Exam 5: Local Area Networks

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

In the context of networks,the communications ____________________ refers to the set of rules for efficiently transmitting data from one network node to another.

(Short Answer)
4.9/5
(32)

A Wi-Fi device ____.

(Multiple Choice)
4.9/5
(44)

You have just secured a new job with a new firm that is very security conscious. You’ve been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. -You decide to use public key encryption to protect e-commerce transactions.Once the browser uses the public key it receives from the server to encrypt the credit card information,who can decrypt the message?

(Multiple Choice)
4.9/5
(31)

MAC addresses are used for some low-level network functions and can also be employed to establish network security.

(True/False)
4.8/5
(47)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -An encrypted message

(Multiple Choice)
4.8/5
(37)

To connect a phone or other device to a network,make sure that ____ is enabled,then wait for the device to sense the network,and when asked,enter the encryption key.

(Multiple Choice)
4.8/5
(32)

A WAN provides connectivity within a limited geographical area,often within a single building.

(True/False)
5.0/5
(32)

  -In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer. -In the accompanying figure,the item on the right can be installed in an expansion slot inside the system unit of a desktop computer.

(True/False)
4.8/5
(33)

Which of the following is NOT an advantage of using a wired network?

(Multiple Choice)
4.8/5
(36)

MATCHING Identify the letter of the choice that best matches the phrase or definition. -A parcel of data that is sent across a computer network

(Multiple Choice)
4.8/5
(40)

A network ____ usually contains a computer,networked peripheral,or network device.

(Multiple Choice)
4.8/5
(24)

WPA2 makes sure that packets have not been intercepted or tampered with in any way.

(True/False)
4.9/5
(40)

____ is a wireless MAN or WAN technology commonly used for fixed Internet access.

(Multiple Choice)
4.7/5
(30)

IP addresses can be assigned by ISPs or system managers.

(True/False)
4.8/5
(42)

____________________ resources like hardware,software,and data are made available for authorized network users to access.

(Short Answer)
4.8/5
(34)

Discuss the disadvantages of LANs.

(Essay)
4.9/5
(47)

The most popular wireless LAN technology is ____.

(Multiple Choice)
4.8/5
(36)

If networked,____ can be accessed by an authorized LAN user.

(Multiple Choice)
4.8/5
(32)

You have just secured a new job with a new firm that is very security conscious. You’ve been instructed to learn as much as possible about encryption to ensure the confidentiality of customer transactions as well as electronic communications about new research and development projects. -As part of your research,you find that the longer the key,the longer it will take a devious competitor to crack the code.You also find that most encryption today uses a ____ key,and so you decide to use an encryption key of that size.

(Multiple Choice)
4.8/5
(33)

Most wireless networks transport data as ____ signals.

(Multiple Choice)
4.8/5
(35)
Showing 101 - 120 of 150
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)