MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question.

Similar documents
Network Fundamentals. Chapter 7: Networking and Security 4. Network Fundamentals. Network Architecture

Technology in Action

Technology in Action. Chapter Topics. Participation Question. Participation Question 8/17/11. Chapter 7 Networking: Connecting Computing Devices

2) A is any device connected to a network such as a computer, printer, or game console. A) packet B) node C) NOS D) NIC

Networking. Prof. Abdul Hameed

INTRODUCTION TO ICT.

Technology in Action. Chapter 12 Behind the Scenes: Networking and Security. Copyright 2010 Pearson Education, Inc. Publishing as Prentice Hall

Technology in Action 12/11/2014. Networking Fundamentals. Chapter Topics. Networking Fundamentals (cont.) Networking Fundamentals (cont.

COMPUTER SKILLS COMP101

It is the process of sharing data, programs, and information between two or more computers.

Chapter 5 Local Area Networks. Computer Concepts 2013

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Discovering Computers Chapter 9 Communications and Networks

Chapter Topics Part 1. Network Definitions. Behind the Scenes: Networking and Security

Types Of Computer Virus Sources Of Virus Virus Warning Signs Virus Detection(Anti-Virus) Virus Prevention and Removal

Lecture #25: Networks and Communications. Communication and Networks. What will we learn?

Chapter 6 Network and Internet Security and Privacy

VISUAL SUMMARY COMMUNICATION CHANNELS COMMUNICATIONS. Communications and Networks

Dr./ Ahmed Mohamed Rabie Sayed

A+ Guide to Hardware: Managing, Maintaining, and Troubleshooting, 5e. Chapter 10 Networking Essentials

Getting to Know Your Network. Internet Speeds and Services

Computers Are Your Future Eleventh Edition Chapter 7: Networks: Communicating & Sharing Resources

Review: Networking Fall Final

What is a network and what are the advantages of setting up one? (p. 262)

Area Covered is small Area covered is large. Data transfer rate is high Data transfer rate is low

Wireless technology Principles of Security

Networks: Communicating and Sharing Resources

The Features and Uses of Computer Networking. Unit 11 Task 1

Digital Entertainment. Networking Made Easy

e-commerce Study Guide Test 2. Security Chapter 10

Introduction to Computers Chapter1

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 16 Networking Types, Devices, and Cabling

Chapter 12. Network Organization and Architecture

The ULTIMATE GUIDE. to Buying Networking Equipment

Chapter 10: Security and Ethical Challenges of E-Business

Data Communication. Introduction of Communication. Data Communication. Elements of Data Communication (Communication Model)

Pengantar Teknologi Informasi dan Teknologi Hijau. Suryo Widiantoro, ST, MMSI, M.Com(IS)

E-companion. Quiz for IT-knowledge

What is a Network? A connection of two or more computers so that they can share resources.

Networks. Computer Technology

Class X Subject : IT (Vocational) Chapter -1 Ouestion / Answer

CSC Introduction to Computers and Their Applications

Chapter 7. Telecommunications, the Internet, and Wireless Technology

16/06/56. Communications and Networks. Communications and Networks. Communications and Networks

Lesson 1: Network Communications

Which one of the following terms describes the physical components of a computer system?

Chapter 11: Networks

Computer Networks and Internet

CERT-In. Indian Computer Emergency Response Team ANTI VIRUS POLICY & BEST PRACTICES

Chapter 8 Networking and Digital Communication

Communications and Networks

Total Mark out of 35

Secure Network Design Document

Introduction to Computers. Chapter1

Chapter 9 Introduction to Networks

Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT

Data Communication. Chapter # 5: Networking Threats. By: William Stalling

Security Awareness. Presented by OSU Institute of Technology

Chapter 8 Communications and Networks

Copyright 2006 Prentice-Hall. All rights reserved. 1

Configuring your Home Wireless Network

Chapter 9. Introduction. Communications

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Objectives Overview. Chapter 9 Networks and Communications. Discovering Computers Instructor: Imran Khalil MSc-IT 1 st semester Fall 2016

Communications and Networks The McGraw-Hill Companies, Inc. All rights reserved.

A Review Paper on Network Security Attacks and Defences

COPYRIGHTED MATERIAL. Index

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Wireless Networking. Chapter The McGraw-Hill Companies, Inc. All rights reserved

Chapter 11: It s a Network. Introduction to Networking

Data Communication and Network. Introducing Networks

Computer networks 2013

Technology in Action 12/11/2014. Cybercrime and Identity Theft (cont.) Cybercrime and Identity Theft (cont.) Chapter Topics

Wireless LAN Security (RM12/2002)

Wireless Attacks and Countermeasures

CISNTWK-440. Chapter 4 Network Vulnerabilities and Attacks

Multi-Homing Broadband Router. User Manual

Introduction to Information Technology Turban, Rainer and Potter John Wiley & Sons, Inc. Copyright 2005

Unit 10. Networks. Copyright 2005 Heathkit Company, Inc. All rights reserved.

A+ Guide to Managing & Maintaining Your PC, 8th Edition. Chapter 17 Windows Resources on a Network

and the Forensic Science CC Spring 2007 Prof. Nehru

CHAPTER 8 SECURING INFORMATION SYSTEMS

CompTIA A+ Accelerated course for & exams

Management of IT Infrastructure Security by Establishing Separate Functional Area with Spiral Security Model

Networking. Networking. How Home Networking Works

Packet: Data can be broken into distinct pieces or packets and then reassembled after delivery. Computers on the Internet communicate via packets.

networks List various types of networks and their

Chapter. 6.1 Copyright 2011 Pearson Education, Inc. publishing as Prentice Hall

(Network Programming) Basic Networking Hardware

CTS2134 Introduction to Networking. Module 08: Network Security

ITEC 3800 Data Communication and Network. Introducing Networks

Networking Jamie Tees

Twelfth Edition. Chapter 8: Wired and Wireless Communication. Copyright 2012 Pearson Education, Inc. Publishing as Prentice Hall 1

Introduction to Computer Science (I1100) Networks. Chapter 6

Chapter Topics. The History of the Internet. Chapter 7: Computer Networks, the Internet, and the World Wide Web

CompTIA FC0-U51. CompTIA IT Fundamentals.

COMPONENTS OF DATA COMMUNICATION

Chapter 4: Communication Technology. Solutions

Identify the features of network and client operating systems (Windows, NetWare, Linux, Mac OS)

COMPUTER NETWORKING. Terminology of Network:

Transcription:

CS Chapter 7 Study Guide _ MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) Throughput, the actual speed of data transfer that is achieved in a network, is usually A) more than the data transfer rate. B) the same as the data transfer rate. C) dependent on the cable's bend radius. D) less than the data transfer rate. 1) 2) One can thwart most hacking problems by installing a A) security policy. B) firewall. C) hub. D) network. 2) 3) All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT A) you are experiencing interference with a wireless Ethernet network. B) you don't need to run new wires with a power-line network. C) power-line networks cost less. D) power-line networks can be easier to install. 3) 4) The most likely method a hacker would use to access a computer is A) entering through the Internet. B) entering through a company intranet. C) sitting down at a computer and installing hacking software. D) overhearing your password and/or log-on information. 4) 5) A network that has ten or more nodes is usually configured as a A) peer-to-peer network. B) client/server network. C) WAN. D) home network. 5) 6) Most allow you to connect wireless and wired computers to the same network. A) servers B) transceivers C) wireless routers D) modems 6) 7) Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? A) social networking B) hacking C) phishing D) cybercrime 7) 8) If you frequently transfer large data files between nodes on a network, which of the following networks would be the best choice? A) dial-up B) wireless C) Ethernet D) power-line 8) 9) What is the best thing a company can do to prevent its electronic data from being stolen? A) disconnect employees' computers from the Internet B) install hidden cameras C) establish detailed security policies D) shut off access on computers to flash drives 9) 1

10) Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network? A) network interface cards (NICs) B) firewalls C) routers and switches D) USB ports 10) 11) How many viruses and virus variants exist today? A) thousands B) hundreds C) tens D) millions 11) 12) A computer network is defined as two or more computers connected with so that they can communicate with each other. A) software and hardware B) the Internet C) hardware D) software 12) 13) In a client/server network, there are usually many more than. A) servers, clients B) printers, computers C) clients, computers D) clients, servers 13) 14) A(n) allows sharing of a broadband Internet connection. A) adapter B) hub C) router D) phone cord 14) 15) Network adapters A) are built into the motherboard on each node. B) enable nodes in a network to communicate with each other. C) are always Ethernet NICs. D) are necessary only on servers in a client/server network. 15) 16) Which of the following is a program that appears to be something useful or desirable but at the same time does something malicious in the background? A) a Trojan horse B) a virus C) a zombie D) a worm 16) 17) Which of the following is NOT an example of a network node? A) an NOS B) a computer C) a modem D) a printer 17) 18) Networks allow users to share A) flash drives. B) phones. C) peripherals. D) paper. 18) 19) Due to the expansion of media files on home computers, options are now being marketed; however, they are not as full featured as their business-world counterparts. A) external hard drive B) mega flash drives C) home server D) online storage 19) 20) Most computers today contain network adapters installed inside as expansion cards. Such adapters are referred to as A) ethernet cards. B) network expansion cards. C) network adapter cards. D) network interface cards. 20) 2

21) The purpose of Network Address Translation is to A) hide user IP addresses from the Internet. B) dynamically assign IP addresses via an ISP. C) convert logical ports to physical port configurations. D) translate IP addresses from the Internet. 21) 22) Maximum cable run (length) for Ethernet networks using UTP cable is approximately: A) 50 feet. B) 1,100 feet. C) 550 feet. D) 328 feet. 22) 23) Distributed denial of service (DDoS) attacks have been associated with A) theft of financial data at the IRS. B) attacks on famous blogs, ebay, and Amazon.com. C) identity theft. D) misuse of credit card information. 23) 24) A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT A) use your debit card information to purchase items illegally. B) launch a denial of service (DoS) attack on your computer. C) assume your identity. D) steal your logon and passwords for various accounts. 24) 25) Which of the following devices translates electronic data into radio waves? A) a transceiver B) a receiver C) a fiber-optic cable D) a modem 25) 26) Which transmission medium is able to transmit data the fastest? A) wireless B) twisted-pair cable C) fiber-optic cable D) coaxial cable 26) 27) Manufacturers such as Linksys, D-Link, and Netgear make which of the following devices that can double as firewalls? A) networks B) modems C) NICs D) routers 27) 28) Rules for creating passwords include all of the following EXCEPT A) keep your password written down, and put it in your wallet. B) create a hard-to-guess password, with a combination of letters and numbers. C) change your password frequently. D) keep your password a secret. 28) 29) Network architectures are classified according to A) the bandwidth supplied by the connection. B) the speed at which the processor runs. C) the way they are controlled and the distance between their nodes. D) the distance between the hub and the router. 29) 30) makes broadband users more vulnerable to attacks.. A) IP addressing B) Dynamic addressing C) Greater bandwidth D) Static addressing 30) 3

31) When setting up a network, you should set up any computers running the Microsoft Vista operating system A) last. B) first. C) only before any computers running Linux. D) The order does not matter. 31) 32) Which of the following classifications of viruses changes its own code? A) worm B) stealth C) multipartite D) polymorphic 32) 33) To improve communication effectiveness in a wireless network, you can do all of the following EXCEPT A) move your computer next to a cement wall. B) move the computers in the network closer together. C) add a wireless access point (WAP) to the network. D) reposition the computer you are using. 33) 34) The major difference in types of P2P networks is the by which the nodes are connected. A) network interface card B) transmission medium C) port D) software 34) 35) Quarantining with regard to computer protection is defined as A) repairing the infected file. B) deleting the infected file. C) placing a found virus in a secure area on the hard drive. D) updating your antivirus software. 35) 36) The most popular transmission medium option for wired Ethernet networks is A) coaxial cable. B) power-line cable. C) unshielded twisted-pair cable (UTP). D) fiber-optic cable. 36) 37) Which of the following is necessary to send data between a home network and the Internet? A) a cable B) a switch C) a hub D) a router 37) 38) Public places where you can wirelessly connect to the Internet are known as A) gateways. B) links. C) wired spots. D) hotspots. 38) 39) Ethernet networks are named for A) the type of transmission medium used. B) the type of NIC installed in every node. C) the type of operating system installed on every node. D) the protocol used. 39) 40) Which of the following devices is needed to share an Internet connection on a wireless network? A) a fiber-optic cable B) a modem C) a wireless router D) a wireless hub 40) 4

SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. 41) File Transfer Protocol uses port. 41) 42) All 802.11g devices work on a bandwidth of GHz. 42) 43) is a process used by firewalls to assign internal IP addresses on a network. 43) 44) The 802.11 wireless standard is also known as. 44) 45) A(n) network uses radio waves as its transmission medium. 45) 46) cable is made up of copper wires twisted around each other and is used in telephone technology. 46) 47) In terms of networking, NOS stands for. 47) 48) Match the following terms to their definitions: 48) I. logic bomb A. a virus that executes based on specified conditions II. Trojan horse B. software that allows hackers to take control of a computer III. backdoor program C. transmits simultaneous requests from multiple zombie computers IV. DDoS D. a program that appears to do useful work but does harm in the background V. time bomb E. an infectious program that is triggered on a certain date 49) receive data packets and send them to the node for which they are intended. 49) 50) cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV. 50) 51) Match the following terms to their definitions: 51) I. bandwidth A. handles data traffic between networks II. throughput B. handles data traffic between nodes on the same network III. router C. maximum speed at which data can be transmitted IV. switch D. network adapters V. NICs E. actual speed of data transfer 52) transfer data between two or more networks. 52) 53) FTP stands for. 53) 54) A(n) on a network can be a peripheral, such as a printer or scanner. 54) 5

55) A device can be connected directly to a router instead of connecting it to a computer on a network. 55) 56) devices, which are becoming popular for home use, provide centralized data storage and access for networks. 56) 57) The type of wireless network designed to provide access to city residents and visitors is typically a(n). 57) 58) Bundles of data sent over transmission media are called. 58) 59) Most notebook computers sold currently come with an 802.11g or a(n) network adapter built in. 59) 60) is the specific category of UTP cable that has the highest data transfer rate. 60) 61) Many cities in the United States are now deploying to provide Internet access to residents and convenience for tourists. 61) 62) Switches and routers are both network devices. 62) 63) NIC stands for. 63) 64) To provide an older computer with wireless capability, you need to use a(n). 64) 65) software identifies known viruses effectively. 65) 66) A(n) is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data for illegal purposes. 66) 67) The maximum range of wireless devices under the 802.11g standard is about feet. 67) 68) are virtual communication paths that allow a computer to organize requests for information from other networks or computers. 68) 69) Young, amateur hackers are often referred to as. 69) 70) refers to the act of connecting to a wireless connection without the permission of the owner. 70) 71) If you install a device called a on your network, you can share a broadband Internet connection between several computers. 71) 6

72) Match the following terms to their definitions: 72) I. packet A. software that controls an installed hardware device II. Wi-Fi B. server-side software that controls network communications III. driver C. unit of data transmitted in a network IV. NOS D. programming that is inserted into programmable read-only memory V. firmware E. another name for the 802.11 standard 73) Match the following terms to their definitions: 73) I. switch A. enables individual nodes to communicate in a network II. adapter B. converts digital signals to radio waves III. repeater C. facilitates data packet transmission IV. wireless transceiver D. sends data packets between networks V. router E. amplifies signals to prevent degradation on long cables 74) The term network refers to the design of a network. 74) 75) HTTPS uses port. 75) 76) Some network adapters take the form of external devices that plug into an available port. 76) 77) If you need to extend the length of an Ethernet network, you can use a(n) to do so. 77) 78) networks use the existing electrical wiring in your house. 78) 79) For security reasons, you should be extremely wary of opening e-mail such as Word files. 79) 80) Hackers who use their knowledge to destroy information are known as hackers. 80) 81) Normal telephone wire is composed of cable, which consists of copper wires wrapped around each other and covered in a plastic jacket. 81) 82) The Internet is a good example of a(n) network. 82) 83) HTTP uses port. 83) 7

84) Match the following terms to their definitions: 84) I. FTP A. provides Internet services to consumers II. CAT 5 B. a protocol used on the Internet for sending and receiving files III. ISP C. a malicious attack in which a multitude of compromised systems attack a single target IV. DDoS D. a type of cable V. WAN E. a network that covers a great distance 85) A(n) is composed of software programs known as robots or bots, which run automatically on zombie computers. 85) 86) There are three main types of P2P networks: wired, wireless, and. 86) 87) Match the following terms to their definitions: 87) I. worm A. a hacker that re-uses hacking tools written by someone else II. computer virus B. a program that renders your computer files unusable III. script kiddie C. a type of this virus, "Storm," infected millions of computers in 2007 IV. encryption virus D. a virus that changes its own code to avoid detection V. polymorphic virus E. a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files 88) A(n) network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network. 88) 89) Match the following terms to their definitions: 89) I. Wi-Fi A. retaining the same IP address for a long time II. packet sniffer B. assigning addresses out of an available pool of IP addresses III. static addressing C. also known as the 802.11 wireless standard IV. dynamic addressing D. a computer controlled by a hacker V. zombie E. a program that looks at each packet as it travels over the network 90) As the distance between the nodes of a wireless network increases, throughput markedly. 90) TRUE/FALSE. Write 'T' if the statement is true and 'F' if the statement is false. 91) SMTP uses port 21. 91) 92) A single computer can function as both a client and a server, but performance will be degraded. 92) 93) In a peer-to-peer network, one computer acts as the server. 93) 8

94) The Master Boot Record executes every time a computer boots up. 94) 95) Switches receive data packets and send them to the node for which they are intended on the same network. 95) 96) Extreme G and Enhanced G standards were both based on 802.11g standards but used proprietary hardware and software tweaks to increase performance. 96) 97) One can have both wired and wireless nodes on a single P2P network. 97) 98) P2P networks are more commonly used in small businesses than in homes. 98) 99) Most desktop and notebook systems sold today are network ready. 99) 100) The cost of a P2P network is slightly greater than the cost of a client/server network. 100) 9

Answer Key Testname: CS CHAP 7 TEST 1) D 2) B 3) C 4) A 5) B 6) C 7) D 8) C 9) C 10) C 11) A 12) A 13) D 14) C 15) B 16) A 17) A 18) C 19) C 20) D 21) A 22) D 23) B 24) B 25) A 26) C 27) D 28) A 29) C 30) D 31) B 32) D 33) A 34) B 35) C 36) C 37) D 38) D 39) B 40) C 41) 21, twenty-one 42) 2.4 43) Network Address Translation 44) Wi-Fi 45) wireless 46) Twisted-pair 47) network operating system 48) A,D,B,C,E 49) Switches 50) Coaxial 10

Answer Key Testname: CS CHAP 7 TEST 51) C,E,A,B,D 52) Routers 53) File Transfer Protocol 54) node 55) network-ready 56) Network attached storage, NAS 57) WAN 58) packets 59) 802.11 draft-n 60) CAT 6 61) MANs, metropolitan area networks 62) navigation 63) network interface card 64) network adapter card 65) Antivirus 66) packet sniffer 67) 250 68) Logical ports 69) script kiddies 70) Piggybacking 71) router 72) C,E,A,B,D 73) C,A,E,B,D 74) architecture (or topology) 75) 443, four hundred forty-three 76) USB 77) repeater 78) Power-line 79) attachments 80) black-hat 81) twisted-pair 82) client/server 83) 80, eighty 84) B,D,A,C,E 85) botnet 86) power-line 87) C,E,A,B,D 88) peer-to-peer (P2P) 89) C,E,A,B,D 90) decreases 91) TRUE 92) TRUE 93) FALSE 94) TRUE 95) TRUE 96) TRUE 97) TRUE 98) FALSE 99) TRUE 100) FALSE 11