105

Classified in Computers

Written at on English with a size of 4.24 KB.

Write your text here!

Modules 8 and 9:

Networking and security

Multiple Choice:

1.A basic computer network can be described as:

A.A minimum of five Computers linked together.

B.Computer and cables That link the network together.

C.Two or more Computers that are linked together.

D.The use of Satellites linking computers together.

2.  LAN stands For:

A.Local area nodes.

B.Logical Arrangement of networks.

C.Local area Network.

D.Linked-area Network.

3.The primary Difference between a LAN and a WAN is:

A.The number of Software programs available.

B.Distance.

C.The variety of hardware devices.

D.The number of Hardware devices.

4.Each Individual computer and component attached to a network is a:

A.Node.

B.Connection point.

C.Switch.

D.Hub.

5.In a traditional LAN, each node on the network is connected through:

A.Cables.

B.Satellites.

C.Microwaves.

D.Wireless Transmission.

6.

MAN Stands for:

A.Metropolitan Area network.

B.Marked area Network.

C.Metropolitan Arranged network.

D.Manufactured Arrangement of networks.

7.The hardware Device or software program that sends messages between networks is known as a:

A.Bridge.

B.Router.

C.Backbone.

D.Gateway.                 

8.NIC stands For:

A.Network internal Card.

B.Newer industrial Computer.

C.Networking Internet connection.

D.Network Interface card.

9.Computer bits must Be ___________ to travel over phone lines.

A.Analog signals

B.Digital signals

C.Modem signals

D.Converted to bytes

10.Modem speed is Measured in:

A.Bits per second.

B.Bytes per second.

C.Bits per Millisecond.

D.Bytes per minute.

11.What is the Term for the amount of information transmitted through a communication medium In a certain amount of time?

A.DPI

B.BPS

C.Bandwidth

D.Baud rate

12.What type of cable uses light waves to carry information at high speed?

A.Cable modems

B.Fiber-optic cables

C.Wireless cables

D.Phone lines

13.What helps Block unauthorized access and data transfer?

A.A bridge

B.A VPN

C.A WEP

D.A firewall

14.A program that Performs a useful task while simultaneously allowing destructive acts is a:

A.Worm.

B.Trojan horse.

C.Virus.

D.Macro virus.

15.An Intentionally disruptive program that spreads from program to program or from Disk to disk is known as a:

A.Trojan horse.

B.Virus.

C.Time bomb.

D.Time-related bomb Sequence.

16.What type of Virus uses computer hosts to reproduce itself?

A.Time bomb

B.Worm

C.Melissa virus

D.Macro virus

17.When customers Of a Web site are unable to access it due to a bombardment of fake traffic, it Is known as:

A.A virus.

B.A Trojan horse.

C.Cracking.

D.A denial of Service attack

18.The scrambling Of code is known as:

A.Encryption.

B.A firewall.

C.Scrambling.

D.Password-proofing.

T/F Questions

1.Information Security is the practice of defending information from unauthorized Access.  T

2.A Computer worm is a standalone malware computer program that replicates itself In order to spread to other computers. T

3.Hoax Viruses flood a targeted computer with so many requests that it cripples Functionality.  F

4.The Most complex type of firewall is the application Proxy firewall. T

5.A Router is a hardware component Used to interconnect networks. T

Entradas relacionadas: