Exam 24: Network Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A(n) ____ is a type of fiber-optic telephone line that can transmit up to 1.544 megabits per second.

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

D

A(n) ____________________ is designed for the exclusive use of people within an organization.

Free
(Short Answer)
4.9/5
(27)
Correct Answer:
Verified

intranet

The word modem is an acronym for ____.

Free
(Multiple Choice)
4.8/5
(38)
Correct Answer:
Verified

C

A wide area network (WAN) connects personal computers, workstations, and other devices in a limited geographical area.

(True/False)
4.8/5
(46)

Biometric security measures examine any of the following, except ____.

(Multiple Choice)
4.8/5
(23)

The Internet is the biggest network of all.

(True/False)
4.9/5
(39)

The ____ determines the amount of data that can be sent at one time.

(Multiple Choice)
4.9/5
(39)

What types of phones are supported through the Public Switched Telephone Network (PSTN)?

(Multiple Choice)
5.0/5
(36)

Antivirus software should ____.

(Multiple Choice)
4.9/5
(37)

Which of the following can contain communication links across metropolitan, regional, or national boundaries?

(Multiple Choice)
4.8/5
(22)

Computer information is stored digitally, but information sent over the telephone lines is transmitted in the form of ____.

(Multiple Choice)
4.9/5
(39)

Handbooks, employee manuals, and employment forms would most likely be found on ____.

(Multiple Choice)
4.8/5
(41)

The best plan for a company that handles secure information is to handle security breaches as they occur.

(True/False)
4.9/5
(23)

Case 24-2 Bryah owns a small business and travels frequently. She is concerned about the security of the data on her laptop, which includes valuable information and trade secrets. When Bryah creates a password to restrict access to her computer, she should ____.

(Multiple Choice)
5.0/5
(28)

Biometric security measures are usually applied when high-level security is required.

(True/False)
4.7/5
(39)

To connect wirelessly requires different equipment than that used for a wired connection.

(True/False)
4.9/5
(28)

A standalone computer system is vulnerable to the same kinds of risks as a network.

(True/False)
5.0/5
(38)

The term client/server network describes a software architectural model.

(True/False)
4.8/5
(39)

____________________ is a recent wireless technology that can deliver maximum speeds of up to 7 Mbps to your cell phone, home computer, or car.

(Short Answer)
4.9/5
(36)

Electronic identification cards are used to gain access to certain areas within a building or department.

(True/False)
4.7/5
(35)
Showing 1 - 20 of 46
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)