• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/40

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

40 Cards in this Set

  • Front
  • Back
There are three devices that can help you connect multiple computers together. Which of the following is NOT one of those devices?
Modem
What does the Open Systems Interconnect (OSI) model do?
Describes how information moves from one computer to another across a network.
Which of the following DOS commands is NOT considered a basic network utility?
Attrib
Which of the following IP addresses is an example of a private IP address?
10.127.100.1
Which of the following identifies a computer or device on a TCP/IP network?
IP address
Which of the following is NOT a characteristic of a firewall?
It hides your network.
Which of the following is NOT an agreed upon method of communication between computers?
T1
Which of the following is NOT true about the internet?
It is one large network.
Which of the following is a true statement about the OSI model layers?
Any layer can communicate only with the layer directly above or below it.
A firewall can come in either software or hardware form.
TRUE
A network that has 10 or more nodes is usually configured as a:
Client/Server network
Client/Server networks are controlled by a central server that runs a specialized piece of software called:
A network operating system (NOS)
The most common type of home network is:
A peer-to-peer (P2P) network.
The most popular transmission medium option for wired Ethernet network is:
Unshielded twisted pair cable (UTP).
The unique number assigned to a network adapter by the manufacturer is referred to as the _____ address.
MAC
Throughput, the actual speed of data transfer that is achieved in a network, is usually:
Less than the data transfer rate.
Which of the following devices is needed to share an internet connection on a wireless network?
A wireless router.
Which of the following devices translates analog data into digital data and vice-versa?
A modem
Which transmission medium is able to transmit data the fastest?
Fiber-optic cable
Wireless networks are more vulnerable to attack than wired networks.
TRUE
One type of cryptography that rearranges letters of a message is...
Transposition
Some disreputable companies advertises fraudulent or unreliable encryption methods. Which of the following is NOT a warning sign of illegitimate encryption?
Brand new methods.
Which of the following is the oldest encryption method discussed?
Caesar cipher.
Which of the following is NOT an important element of PGP encryption?
The same key is used to encrypt and decrypt.
Which of the following protocols encrypts not only one packet data, but also the header information?
IPSec
________ is the art of protecting information by transforming it into an unreadable format.
Encryption
Which of the following IDS approaches tries to prevent intrusions before they occur?
Preemptive blocking
Which of the following firewalls has a process of creating two connections: client to proxy and proxy to destination?
Application gateway
Which of the following is NOT a virus-scanning technique?
Backup file scanning
Which of the following would NOT be a way to protect your system from spyware?
Use encryption software
Setting your privacy settings in Internet Explorer to medium is one way to block:
Cookies
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________.
Phishing
The simple idea behind identity theft is to:
Falsely assume someone else's identity.
Using the internet to pursue, harass, or contact another in an unsolicited fashion is called:
cyber stalking
What is the best means of protection from cyber stalking?
Never use your real identity.
The two most common tools used to help with extracting information are:
Cookies and Key Loggers
Which of the following would you NOT use to protect against industrial espionage?
Antivirus software
Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?
Shutdown of nuclear plant safety systems
Which of the following would be a form of cyber terrorism?
All of these are correct.
For which of the following positions would it be advisable to conduct an extensive background check?
Network administrator