i
hoctot
Fragen und a
Top -Listen
Token
Stichworte
Fragen und a
Top -Listen
Token
Stichworte
Stichworte: Computer network
What type of communication will send a message to all devices on a local area network a multicast?
What type of communication will send a message to a selected set of hosts on a local area network?
What US government agency operates the Computer Forensic Tool Testing project quizlet?
What do we call a criminal act that involves the use of the computer and the internet?
What type of malware can copy itself and infect a computer without the users consent or knowledge?
In what type of network topology are all computers considered equal and do not share any central authority?
In what type of network are all computers considered equal and do not share any central authority?
Networking Essentials (Version 2) -- Modules 13 - 16: Home Network Basics pre test Exam
Refers to protecting data and computer system against dishonesty or negligence of employees.
Appropriate forensic computer-investigation methods and protocols do not include _____.
Case that contains electronic components of the computer that are used to process data.
A weakness in an asset or group of assets that can be exploited by one or more threats.
In what layer in the TCP IP reference model determines the best path through the network?
You must complete all work for your online course using a desktop or a laptop computer.
Which protocol is used by the ping command to test the connectivity between the devices?
Which layer in the TCP IP model is used to determines the best path through the network?
Wie kann ich 2 Computer miteinander verbinden?
This network device sends the data packet from a computer to all devices connected to it.
To communicate with another computer on a network your computer sends a message called an
The _____ is the part of a computer that executes the instructions of a computer program.
Which cleaning tool should be used to remove dust from components inside a computer case?
When a network interface card in operating in promiscuous mode, what action does it take?
One piece of information that the arrows within the activity-on-node network can convey is
What is a computer that is designed to request information from a server group of answer choices?
Is an external device that attaches to a mobile computer or device which contains a power connection and provides connections to peripheral devices?
What card converts computer output into a signal that travels through a cable to the monitor which displays an image on the screen?
What address is a unique number that identifies a computer server or device connected to the Internet?
What is a number that uniquely identifies each computer or device connected to the Internet?
What is another name for a collection of data or computer instructions that tell the computer how do you work?
What is an internal corporate network which is built using Internet and World Wide Web standards and products called?
What can be used to allow visitor mobile devices to connect to a wireless network and restrict access of those devices to only the Internet?
What can be used to allow visitors mobile devices to connect to a wireless network and restrict access of those devices to only the Internet?
What do you call for the storage device that contains the operating system application software files user files and many other parts of the computer?
What do you call for the storage device that contains the operating system application software files user files and many other files of the computer?
A ______ is a program that takes complete control of your computer without your knowledge.
Which of the following is not a difference that is introduced when an entity uses the computer in processing its transactions?
Which are negative consequences of using the smoothing leveling process on a project network?
Which of the following is a virtual file system provided by Linux 2.6 that is used to gather information about the system?
Which of the following are components of a network that are defined by structured cabling?
Which of the following interprets program instructions and processes data in the computer?
What term is used to describe a network device with the primary function of providing information to other devices?
What is the delay in the amount of time for data to travel between two points on a network Goodput bandwidth throughput latency navigation bar?
Is a type of artificial system that enables computer to change how it functions to situations based on feedback it receives?
What type of computer system can recognize and act on patterns or trends that it detects in large sets of data and is developed to operate like the hu?
Which of the following is a computer system that can simulate the functioning of a human brain?
Was bedeuter p2p-netzwerk bittorent
Which type of network cable contains multiple copper wires and does not use extra shielding to prevent interference?
Which type of network cable contains multiple copper wires and uses extra shielding to prevent interference select one?
Which criterion can be used to select the appropriate type of network media for a network?
What is a computer based information system that keeps track of the transactions needed to conduct business?
Is a device that allows you to connect two or more networks in either a wired or wireless connection?
An extremely fast computer that can perform hundreds of millions of instructions per second
Physical and mechanical components of a computer such as the monitor, mouse, chips, keyboard, etc.
Is a series of instructions that tells the hardware of a computer what to do and how do you do it?
What do you call the computer software which you configure before installing the operating system OS?
What type of hardware that is used to output the result process by the computer is called?
Is systematic way to explore the consequences of specific choices using computer software?
Which software gathers information about a computer without the users knowledge or consent?
Which of the following is a type of software that is placed on users computers without consent or knowledge while using the Internet?
What is the term for a file that attaches itself to a program then moves from computer to computer?
What do you call a software that is designed to exploit a computer system and is a broad term covering computer viruses worms Trojan etc?
Is a software or hardware device designed to gain administrator level control over a computer system without being detected?
What is the piece of programming code disguised as something else to cause an undesirable event called?
What malicious program that is disguised as a useful program but once downloaded leaves your computer on protected?
Using numerous computers to inundate and overwhelm the network from numerous launch points is called
What type of malware installed on a computer without the knowledge or permission of the user and replicates itself on the computer or throughout a network?
What is a program that secretly takes over another computer for the purpose of launching attacks on other computers?
Which of the following is used as a network security attack to hijack the ongoing sessions and capture the important data that is in exchange between two parties?
What type of software monitors all incoming and outgoing traffic for your computer and blocks suspicious activity?
What are the required information to record on the patients chart or to enter into the computer?
Which of the following term is used to describe a vulnerable computer that is set up to entice an intruder to break into it?
The network of glands that release chemical messengers directly into the bloodstream is called the
Is recorded media that users can download or stream to a computer or portable media player.
What is a network command line utility in MS Windows that tracks and displays the route taken by IPv4 packets on their way to another host known as?
Is the process of copying and archiving the computer data so that it may be used to restore its original data after a data loss event?
A technique intruders use to make their network or internet transmission appear legitimate.
Which small group network relies on a central figure to serve as the intermediary for all group communication?
What is the formula to calculate the total number of host addresses available on a network?
How many of the 4 octets are used to define the network portion of the address in a class B network?
What layer of the TCP IP reference model is responsible for selecting the best path through the network from source to destination?
Which TCP or IP model layer is responsible for providing the best path through the network?
On an ospf network what are the default intervals for the hello, dead, wait, and retransmit timers?
Which security measure is in place when a client is denied access to the network due to outdated antivirus software?
What layer in the Transmission Control Protocol Internet Protocol TCP IP model does IP use transport data link physical network?
Which type of wireless network requires a clear line of sight between transmitter and receiver?
Which of the following is not one of the main differences between the types of network cabling?
Is a network of storage devices that communicate directly with each other and with other networks?
Which model does the cloud provider keep the hardware up to date but operating system maintenance and network configuration are left to the cloud tenant?
In which model does the cloud provider keep the hardware up to date but operating system maintenance and network configuration are left to the cloud tenant?
Which TCP IP application allows a network user to remotely log on and manipulate a network device?
What is a printed circuit board containing the principal components of a computer or other device?
What is one way hackers can trick you into transmitting personal data on a public network without your knowledge?
What type of acquisition is done if the computer has an encrypted drive and the password or passphrase is available?
What will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?
Will translate a personal characteristic into a digital code that is used to compare with a digital code stored in the computer?
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?
Which of the following is a private network used by organizations to communicate internally quizlet?
Which of the following is primarily concerned with the security of the Web server because it can provide an easy means of getting into the local network?
What are the three 3 potential risks associated with using an unprotected wireless network?
What layer works for the transmission of data from one host to the other located in different networks?
Vorherige
1
2
3
4
5
6
Nächste
Werbung
NEUESTEN NACHRICHTEN
A set of formalized rules and standards that describe what a company expects
1 Jahrs vor
. durch
AffiliatedTicker
How do you protect against a similar incident occurring again in the future?
1 Jahrs vor
. durch
EducationalBonus
Wann blockiert das Hinterrad beim Motorrad?
1 Jahrs vor
. durch
All-whiteBattery
Antrag auf Erhöhung des Grades der Behinderung Sachsen
1 Jahrs vor
. durch
RainyRegulator
Wer ist englischer meister geworden
1 Jahrs vor
. durch
MainCatholicism
Was macht der nat typ für einen unterschied
1 Jahrs vor
. durch
Million-dollarOverseer
Using threats or intimidation to persuade someone is which influence tactic?
1 Jahrs vor
. durch
AbandonedDispatcher
Wie spät ist es Schreib die Uhrzeit auf?
1 Jahrs vor
. durch
WealthyHearth
Süßigkeiten die es nicht mehr gibt
1 Jahrs vor
. durch
GovernmentalCutter
Was hilft gegen Migräne mit Aura
1 Jahrs vor
. durch
InsatiableEarnings
Werbung
Populer
Werbung
home
en
de
fr
ko
pt
zh
it
th
tr
Urheberrechte © © 2024
i
hoctot
Inc.