Module 10 Flashcards

1
Q

Networks allow computers to share resources, such as hardware, software, data, and information.

True
False

A

True
Reason: Networks are designed to enable sharing of various resources including files, software applications, and hardware (e.g., printers) between multiple computers and devices, reducing costs and enhancing collaboration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Encryption converts unrecognizable data into recognizable data.

True
False

A

False
Reason: Encryption works by converting recognizable data into an unrecognizable format to ensure security, and only authorized parties with the correct decryption key can convert it back into readable form​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A DSL modem uses existing standard copper telephone wiring to send and receive digital data.

True
False

A

True
Reason: DSL technology uses copper telephone lines to transmit digital signals, enabling Internet access without disrupting regular phone calls​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Adware tracks and transmits personal information from your computer or device without your knowledge.

True
False

A

True
Reason: Adware typically monitors user behavior and transmits personal information, often leading to privacy concerns as it happens without the user’s explicit consent​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which government agency is responsible for releasing the rules surrounding Internet access?

A.
Internet Advisory Board (IAB)

B.
None of the above

C.
Internet Access Commission (IAC)

D.
Federal Communications Commission (FCC)

A

D. Federal Communications Commission (FCC)
Reason: The FCC regulates communications, including Internet access, in the U.S., setting policies to ensure open and fair access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.

True
False

A

True
Reason: Ethernet standards define the protocols and guidelines for devices like NICs and routers to communicate over local area networks (LANs)​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A switch is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer.

True
False

A

False
Reason: A switch is used to connect devices within a LAN, not to connect directly to the Internet. Routers are used to link local networks to external networks like the Internet​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following describes a normal-looking, yet fraudulent Wi-Fi network?

A.
evil twin

B.
spoof

C.
trojan

D.
virtual private network

A

A. evil twin
Reason: An evil twin is a fake Wi-Fi network that mimics a legitimate one to trick users into connecting, allowing attackers to steal personal information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following is a private network used by organizations to communicate internally?

A.
extranet

B.
virtual network

C.
intranet

D.
Internet

A

C. intranet
Reason: An intranet is a closed network accessible only to authorized users within an organization for internal communication and information sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is an advisable practice for securing data stored on a network?

A.
Store data on a separate storage device instead of one that is connected to the network.

B.
Allow all network users access to all data.

C.
Only grant access to data to those with a legitimate need.

D.
Store all data on network attached storage.

A

C. Only grant access to data to those with a legitimate need.
Reason: Limiting access based on necessity follows the principle of least privilege, enhancing security by minimizing potential data breaches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is not a common network topology?

A.
mesh network

B.
star network

C.
client/server network

D.
bus network

A

C. client/server network
Reason: Client/server is a network model, not a topology. Common topologies include mesh, star, and bus networks​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Two types of firewalls include hardware firewalls and software firewalls.

True
False

A

True
Reason: Firewalls can be implemented both as hardware (physical devices) and software to protect networks by filtering traffic​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is not a safety precaution for securing a wireless network?

A.
Change the administrative password from the factory-provided default.

B.
Disable WPA2.

C.
Regularly check for and perform updates to your router’s software.

D.
Regularly change the wireless network key.

A

B. Disable WPA2.
Reason: WPA2 is a security protocol for wireless networks. Disabling it would reduce security, making the network more vulnerable to unauthorized access​

How well did you know this?
1
Not at all
2
3
4
5
Perfectly