Module 10 Flashcards
Networks allow computers to share resources, such as hardware, software, data, and information.
True
False
True
Reason: Networks are designed to enable sharing of various resources including files, software applications, and hardware (e.g., printers) between multiple computers and devices, reducing costs and enhancing collaboration.
Encryption converts unrecognizable data into recognizable data.
True
False
False
Reason: Encryption works by converting recognizable data into an unrecognizable format to ensure security, and only authorized parties with the correct decryption key can convert it back into readable form
A DSL modem uses existing standard copper telephone wiring to send and receive digital data.
True
False
True
Reason: DSL technology uses copper telephone lines to transmit digital signals, enabling Internet access without disrupting regular phone calls
Adware tracks and transmits personal information from your computer or device without your knowledge.
True
False
True
Reason: Adware typically monitors user behavior and transmits personal information, often leading to privacy concerns as it happens without the user’s explicit consent
Which government agency is responsible for releasing the rules surrounding Internet access?
A.
Internet Advisory Board (IAB)
B.
None of the above
C.
Internet Access Commission (IAC)
D.
Federal Communications Commission (FCC)
D. Federal Communications Commission (FCC)
Reason: The FCC regulates communications, including Internet access, in the U.S., setting policies to ensure open and fair access.
The Ethernet standard controls how network interface cards (NICs), routers, and modems share access to cables and phone lines, as well as dictates how to transmit data.
True
False
True
Reason: Ethernet standards define the protocols and guidelines for devices like NICs and routers to communicate over local area networks (LANs)
A switch is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer.
True
False
False
Reason: A switch is used to connect devices within a LAN, not to connect directly to the Internet. Routers are used to link local networks to external networks like the Internet
Which of the following describes a normal-looking, yet fraudulent Wi-Fi network?
A.
evil twin
B.
spoof
C.
trojan
D.
virtual private network
A. evil twin
Reason: An evil twin is a fake Wi-Fi network that mimics a legitimate one to trick users into connecting, allowing attackers to steal personal information.
Which of the following is a private network used by organizations to communicate internally?
A.
extranet
B.
virtual network
C.
intranet
D.
Internet
C. intranet
Reason: An intranet is a closed network accessible only to authorized users within an organization for internal communication and information sharing
Which of the following is an advisable practice for securing data stored on a network?
A.
Store data on a separate storage device instead of one that is connected to the network.
B.
Allow all network users access to all data.
C.
Only grant access to data to those with a legitimate need.
D.
Store all data on network attached storage.
C. Only grant access to data to those with a legitimate need.
Reason: Limiting access based on necessity follows the principle of least privilege, enhancing security by minimizing potential data breaches
Which of the following is not a common network topology?
A.
mesh network
B.
star network
C.
client/server network
D.
bus network
C. client/server network
Reason: Client/server is a network model, not a topology. Common topologies include mesh, star, and bus networks
Two types of firewalls include hardware firewalls and software firewalls.
True
False
True
Reason: Firewalls can be implemented both as hardware (physical devices) and software to protect networks by filtering traffic
Which of the following is not a safety precaution for securing a wireless network?
A.
Change the administrative password from the factory-provided default.
B.
Disable WPA2.
C.
Regularly check for and perform updates to your router’s software.
D.
Regularly change the wireless network key.
B. Disable WPA2.
Reason: WPA2 is a security protocol for wireless networks. Disabling it would reduce security, making the network more vulnerable to unauthorized access