ITE115 Canvas Module 6 Quiz
40 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Knowing the activities she plans to do online, which of the following networks should Georgia connect to?

  • Public Library Wi-Fi
  • Starbucks Free Wi-Fi
  • My Verizon VPN (correct)
  • Neighbors' Open Wi-Fi
  • How would you configure the router for encryption from your home computer?

    You can use the wireless router to set the encryption key and type of encryption.

    To protect a computer or a server, a(n) _____ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

    firewall

    Why is a cable modem classified as a digital model?

    <p>It sends and receives digital data over a digital line.</p> Signup and view all the answers

    To access the Internet, a router must be connected to a _____.

    <p>modem</p> Signup and view all the answers

    What does it indicate if Sean can connect to a wireless network without entering a network key?

    <p>The network connection is probably not secure.</p> Signup and view all the answers

    Which of the following statements do opponents of net neutrality agree with?

    <p>ISPs should charge more for high-bandwidth connections.</p> Signup and view all the answers

    Which of the following is an example of a personal area network?

    <p>Smartwatch and phone connected via Bluetooth</p> Signup and view all the answers

    Computers communicating on a network must follow a _____, a common set of rules for exchanging information.

    <p>protocol</p> Signup and view all the answers

    How can hackers trick you into transmitting personal data over a public network without your knowledge?

    <p>They disguise the network as an evil twin.</p> Signup and view all the answers

    What would indicate that Alex received a phishing email?

    <p>It contained typos and other grammatical errors.</p> Signup and view all the answers

    Devices on a _____ area network are connected via Bluetooth.

    <p>personal</p> Signup and view all the answers

    What is the U.S. Federal Communication Commission's role in regard to Internet access?

    <p>To release rules surrounding Internet access.</p> Signup and view all the answers

    When describing a client/server network, which of the following would be considered a client?

    <p>Laptop</p> Signup and view all the answers

    In a _____ network, each device on the network is attached to a central server.

    <p>star</p> Signup and view all the answers

    What is a MAC address?

    <p>A unique hardware address for your device.</p> Signup and view all the answers

    If you want to share information with individuals who are internal to your organization, which type of network would you want to use?

    <p>Intranet.</p> Signup and view all the answers

    How can the chief financial officer send quarterly spreadsheets securely?

    <p>Encrypt the data in the report.</p> Signup and view all the answers

    Which of the following describes an evil twin?

    <p>A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.</p> Signup and view all the answers

    Which of the following is a disadvantage of using cloud computing to share files?

    <p>The inability to access your files if you lose your Internet connection.</p> Signup and view all the answers

    Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?

    <p>Bluetooth.</p> Signup and view all the answers

    What internal device does a computer use to connect to a wired or wireless network?

    <p>Network interface card.</p> Signup and view all the answers

    What type of network should a manager use to allow outside vendors access to inventory records?

    <p>Extranet.</p> Signup and view all the answers

    How are hubs and switches similar to one another in a connected network?

    <p>They provide a central point for cables in a network.</p> Signup and view all the answers

    What other piece of hardware can a modem also function as?

    <p>A router.</p> Signup and view all the answers

    How is your friend able to turn on the indoor lights in her home using an app from the car?

    <p>She has a home network with smart home devices.</p> Signup and view all the answers

    Which of the following could indicate a DoS attack on your company server?

    <p>Customers cannot view the website on their device because the page will not load.</p> Signup and view all the answers

    What hardware is essential to creating a home Wi-Fi network?

    <p>Router.</p> Signup and view all the answers

    How does a wireless network key work with an encrypted wireless network?

    <p>The sending and receiving devices must know the wireless network key to communicate.</p> Signup and view all the answers

    What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

    <p>Social engineering.</p> Signup and view all the answers

    Which of the following is an authentication method to keep your data safe?

    <p>Fingerprint scanner</p> Signup and view all the answers

    Which of the following would be considered a strong password?

    <p>Wbcm2!4!820!</p> Signup and view all the answers

    What type of network sends signals through airwaves and usually does not require cables?

    <p>Wireless network.</p> Signup and view all the answers

    What does a DSL modem use to send and receive digital data?

    <p>Copper telephone wiring.</p> Signup and view all the answers

    Which of the following statements is NOT true about a local firewall?

    <p>It completely eliminates the risk of attacks.</p> Signup and view all the answers

    Broadband connections are 'always-on' connections.

    <p>True</p> Signup and view all the answers

    To protect confidential company information from hackers while at a work conference, you must use a _____ network for internet access.

    <p>Virtual private</p> Signup and view all the answers

    Many public networks are not secure.

    <p>True</p> Signup and view all the answers

    What can Keisha use to connect to the Internet when no wireless networks are available?

    <p>Mobile hotspot.</p> Signup and view all the answers

    Which of the following network standards applies to cellular networks?

    <p>LTE</p> Signup and view all the answers

    Study Notes

    Online Security and Network Connections

    • Georgia should connect to My Verizon VPN for secure online activities at Starbucks.
    • A wireless router enables encryption configuration for enhanced security.
    • Firewalls act as barriers that inspect data transmitted to/from networks for security purposes.
    • Phishing attempts can be identified by odd typos and grammatical errors in emails.

    Internet Access and Networking

    • A cable modem is classified as a digital model due to its ability to send and receive digital data.
    • To access the Internet, a router requires connection to a modem.
    • Secure networks often require a wireless network key for connection; if a key is not needed, the network may be insecure.

    Networking Types and Protocols

    • Personal area networks connect devices like smartwatches and phones through Bluetooth.
    • Protocols are essential for network communication, establishing rules for information exchange.
    • Internal organizational communications can utilize an intranet, while extranet enables controlled access for external vendors.

    Device Connectivity and Infrastructure

    • The MAC address uniquely identifies each device's hardware on a network.
    • A network interface card is necessary for computers to connect to networks.
    • Hubs and switches both serve as central connection points in a network setup.

    Internet and Connectivity Challenges

    • Cloud computing has drawbacks, such as being unable to access files without Internet connectivity.
    • DoS attacks can be recognized by server downtime, preventing users from viewing websites.
    • Mobile hotspots serve as alternatives for Internet connection when no Wi-Fi is available.

    Security Measures and Threat Awareness

    • Encryption is crucial when sending sensitive data, like financial spreadsheets, to prevent unauthorized access.
    • An evil twin network masquerades as legitimate Wi-Fi to capture user data.
    • Social engineering involves online interaction aimed at extracting confidential information.

    Passwords and Authentication

    • Strong passwords contain a mix of letters, numbers, and symbols for enhanced security.
    • Authentication methods, such as fingerprint scanning, are vital for protecting data.

    Networking Essentials

    • Essential hardware for a home Wi-Fi network includes a router, which may also function as a modem.
    • Public networks often lack security, with many users unaware of the vulnerabilities.
    • Wireless networks transmit signals without cables, utilizing airwaves for connectivity.

    Broadband and DSL

    • Broadband connections are characterized as "always-on," providing constant Internet access.
    • DSL modems utilize copper telephone wiring to send and receive data efficiently.

    Studying That Suits You

    Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

    Quiz Team

    Description

    Test your knowledge on network security from the textbook's Module 10 as you tackle questions on Wi-Fi connections, online banking, and encryption. This quiz is designed for ITE115 students to reinforce their understanding of secure online practices.

    More Like This

    Wi-Fi Network Security Risks Quiz
    18 questions
    Wi-Fi Authentication Basics
    18 questions
    Wi-Fi Security Protocols Overview
    13 questions
    Use Quizgecko on...
    Browser
    Browser