ITE 115 - Introduction to Computer Applications and Concepts » Spring 2022 » Module 10 Quiz
Need help with your exam preparation?
Get Answers to this exam for $6 USD.
Get Answers to all exams in [ ITE 115 - Introduction to Computer Applications and Concepts ] course for $25 USD.
Existing Quiz Clients Login here
Question #1
Which of the following is an authentication method to keep your data safe?
A.
Body area network
B.
Fingerprint scanner
C.
Encryption
D.
Software firewall
Question #2
Which of the following is true about broadband connections?
A.
Broadband connections are “always-on” connections.
B.
Only a few of today’s Internet connections are broadband connections.
C.
Broadband connections require a wireless router to increase their speed.
D.
Broadband connections turn off after a specified amount of idle time.
Question #3
Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters?
A.
Bluetooth
B.
NFC
C.
IrDA
D.
RFID
Question #4
What hardware is essential to creating a home Wi-Fi network?
A.
Printer
B.
Ethernet cable
C.
Monitor
D.
Router
Question #5
Devices on a _____ area network are connected via Bluetooth.
A.
wide
B.
local
C.
personal
D.
metropolitan
Question #6
Which of the following would be considered a strong password?
A.
Password123
B.
Wbcm2!4!820!
C.
Abc123456789
D.
CatCatCatCat
Question #7
Which of the following is an example of a personal area network?
A.
phone and computer connected via Wi-Fi
B.
smartwatch and phone connected via Bluetooth
C.
computers connected within a home
D.
computers connected within a city
Question #8
When describing a client/server network, which of the following would be considered a client?
A.
Modem
B.
Printer
C.
External hard drive
D.
Laptop
Question #9
What is it called when someone attempts to befriend you online for the purpose of stealing confidential or sensitive information?
A.
Social engineering
B.
An evil twin
C.
A zombie attack
D.
Spyware
Question #10
When using encryption from your home computer, how would you configure the router?
A.
You can use the wireless router to set the encryption key and type of encryption.
B.
You can use the wireless router to intercept encrypted information and block it from entering the network.
C.
You can use the wireless router to verify the security certificate of the encrypted data being sent.
D.
You can use the wireless router to encrypt and then decode the encryption on information sent and received.
Question #11
Alex received an email from what appeared to be his bank. What would indicate the message was actually a phishing attempt?
A.
It contained typos and other grammatical errors.
B.
It was written in an overly formal tone.
C.
It did not include a promotional offer.
D.
The signature was consistent with other emails from his bank.
Question #12
What internal device does a computer use to connect to a wired or a wireless network?
A.
Network interface card
B.
Switch
C.
Motherboard
D.
Hub
Question #13
To protect a computer or a server, a(n) ______ can be installed that would act as a barrier and inspect data being transmitted to or from the network.
A.
firewall
B.
rootkit
C.
ethernet
D.
protocol
Question #14
What is one way hackers can trick you into transmitting personal data over on a public network without your knowledge?
A.
They use adware to fill your screen with unwanted advertisements until you click one.
B.
They encrypt your computer data and hold it hostage until you pay a fee, usually with bitcoins.
C.
They disguise the network as an evil twin.
D.
They overload the server with network traffic so webpages will not load.
Question #15
A modem can also function as what other piece of hardware?
A.
A hub
B.
A network interface card
C.
A router
D.
A switch
Question #16
If you want to share information with individuals who are internal to your organization, which type of network would you want to use?
A.
Virtual private network
B.
Intranet
C.
Wired network
D.
Extranet
Question #17
To access the Internet, a router must be connected to a _____.
A.
modem
B.
switch
C.
hub
D.
network
Question #18
To protect confidential company information from hackers while at a work conference, you must be sure to use which of the following networks when accessing the Internet at a hotel?
A.
Extranet
B.
Wireless network
C.
Intranet
D.
Virtual private network
Question #19
What is a MAC address?
A.
A unique hardware address for your device
B.
The connection needed to access to a cellular network
C.
An IP address unique to Apple’s MAC computers
D.
An alternate name Internet Protocol version 6
Question #20
Which of the following statements do opponents of net neutrality agree with?
A.
Access to websites should not be restricted based on content.
B.
ISPs should charge more for high-bandwidth connections.
C.
The same level of service should be provided to all websites, regardless of purpose.
D.
All Internet traffic should be treated equally.
Question #21
Which of the following is a disadvantage of using cloud computing to share files?
A.
How long it will take to access a backup of files.
B.
The files you will lose if your computer crashes.
C.
The amount of space that files will take up on your computer.
D.
The inability to access your files if you lose your Internet connection.
Question #22
How does a wireless network key work with an encrypted wireless network?
A.
The wireless network needs the key to decode the data before sending.
B.
The sending and receiving devices must know the wireless network key to communicate.
C.
The wireless network key is your password for logging onto an Internet email system to receive files.
D.
The wireless key is the encryption code needed by the receiver to decode the file.
Question #23
In a _____ network, each device on the network is attached to a central server. If the server fails, then the other devices will be unable to communicate, but if a connected device fails, then all other devices will still be able to communicate.
A.
Ring
B.
Bus
C.
Star
D.
Mesh
Question #24
Why is a cable modem classified as a digital model?
A.
It uses copper wires to enable efficient digital data transfers.
B.
It sends and receives digital data over a digital line.
C.
It only receives digital data over a digital line.
D.
It only sends digital data over a digital line.
Question #25
Which of the following describes an evil twin?
A.
A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it.
B.
A device infected with malware that an attacker uses to control the device remotely.
C.
A type of malware that disguises itself as or hides itself in a legitimate file, and then causes damage to programs and data when opened.
D.
An identified risk that gains administrator-level access to a computer or network without the system or users detecting its presence.
Question #26
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of the company. How can you send the report without worrying about someone else accessing it?
A.
Transfer the report to the cloud.
B.
Encrypt the data in the report.
C.
Store the report on a flash drive that you have password-protected with the president’s name.
D.
Send the email without attaching the report and ask the president to call you.
Question #27
Computers communicating on a network must follow a _____, a common set of rules for exchanging information.
A.
protocol
B.
standard
C.
syntax
D.
topology
Question #28
What does a DSL modem use to send and receive digital data?
A.
A wireless router
B.
A network interface card
C.
Cable TV connections
D.
Copper telephone wiring
Question #29
As the new manager at your local grocery store, you want to create a more efficient inventory process by allowing outside vendors and suppliers to review current inventory records and adjust recurring shipment orders to reduce product waste. What type of network should you use?
A.
VPN
B.
Extranet
C.
Wi-Fi
D.
Intranet
Question #30
While waiting for her latte at Starbucks, Georgia decides to check her work email and pay a few bills online. She opens the Wi-Fi settings on her device and sees several connections available. Knowing the activities she plans to do online, which of the following networks should Georgia connect to?
A.
Jenn’s iPhone
B.
My Verizon VPN
C.
xfinitywifi
D.
Starbucks Wi-Fi
Question #31
Which of the following statements is NOT true about a local firewall?
A.
It inspects data being transmitted to or from a network.
B.
It is also called software firewall.
C.
It is often built into a computer’s operating system.
D.
It is a physical device that acts as a protective barrier.
Question #32
What type of network sends signals through airwaves and usually does not require cables?
A.
Virtual private network
B.
Intranet
C.
Wired network
D.
Wireless network
Question #33
Which of the following statements is true about public networks?
A.
Many public networks are not secure.
B.
Hackers cannot intercept data transmitted over public networks.
C.
All public networks are free.
D.
Your home network is a public network.
Question #34
What is the U.S. Federal Communication Commission’s role in regard to Internet access?
A.
To release rules surrounding Internet access
B.
To restrict Internet access by location and population
C.
To regulate the bandwidth each website can have
D.
To rate Internet sites similar to movie ratings
Question #35
Which of the following network standards applies to cellular networks?
A.
Ethernet
B.
Wi-Fi
C.
Phoneline
D.
LTE
Question #36
Keisha needs to connect to the Internet, but no wireless networks or Wi-Fi hotspots are available. What can she use instead to make the connection?
A.
virtual private network
B.
cell phone hotspot
C.
Bluetooth connection
D.
mobile hotspot
Question #37
You are dropping your friend back home after a night at the movies. From the car, she turns on the indoor lights in her home using an app on her phone. How is your friend able to do this?
A.
She uses a hub at her home that she connects to through the app.
B.
She has a home network with smart home devices.
C.
She has installed switches that interact with the installed app on her phone.
D.
She dialed into her home modem through the app and sent a command through the router.
Question #38
Sean is studying at a friend's house and notices that he can connect to the wireless network without entering a wireless network key. What does this indicate about the network?
A.
He can use the network only for a limited time.
B.
The network most likely uses a firewall for protection.
C.
The network connection is probably not secure.
D.
He cannot connect to the Internet from the network.
Question #39
Which of the following could indicate a DoS attack on your company server?
A.
Customers cannot view the website on their device because the page will not load.
B.
Customers are required to enter personal information as they complete an order form.
C.
Customers cannot download the most recent newsletter.
D.
Customers are receiving too many emails about special offers.
Question #40
In a connected network, how are hubs and switches similar to one another?
A.
They transfer data to all devices.
B.
They can only connect to a single device.
C.
They are interchangeable terms for the same hardware.
D.
They provide a central point for cables in a network.
Need help with your exam preparation?
Get Answers to this exam for $6 USD.
Get Answers to all exams in [ ITE 115 - Introduction to Computer Applications and Concepts ] course for $25 USD.
Existing Quiz Clients Login here