There Are Various Risks From Attacks On Wi-Fi Networks
Question: What is a digital certificate?
Answer: Technology used to verify a user's identity.
Question: There are various risks from attacks on Wi-Fi networks. These include all of the following EXCEPT _____.
Answer: creating malware
Question: In which of the following real-life situations would it be useful to use a digital certificate?
Answer: if you were emailing a friend
Question: How could an online attacker use your online profile to gather information about you to steal your identity?
Answer: Use your posts to figure out answers to possible security questions.
Question: You can monitor and protect your financial data in all of the following ways EXCEPT _____.
Answer: Requesting a credit report and freezing your credit.
Question: Marcus recently had his cell phone stolen. All of the following are security features that should help him locate his stolen phone EXCEPT which one?
Answer: He can use remote wiping to retrace the thief's steps. Remote wiping is a security feature that allows a network administrator or device owner to send a command that deletes data to a computing device.
Question: How will cellular networks challenge cable and DSL providers in the future?
Answer: Cellular providers are continuing to increase their speeds and bandwidth causing users to drop cable and DSL services. DSL: Digital Subscriber Line (Telephone Lines).
Question: The Internet is an amazing invention. It can transmit data over a variety of network protocols whether you are close to a device or far away. As you think about all the different network protocols, how is it possible for companies to consider using drones to deliver packages?
Answer: The company would have to use an IrDA network protocol within close proximity. Infrared Data Association, or IrDA in short, is a group of device manufacturers that developed a standard for transmitting data via infrared (IR) light waves.
Question: Which of the following statements is NOT true about a local firewall?
Answer: It is also called software firewall.
Question: You are studying for your upcoming exam by taking sample quizzes online, your sister is streaming a tv show, your brother is playing an online game, and your parents are both checking email. As you try to go to the next page of questions, an error message pops up: Unable to display page. Why do you think this happened?
Answer: Because of net neutrality all of the websites are being treated the same and your ISP does not have enough bandwidth.
Question: Why is a cable modem classified as a digital model?
Answer: It sends and receives digital data over a digital line.
Question: If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
Answer: Intranet. An intranet is a private network, operated by a large company or other organisation, which uses internet technologies, but is insulated from the global internet.
Question: What does a DSL modem use to send and receive digital data?
Answer: Copper telephone wiring. A digital subscriber line (DSL) modem is a device used to connect a computer or router to a telephone line.
Question: Which of the following is not a resource able to be shared in a network?
Answer: Motherboards
Question: How does a wireless network key work with an encrypted wireless network?
Answer: The sending and receiving devices must know the wireless network key to communicate.
Question: As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
Answer: Extranet. (partially accessed by authorized outside users, enabling businesses to exchange information over the Internet securely.)
Question: In order for your router to access Internet connections, it must be connected to a _____.
Answer: modem
Question: As Chief Financial Officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. You know that his administrative assistant often checks his email and there is confidential information in the report that his assistant should not be able to access. How could you send the report without worrying about someone else accessing it?
Answer: You could encrypt the data in the report that only you can decode.
Question: What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
Answer: They disguise the network as an evil twin.
Question: What is an evil twin in the computer world?
Answer: A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Question: What is an ISP?
Answer: A telecommunications company that sells Internet access. (Internet Service Provider).
Question: Which of the following could indicate a DoS attack on your company server?
Answer: Customers cannot view the website on their device because the page will not load. (Disk Operating System.)
Question: Businesses use webinars for all of the following reasons except?
Answer: Group discussions
Question: In the email communication process, what is the role of the email server?
Answer: Routing email messages through the Internet or a private network
Question: A business can use a wiki in all the following ways EXCEPT for _____.
Answer: aggregating content
Question: You just posted new photographs from your trek to Nepal up onto Shutterfly, and the site asks you to review the metadata. You would review all of the following EXCEPT _____.
Answer: The HTML coding
Question: In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
Answer: Star
Question: Devices on a _____ area network are connected via Bluetooth.
Answer: personal
Question: How does a wireless network key work with an encrypted wireless network?
Answer: The sending and receiving devices must know the wireless network key to communicate.
Question: In which of the following real-life situations would it be useful to use a digital certificate?
Answer: if you were signing a rental lease
Question: You can configure your wireless router to protect your devices in all of the following ways EXCEPT ____.
Answer: naming your router something you'll remember, like your street address.