Exam 20: Managing and Securing Your Wireless Network
Exam 1: Technology Impacts16 Questions
Exam 2: Understanding Bits and Bytes21 Questions
Exam 3: Doing Business Online16 Questions
Exam 4: Choosing Software18 Questions
Exam 5: Starting the Computer: the Boot Process16 Questions
Exam 6: Evaluating Your Cpu and Ram19 Questions
Exam 7: Understanding Networking17 Questions
Exam 8: Managing Digital Media13 Questions
Exam 9: Threats to Your Digital Life20 Questions
Exam 10: Understanding Software Programming17 Questions
Exam 11: Using Databases18 Questions
Exam 12: Using Servers15 Questions
Exam 13: Understanding Ip Addresses, Domain Names, and Protocols17 Questions
Exam 24: How Businesses Use Databases16 Questions
Exam 14: Extension: the Impact of Artificial Intelligence15 Questions
Exam 15: Exploring Storage Devices and Ports19 Questions
Exam 16: Evaluating Websites16 Questions
Exam 17: Buying and Installing Software16 Questions
Exam 18: Organizing Your Computer: File Management17 Questions
Exam 19: Evaluating Computer System Components16 Questions
Exam 20: Managing and Securing Your Wireless Network15 Questions
Exam 21: Understanding Intellectual Property and Copyright15 Questions
Exam 22: Understanding Firewalls16 Questions
Exam 23: a Variety of Programming Languages14 Questions
Exam 25: Transmission Media and Network Adapters15 Questions
Exam 26: Keeping E-Mail Secure16 Questions
Select questions type
The ________ is the name that uniquely identifies a network.
Free
(Short Answer)
4.8/5
(36)
Correct Answer:
SSID; Service Set Identifier
Which device might you use to improve your Wi-Fi signal without using a cable to connect to the router?
Free
(Multiple Choice)
4.8/5
(27)
Correct Answer:
C
Periodically applying ________ upgrades fixes known problems in the ROM of a router or other networking devices.
Free
(Multiple Choice)
4.8/5
(32)
Correct Answer:
A
Connecting to a network without the owner's consent is known as ________.
(Short Answer)
4.7/5
(43)
Which of the following is LEAST LIKELY to be an obstacle for a wireless network?
(Multiple Choice)
4.7/5
(35)
As your wirelessly connected device moves further away from the wireless router, what happens to the signal?
(Multiple Choice)
4.8/5
(40)
Connecting to a wireless network without the owner's permission is known as ________.
(Multiple Choice)
4.8/5
(27)
A(n) ________ is a hardware or software solution that helps protect your network.
(Short Answer)
4.8/5
(30)
Match each of the following terms to their best definitions:
I. SSID
II. WEP
III. access point
IV. firmware
V. range extender
A. device to improve wireless signal requiring an ethernet cable
B. device to improve wireless signal without additional cables
C. network name
D. system software stored in ROM of hardware devices
E. security protocol
(Short Answer)
4.8/5
(43)
A ________ would be a good device to install if you need a wireless solution to improve a weak Wi-Fi signal in an area far from the router your home.
(Short Answer)
4.8/5
(29)
Installing a(n) ________ is the first step in securing your network from unwanted intruders.
(Multiple Choice)
4.9/5
(31)
Which of the following is NOT an encryption security protocol?
(Multiple Choice)
4.9/5
(37)
Changing the ________ from the default name given by the manufacturer can make it more difficult for hackers to access your network.
(Multiple Choice)
4.8/5
(26)
What would the consequences be to you if your neighbors in an apartment complex inadvertently piggyback on your wireless network, even if they did nothing malicious?
(Multiple Choice)
4.7/5
(35)
A(n) ________ is a wireless connectivity device that is connected with a wire to the router and extends a Wi-Fi signal in a designated area.
(Multiple Choice)
4.8/5
(39)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)