Navigation » List of Schools » Northern Virginia Community College » Information Technology » ITE 115 – Introduction to Computer Applications and Concepts » Spring 2022 » Module 10 Quiz
Below are the questions for the exam with the choices of answers:
Question #1
A They can only connect to a single device.
B They are interchangeable terms for the same hardware.
C They transfer data to all devices.
D They provide a central point for cables in a network.
Question #2
A Customers cannot view the website on their device because the page will not load.
B Customers cannot download the most recent newsletter.
C Customers are receiving too many emails about special offers.
D Customers are required to enter personal information as they complete an order form.
Question #3
A The network most likely uses a firewall for protection.
B He can use the network only for a limited time.
C He cannot connect to the Internet from the network.
D The network connection is probably not secure.
Question #4
A She has installed switches that interact with the installed app on her phone.
B She uses a hub at her home that she connects to through the app.
C She dialed into her home modem through the app and sent a command through the router.
D She has a home network with smart home devices.
Question #5
A mobile hotspot
B cell phone hotspot
C virtual private network
D Bluetooth connection
Question #6
A Ethernet
B Wi-Fi
C Phoneline
D LTE
Question #7
A To release rules surrounding Internet access
B To restrict Internet access by location and population
C To regulate the bandwidth each website can have
D To rate Internet sites similar to movie ratings
Question #8
A All public networks are free.
B Many public networks are not secure.
C Hackers cannot intercept data transmitted over public networks.
D Your home network is a public network.
Question #9
A Intranet
B Wired network
C Virtual private network
D Wireless network
Question #10
A It is also called software firewall.
B It is often built into a computer’s operating system.
C It is a physical device that acts as a protective barrier.
D It inspects data being transmitted to or from a network.
Question #11
A My Verizon VPN
B Jenn’s iPhone
C xfinitywifi
D Starbucks Wi-Fi
Question #12
A VPN
B Extranet
C Intranet
D Wi-Fi
Question #13
A Cable TV connections
B A network interface card
C A wireless router
D Copper telephone wiring
Question #14
A standard
B protocol
C topology
D syntax
Question #15
A Encrypt the data in the report.
B Send the email without attaching the report and ask the president to call you.
C Transfer the report to the cloud.
D Store the report on a flash drive that you have password-protected with the president’s name.
Question #16
A A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
B A device infected with malware that an attacker uses to control the device remotely.
C A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
D An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Question #17
A It uses copper wires to enable efficient digital data transfers.
B It only sends digital data over a digital line.
C It sends and receives digital data over a digital line.
D It only receives digital data over a digital line.
Question #18
A Star
B Mesh
C Bus
D Ring
Question #19
A The wireless key is the encryption code needed by the receiver to decode the file.
B The wireless network needs the key to decode the data before sending.
C The wireless network key is your password for logging onto an Internet email system to receive files.
D The sending and receiving devices must know the wireless network key to communicate.
Question #20
A The inability to access your files if you lose your Internet connection.
B The files you will lose if your computer crashes.
C How long it will take to access a backup of files.
D The amount of space that files will take up on your computer.
Question #21
A All Internet traffic should be treated equally.
B The same level of service should be provided to all websites, regardless of purpose.
C ISPs should charge more for high-bandwidth connections.
D Access to websites should not be restricted based on content.
Question #22
A The connection needed to access to a cellular network
B An alternate name Internet Protocol version 6
C An IP address unique to Apple’s MAC computers
D A unique hardware address for your device
Question #23
A Intranet
B Wireless network
C Virtual private network
D Extranet
Question #24
A hub
B switch
C modem
D network
Question #25
A Wired network
B Extranet
C Virtual private network
D Intranet
Question #26
A A switch
B A router
C A network interface card
D A hub
Question #27
A They disguise the network as an evil twin.
B They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
C They overload the server with network traffic so webpages will not load.
D They use adware to fill your screen with unwanted advertisements until you click one.
Question #28
A ethernet
B protocol
C firewall
D rootkit
Question #29
A Motherboard
B Hub
C Switch
D Network interface card
Question #30
A It was written in an overly formal tone.
B The signature was consistent with other emails from his bank.
C It contained typos and other grammatical errors.
D It did not include a promotional offer.
Question #31
A You can use the wireless router to encrypt and then decode the encryption on information sent and received.
B You can use the wireless router to intercept encrypted information and block it from entering the network.
C You can use the wireless router to set the encryption key and type of encryption.
D You can use the wireless router to verify the security certificate of the encrypted data being sent.
Question #32
A Spyware
B A zombie attack
C Social engineering
D An evil twin
Question #33
A Printer
B External hard drive
C Modem
D Laptop
Question #34
A phone and computer connected via Wi-Fi
B computers connected within a home
C computers connected within a city
D smartwatch and phone connected via Bluetooth
Question #35
A Wbcm2!4!820!
B CatCatCatCat
C Abc123456789
D Password123
Question #36
A personal
B wide
C local
D metropolitan
Question #37
A Printer
B Ethernet cable
C Monitor
D Router
Question #38
A Bluetooth
B RFID
C IrDA
D NFC
Question #39
A Broadband connections require a wireless router to increase their speed.
B Broadband connections turn off after a specified amount of idle time.
C Broadband connections are “always-on” connections.
D Only a few of today’s Internet connections are broadband connections.
Question #40
A Body area network
B Fingerprint scanner
C Software firewall
D Encryption