Copper telephone wiring

20
Q

In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

A

Star

21
Q

As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?

A

Extranet

22
Q

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

A

Social engineering

23
Q

Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers’ sales transactions from his laptop as he travels.

A

CRM

24
Q

Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea’s normal shopping habits and identify it as credit card fraud?

A

Data analytics

25
Q

Meghan signs into Zoom to attend a video call for her online class. What kind of cloud service is she using?

A

SaaS. Cloud consumers most commonly interact with Software as a Service (SaaS), which is software that is distributed online. Zoom, an online conference call app, is a popular SaaS.

26
Q

Terrance needs to set up a Windows server in his company’s public cloud. What kind of cloud service will work best for this situation?

A

IaaS (Infrastructure as a Service) is a type of cloud service that allows customers to configure cloud-based networking infrastructure the way they want, such as routing, servers, operating systems, storage spaces, and security settings.

27
Q

Charlie’s company makes custom-designed furniture. He purchases hardware for the furniture in bulk from a distributor in a nearby state. What kind of e-commerce platform does Charlie most likely use to order the hardware?

A

Online storefront

28
Q

What technology allows Siri to understand you when you request a route to a location in a nearby city?

A

Natural language processing (NLP)

29
Q

Sabrina pulls items from a box and inspects them to ensure the number of items matches what is listed on the packing list. She then places all the items on a conveyor belt to be transported to workers who stock shelves in the warehouse. What is Sabrina’s job role?

A

Receiving clerk

30
Q

Lionel works for a company that is trying to reduce travel time for their employees and allow more people to work from home. What kind of cloud service can Lionel use to attend meetings with his remote coworkers?

A

Video conferencing application

31
Q

Janelle is training an AI-powered model car to stay on an oval track drawn on the floor. The car drives in different directions and is scored by the training algorithm based on how closely the car stays on the track. What kind of learning model is Janelle’s car using?

A

Reinforcement learning

32
Q

Alannah just purchased a smart lock for her front door. How can she connect her lock to the Internet so she can control the lock when she’s away from home?

A

Bluetooth connection

33
Q

As Ian walks down the hall from his hotel room, he uses his Uber app to request a ride. The ride is waiting for him by the time he arrives in the lobby. What technology minimized Ian’s wait time?

A

Artificial intelligence (AI)

34
Q

For her purchase, Nadine selects the best deal from two coupon codes offered by a store, one that she received by email and one from a text. Which marketing technique is Nadine benefiting from?

A

Omnichannel strategy

35
Q

What special technology allows computers to perform the intense processing needed to perform machine learning?

A

ANN

36
Q

Which cloud technology characteristic ensures that a cloud customer can make changes to her cloud database from her smartphone while traveling for a conference and from her laptop when she’s at home?

A

Broad network access