Exam 10: Networking
Exam 1: Impact of Digital Technology64 Questions
Exam 2: The Web76 Questions
Exam 3: Computer Hardware50 Questions
Exam 4: Operating Systems and File Management71 Questions
Exam 5: Software and Apps36 Questions
Exam 6: Security and Safety40 Questions
Exam 7: Digital Media57 Questions
Exam 8: Program and App Use and Development61 Questions
Exam 9: Web Development42 Questions
Exam 10: Networking52 Questions
Exam 11: Digital Communication32 Questions
Exam 12: Digital Transformation: Cloud, E-Commerce, and Ai25 Questions
Exam 13: Databases23 Questions
Exam 14: Digital Ethics and Lifestyle65 Questions
Exam 15: Digital Literacy and Technology345 Questions
Select questions type
Which of the following is an example of a personal area network?
Free
(Multiple Choice)
4.7/5
(42)
Correct Answer:
C
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
Free
(Multiple Choice)
4.8/5
(33)
Correct Answer:
D
Bandwidth is a term that describes the number of devices connected to a network.
Free
(True/False)
4.8/5
(36)
Correct Answer:
False
To protect a computer or a server, a(n)______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
(Multiple Choice)
4.9/5
(43)
A network administrator is usually not required on a _____ network.
(Multiple Choice)
4.7/5
(31)
Which of the following could indicate a DoS attack on your company server?
(Multiple Choice)
4.7/5
(23)
In a connected network, how are hubs and switches similar to one another?
(Multiple Choice)
4.9/5
(42)
What hardware is essential to creating a home Wi-Fi network?
(Multiple Choice)
4.8/5
(32)
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
(Multiple Choice)
4.9/5
(45)
Which of the following statements is NOT true about a local firewall?
(Multiple Choice)
5.0/5
(33)
When using encryption from your home computer, how would you configure the router?
(Multiple Choice)
4.9/5
(36)
How does a wireless network key work with an encrypted wireless network?
(Multiple Choice)
4.7/5
(34)
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
(Multiple Choice)
4.9/5
(37)
A router is a system of two or more devices linked by wires or cables.
(True/False)
4.8/5
(32)
RFID is a network protocol used in credit cards, smartphones, and tickets to facilitate close-range communication.
(True/False)
4.9/5
(30)
Wireless networks that are available in public places, such as hotels, restaurants, and coffee shops, are known as Wi-Fi hotspots.
(True/False)
4.8/5
(41)
Network _____ specify how computers access a network, data transmission speeds, and the types of hardware the network uses, including cable and wireless technology.
(Multiple Choice)
4.7/5
(41)
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
(Multiple Choice)
4.8/5
(38)
Showing 1 - 20 of 52
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)