Exam 10: Data Analysis With Power Tools and Creating Macros

arrow

7,658 students have unlocked this exam

  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

4G and 5G networks provide slower speed data transmission.

(True/False)
4.7/5
(35)

If you connect to a Wi-Fi network that does not require a wireless network key,it is still secure enough to send private information because wireless networks encrypt all data anyway.

(True/False)
4.8/5
(41)

After receiving an email from what appeared to be your bank,why did you become suspicious that this was a phishing email?

(Multiple Choice)
4.7/5
(36)

Which of the following would be considered a strong password?

(Multiple Choice)
5.0/5
(37)

What internal device does a computer use to connect to a wired or a wireless network?

(Multiple Choice)
4.8/5
(39)

When it comes to secure data storage on a network,which of the following statements is true?

(Multiple Choice)
4.9/5
(28)

To encrypt data sent between devices,a wireless network key that uses a series of letters and symbols is often used.

(True/False)
4.8/5
(39)

To protect a computer or a server,a(n)______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.

(Multiple Choice)
4.8/5
(29)

What hardware is essential to creating a home Wi-Fi network?

(Multiple Choice)
4.9/5
(47)

In a _____ network,each device on the network is attached to a central server.If the server fails,then the other devices will be unable to communicate,but if a connected device fails,then all other devices will still be able to communicate.

(Multiple Choice)
4.7/5
(39)

Which of the following could indicate a DoS attack on your company server?

(Multiple Choice)
4.8/5
(33)

In order for your router to access Internet connections,it must be connected to a _____.

(Multiple Choice)
4.9/5
(42)

Why does net neutrality affect Internet connections?

(Multiple Choice)
4.8/5
(42)

What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?

(Multiple Choice)
4.8/5
(36)

How does a wireless network key work with an encrypted wireless network?

(Multiple Choice)
4.8/5
(34)

After your last family vacation,everyone uploaded their photos to a NAS device so everyone would have access to view them.

(True/False)
4.9/5
(40)

Which of the following is true about broadband connections?

(Multiple Choice)
4.9/5
(31)

How will cellular networks challenge cable and DSL providers in the future?

(Multiple Choice)
4.7/5
(30)

To protect confidential company information from hackers while at a work conference,you must be sure to use which of the following networks when accessing the Internet at a hotel?

(Multiple Choice)
4.8/5
(27)

Why is a cable modem classified as a digital model?

(Multiple Choice)
4.8/5
(38)
Showing 21 - 40 of 45
close modal

Filters

  • Essay(0)
  • Multiple Choice(38)
  • Short Answer(0)
  • True False(7)
  • Matching(0)