Navigation » List of Schools » Northern Virginia Community College » Information Technology » ITE 115 – Introduction to Computer Applications and Concepts » Spring 2022 » Module 10 Quiz
Below are the questions for the exam with the choices of answers:
Question #1
A They are interchangeable terms for the same hardware.
B They transfer data to all devices.
C They can only connect to a single device.
D They provide a central point for cables in a network.
Question #2
A Customers are required to enter personal information as they complete an order form.
B Customers cannot download the most recent newsletter.
C Customers cannot view the website on their device because the page will not load.
D Customers are receiving too many emails about special offers.
Question #3
A He can use the network only for a limited time.
B The network connection is probably not secure.
C He cannot connect to the Internet from the network.
D The network most likely uses a firewall for protection.
Question #4
A She dialed into her home modem through the app and sent a command through the router.
B She has a home network with smart home devices.
C She uses a hub at her home that she connects to through the app.
D She has installed switches that interact with the installed app on her phone.
Question #5
A mobile hotspot
B Bluetooth connection
C cell phone hotspot
D virtual private network
Question #6
A Wi-Fi
B Ethernet
C Phoneline
D LTE
Question #7
A To regulate the bandwidth each website can have
B To restrict Internet access by location and population
C To rate Internet sites similar to movie ratings
D To release rules surrounding Internet access
Question #8
A All public networks are free.
B Many public networks are not secure.
C Your home network is a public network.
D Hackers cannot intercept data transmitted over public networks.
Question #9
A Intranet
B Wired network
C Wireless network
D Virtual private network
Question #10
A It is often built into a computer’s operating system.
B It is also called software firewall.
C It is a physical device that acts as a protective barrier.
D It inspects data being transmitted to or from a network.
Question #11
A Starbucks Wi-Fi
B Jenn’s iPhone
C xfinitywifi
D My Verizon VPN
Question #12
A Wi-Fi
B VPN
C Extranet
D Intranet
Question #13
A A network interface card
B A wireless router
C Copper telephone wiring
D Cable TV connections
Question #14
A protocol
B topology
C syntax
D standard
Question #15
A Send the email without attaching the report and ask the president to call you.
B Encrypt the data in the report.
C Transfer the report to the cloud.
D Store the report on a flash drive that you have password-protected with the president’s name.
Question #16
A An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
B A device infected with malware that an attacker uses to control the device remotely.
C A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
D A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
Question #17
A It sends and receives digital data over a digital line.
B It only receives digital data over a digital line.
C It only sends digital data over a digital line.
D It uses copper wires to enable efficient digital data transfers.
Question #18
A Star
B Ring
C Bus
D Mesh
Question #19
A The sending and receiving devices must know the wireless network key to communicate.
B The wireless network key is your password for logging onto an Internet email system to receive files.
C The wireless network needs the key to decode the data before sending.
D The wireless key is the encryption code needed by the receiver to decode the file.
Question #20
A How long it will take to access a backup of files.
B The inability to access your files if you lose your Internet connection.
C The files you will lose if your computer crashes.
D The amount of space that files will take up on your computer.
Question #21
A The same level of service should be provided to all websites, regardless of purpose.
B Access to websites should not be restricted based on content.
C ISPs should charge more for high-bandwidth connections.
D All Internet traffic should be treated equally.
Question #22
A The connection needed to access to a cellular network
B An alternate name Internet Protocol version 6
C A unique hardware address for your device
D An IP address unique to Apple’s MAC computers
Question #23
A Intranet
B Wireless network
C Extranet
D Virtual private network
Question #24
A network
B switch
C hub
D modem
Question #25
A Intranet
B Wired network
C Extranet
D Virtual private network
Question #26
A A network interface card
B A hub
C A router
D A switch
Question #27
A They disguise the network as an evil twin.
B They use adware to fill your screen with unwanted advertisements until you click one.
C They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
D They overload the server with network traffic so webpages will not load.
Question #28
A firewall
B rootkit
C protocol
D ethernet
Question #29
A Motherboard
B Switch
C Network interface card
D Hub
Question #30
A The signature was consistent with other emails from his bank.
B It was written in an overly formal tone.
C It did not include a promotional offer.
D It contained typos and other grammatical errors.
Question #31
A You can use the wireless router to set the encryption key and type of encryption.
B You can use the wireless router to intercept encrypted information and block it from entering the network.
C You can use the wireless router to encrypt and then decode the encryption on information sent and received.
D You can use the wireless router to verify the security certificate of the encrypted data being sent.
Question #32
A Spyware
B An evil twin
C A zombie attack
D Social engineering
Question #33
A Laptop
B Printer
C Modem
D External hard drive
Question #34
A phone and computer connected via Wi-Fi
B smartwatch and phone connected via Bluetooth
C computers connected within a home
D computers connected within a city
Question #35
A Password123
B Abc123456789
C CatCatCatCat
D Wbcm2!4!820!
Question #36
A personal
B wide
C metropolitan
D local
Question #37
A Router
B Monitor
C Printer
D Ethernet cable
Question #38
A NFC
B IrDA
C RFID
D Bluetooth
Question #39
A Broadband connections require a wireless router to increase their speed.
B Broadband connections turn off after a specified amount of idle time.
C Broadband connections are “always-on” connections.
D Only a few of today’s Internet connections are broadband connections.
Question #40
A Software firewall
B Encryption
C Fingerprint scanner
D Body area network