Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
40 Cards in this Set
- Front
- Back
There are three devices that can help you connect multiple computers together. Which of the following is NOT one of those devices?
|
Modem
|
|
What does the Open Systems Interconnect (OSI) model do?
|
Describes how information moves from one computer to another across a network.
|
|
Which of the following DOS commands is NOT considered a basic network utility?
|
Attrib
|
|
Which of the following IP addresses is an example of a private IP address?
|
10.127.100.1
|
|
Which of the following identifies a computer or device on a TCP/IP network?
|
IP address
|
|
Which of the following is NOT a characteristic of a firewall?
|
It hides your network.
|
|
Which of the following is NOT an agreed upon method of communication between computers?
|
T1
|
|
Which of the following is NOT true about the internet?
|
It is one large network.
|
|
Which of the following is a true statement about the OSI model layers?
|
Any layer can communicate only with the layer directly above or below it.
|
|
A firewall can come in either software or hardware form.
|
TRUE
|
|
A network that has 10 or more nodes is usually configured as a:
|
Client/Server network
|
|
Client/Server networks are controlled by a central server that runs a specialized piece of software called:
|
A network operating system (NOS)
|
|
The most common type of home network is:
|
A peer-to-peer (P2P) network.
|
|
The most popular transmission medium option for wired Ethernet network is:
|
Unshielded twisted pair cable (UTP).
|
|
The unique number assigned to a network adapter by the manufacturer is referred to as the _____ address.
|
MAC
|
|
Throughput, the actual speed of data transfer that is achieved in a network, is usually:
|
Less than the data transfer rate.
|
|
Which of the following devices is needed to share an internet connection on a wireless network?
|
A wireless router.
|
|
Which of the following devices translates analog data into digital data and vice-versa?
|
A modem
|
|
Which transmission medium is able to transmit data the fastest?
|
Fiber-optic cable
|
|
Wireless networks are more vulnerable to attack than wired networks.
|
TRUE
|
|
One type of cryptography that rearranges letters of a message is...
|
Transposition
|
|
Some disreputable companies advertises fraudulent or unreliable encryption methods. Which of the following is NOT a warning sign of illegitimate encryption?
|
Brand new methods.
|
|
Which of the following is the oldest encryption method discussed?
|
Caesar cipher.
|
|
Which of the following is NOT an important element of PGP encryption?
|
The same key is used to encrypt and decrypt.
|
|
Which of the following protocols encrypts not only one packet data, but also the header information?
|
IPSec
|
|
________ is the art of protecting information by transforming it into an unreadable format.
|
Encryption
|
|
Which of the following IDS approaches tries to prevent intrusions before they occur?
|
Preemptive blocking
|
|
Which of the following firewalls has a process of creating two connections: client to proxy and proxy to destination?
|
Application gateway
|
|
Which of the following is NOT a virus-scanning technique?
|
Backup file scanning
|
|
Which of the following would NOT be a way to protect your system from spyware?
|
Use encryption software
|
|
Setting your privacy settings in Internet Explorer to medium is one way to block:
|
Cookies
|
|
The fraud type that sends e-mails that claim to be from legitimate sites in order to obtain sensitive information is called _________.
|
Phishing
|
|
The simple idea behind identity theft is to:
|
Falsely assume someone else's identity.
|
|
Using the internet to pursue, harass, or contact another in an unsolicited fashion is called:
|
cyber stalking
|
|
What is the best means of protection from cyber stalking?
|
Never use your real identity.
|
|
The two most common tools used to help with extracting information are:
|
Cookies and Key Loggers
|
|
Which of the following would you NOT use to protect against industrial espionage?
|
Antivirus software
|
|
Which of the following is a likely target of a cyber terrorist that would cause considerable loss of life?
|
Shutdown of nuclear plant safety systems
|
|
Which of the following would be a form of cyber terrorism?
|
All of these are correct.
|
|
For which of the following positions would it be advisable to conduct an extensive background check?
|
Network administrator
|