Which of the following is a private network used by organizations to communicate internally quizlet?

Show
    Recommended textbook solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    Computer Organization and Design MIPS Edition: The Hardware/Software Interface

    5th EditionDavid A. Patterson, John L. Hennessy

    220 solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    Introduction to Algorithms

    3rd EditionCharles E. Leiserson, Clifford Stein, Ronald L. Rivest, Thomas H. Cormen

    720 solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    Engineering Electromagnetics

    8th EditionJohn Buck, William Hayt

    483 solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    Operating System Concepts

    9th EditionAbraham Silberschatz, Greg Gagne, Peter B. Galvin

    489 solutions

    Terms in this set (219)

    bullying that takes place on technology devices like cell phones, computers, and tablets using online social media platforms, public online forums, gaming sites, text messaging, or email. cyberbullying includes sending, posting, or sharing negative, harmful, mean-spirited, and usually false content about another person

    Sets with similar terms

    Home

    Subjects

    Expert solutions

    Create

    Log in

    Sign up

    Upgrade to remove ads

    Only ₩37,125/year

    • Flashcards

    • Learn

    • Test

    • Match

    • Flashcards

    • Learn

    • Test

    • Match

    Terms in this set (48)

    A modem can also function as what other piece of hardware?
    A. Hardrive
    B. Router
    C. Mouse pad

    Router

    Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
    A. It did not include a promotional offer.
    B. It was written in an overly formal tone.
    C. The signature was consistent with other emails from his bank.
    D. It contained typos and other grammatical errors.

    It contained typos and other grammatical errors.

    As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
    A. Store the report on a flash drive that you have password-protected with the president's name.
    B. Encrypt the data in the report.
    C. Send the email without attaching the report and ask the president to call you.
    D. Transfer the report to the cloud.

    Encrypt the data in the report.

    As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
    A. VPN
    B. Extranet
    C. Wi-Fi
    D. Intranet

    Extranet

    Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
    A. standard
    B. protocol
    C. syntax
    D. topology

    protocol

    Devices on a _____ area network are connected via Bluetooth.
    A. Public
    B. Personal

    personal

    In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.

    Star

    In a connected network, how are hubs and switches similar to one another?
    A. They are interchangeable terms for the same hardware.
    B. They provide a central point for cables in a network.
    C. They transfer data to all devices.
    D. They can only connect to a single device.

    They provide a central point for cables in a network

    Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
    A. topologies
    B. architectures
    C. standards
    D. protocols

    Standards

    To access the Internet, a router must be connected to a _____.
    A. network
    B. hub
    C. switch
    D. modem

    modem

    To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

    firewall

    To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel

    Virtual private network

    What does a DSL modem use to send and receive digital data?

    Copper telephone wiring

    What hardware is essential to creating a home Wi-Fi network?

    Router

    What internal device does a computer use to connect to a wired or a wireless network?

    Network interface card

    What is a MAC address?

    A unique hardware address for your device

    What is an ISP?

    A telecommunications company that sells Internet access.

    What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

    Social engineering

    What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
    A. They use adware to fill your screen with unwanted advertisements until you click one
    B. They overload the server with network traffic so webpages will not load
    C. They disguise the network as an evil twin
    D. They encrypt your computer data and hold it hostage until you pay a fee

    They disguise the network as an evil twin.

    What is the U.S. Federal Communication Commission's role in regard to Internet access?
    A. To rate Internet sites similar to movie ratings
    B. To restrict Internet access by location and population
    C. To regulate the bandwidth each website can have
    D. To release rules surrounding Internet access

    To release rules surrounding Internet access

    What type of network sends signals through airwaves and usually does not require cables?

    Wireless network

    When describing a client/server network, which of the following would be considered a client?

    Laptop

    When it comes to secure data storage on a network, which of the following statements is true?

    Roles can be granted to individuals to view files and make changes to files on a network.

    Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
    A. RFID
    B. NFC
    C. Bluetooth
    D. IrDA

    Bluetooth

    Which of the following could indicate a DoS attack on your company server?

    Customers cannot view the website on their device because the page will not load.

    Which of the following describes an evil twin?
    A. A device infected with malware that an attacker uses to control the device remotely.
    B. A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
    C. A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
    D. An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.

    A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.

    Which of the following is a disadvantage of using cloud computing to share files?
    A. The amount of space that files will take up on your computer.
    B. The inability to access your files if you lose your Internet connection.
    C. The files you will lose if your computer crashes.
    D. How long it will take to access a backup of files.

    The inability to access your files if you lose your Internet connection.

    Which of the following is an authentication method to keep your data safe?
    A. Fingerprint scanner
    B. Body area network
    C. Encryption
    D. Software firewall

    Fingerprint scanner

    Which of the following is an example of a personal area network?

    smartwatch and phone connected via Bluetooth

    Which of the following is true about broadband connections?

    Broadband connections are "always-on" with devices connected to them.

    Which of the following network standards applies to cellular networks?
    A. Wi-Fi
    B. LTE
    C. Phoneline
    D. Ethernet

    LTE

    Which of the following statements do opponents of net neutrality agree with?
    A. Access to websites should not be restricted based on content.
    B. All Internet traffic should be treated equally.
    C. The same level of service should be provided to all websites, regardless of purpose.
    D. ISPs should charge more for high-bandwidth connections.

    ISPs should charge more for high-bandwidth connections.

    Which of the following statements is NOT true about a local firewall?

    A firewall is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. There are two types of firewalls: hardware firewalls and software firewalls. Hardware firewalls are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network. Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system

    Which of the following statements is true about public networks?
    A. Many public networks are not secure
    B. All public networks are free
    C. Your home network is a public network
    D. Hacker cant intercept data transmitted over public networks

    Many public networks are not secure.

    While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

    My Verizon VPN

    True or False? 4G and 5G networks provide slower data transmission speeds than 3G networks.

    False

    True or False? Bandwidth is a term that describes the number of devices connected to a network.

    False

    True or False? If you connect to a Wi-Fi network that does not require a wireless network key, it is still secure enough to send private information because wireless networks encrypt all data anyway.

    False

    True or False? If you upload photos to a NAS device, everyone on the network can access them.

    True

    (True or False) networks allow computers to share resources, such as hardware, software, data, and information

    True

    (True or False) A switch is a communications device that connects a communications channel such as the Internet to a sending or receiving device such as a computer.

    False

    (True or False) A DSL modem uses existing standard copper telephone wiring to send and receive digital data.

    True

    Which of the following is not a common network topology?
    A. bus network
    B. star network
    C. client/server network
    D. mesh network

    Client/server network

    Which of the following is a private network used by organizations to communicate internally?
    A. Intranet
    B. Internet
    C. Extranet
    D. Virtual network

    Intranet

    (True or False) Adware tracks and transmits personal information from your computer or device without your knowledge.

    False

    Which of the following describes a normal-looking, yet fraudulent Wi-Fi network?
    A. virtual private network
    B. trojan
    C. spoof
    D. evil twin

    Evil twin

    (True or False) Two types of firewalls include hardware firewalls and software firewalls.

    True

    Which of the following is not a safety precaution for securing a wireless network?
    A. Regularly change the wireless network key.
    B. Change the administrative password from the factory-provided default.
    C. Disable WPA2.
    D. Regularly check for and perform updates to your router's software.

    Disable WPA2

    Sets with similar terms

    Chapter 7 test

    232 terms

    zxc215

    6.3.1.1-6.4.1.7

    24 terms

    Jason_Holcomb

    CGS2100 chapter 12

    73 terms

    TiffneyG

    CGS 2100 Exam 2 Winston (Summer B)

    60 terms

    AnselPonceDiama

    Sets found in the same folder

    Computer Concepts Module 8

    61 terms

    Pepepepepepepepepepo

    Computer Concept Module 9

    44 terms

    MackMarr

    Ch. 8 Cengage

    15 terms

    iceccone17PLUS

    Module 6 Computer Concepts Exam

    39 terms

    iceccone17PLUS

    Other sets by this creator

    Metabolism

    15 terms

    iceccone17PLUS

    The Structure and Function of Macromolec…

    59 terms

    iceccone17PLUS

    Water and Fitness of the environment

    24 terms

    iceccone17PLUS

    Chemical Context of Life

    21 terms

    iceccone17PLUS

    Recommended textbook solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    Starting Out with Python

    4th EditionTony Gaddis

    629 solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    Fundamentals of Python: First Programs

    2nd EditionKenneth Lambert

    419 solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    Introduction to Java Programming, Brief Version

    10th EditionY. Daniel Liang

    1,626 solutions

    Which of the following is a private network used by organizations to communicate internally quizlet?

    The Essentials of Computer Organization and Architecture

    4th EditionJulia Lobur, Linda Null

    376 solutions