Chapter 10, 12 Flashcards
Which of the following describes an evil twin?
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
protocol
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
They disguise the network as an evil twin.
Which of the following could indicate a DoS attack on your company server?
Customers cannot view the website on their device because the page will not load.
What is a MAC address?
A unique hardware address for your device
When describing a client/server network, which of the following would be considered a client?
Laptop
Which of the following is an example of a personal area network?
phone and computer connected via Wi-Fi
In a connected network, how are hubs and switches similar to one another?
They provide a central point for cables in a network.
What is the U.S. Federal Communication Commission’s role in regard to Internet access?
To release rules surrounding Internet access
How does a wireless network key work with an encrypted wireless network?
The sending and receiving devices must know the wireless network key to communicate.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
Encrypt the data in the report.
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Intranet
Which of the following statements do opponents of net neutrality agree with?
ISPs should charge more for high-bandwidth connections.
Which of the following is true about broadband connections?
Broadband connections are “always-on” connections.
What internal device does a computer use to connect to a wired or a wireless network?
Network interface card
Which of the following network standards applies to cellular networks?
LTE
Why is a cable modem classified as a digital model?
It sends and receives digital data over a digital line.
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Virtual private network
What does a DSL modem use to send and receive digital data?
Copper telephone wiring
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Star
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Extranet
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
Social engineering
Jake is a sales rep for a trucking company and travels throughout the Midwest. He uses a cloud-based _________ service so he can access updated information about his customers’ sales transactions from his laptop as he travels.
CRM
Rhea receives a text informing her that her credit card might have been compromised. The text asks her to confirm whether she made a purchase 15 minutes ago at a store that is over 2,000 miles away from her current location and that carries products she has never bought before. What technology was used to compare the purchase to Rhea’s normal shopping habits and identify it as credit card fraud?
Data analytics