Chapter 7: Networking and Securityshahrabi/home/ID1400/tech action... · Web viewCat 5e UTP cable is recommended for Ethernet networks. Cat 5 UTP supports a data transmission rate
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
CHAPTER 7: NETWORKING AND SECURITY:
CONNECTING COMPUTERS AND KEEPING THEM SAFE FROM HACKERS AND VIRUSES
Multiple Choice:
1. Which of the following is NOT an example of a network node?
A. printer
B. computer
C. NOS
D. modem
Answer: C Reference: Networking Fundamentals Difficulty: Moderate
2. The network architecture used in most home networks is:
A. client-server LAN.
B. peer-to-peer LAN.
C. client-server WAN.
D. peer-to-peer WAN.
Answer: B Reference: Network Architectures Difficulty: Moderate
3. You must install a(n) ____________ on a network if you want to share a broadband Internet connection.
A. router
B. modem
C. node
D. cable
Answer: A Reference: Network Navigation Devices Difficulty: Moderate
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
4. Which of the following statements concerning peer-to-peer networks is FALSE?
A. A peer-to-peer network is the most common example of a locally controlled network.
B. Peer-to-peer networks cost more than client/server networks and are more difficult to maintain.
C. Each node on a peer-to-peer network can communicate directly with every other node on the network.
D. Peer-to-peer networks are the most common type of home network.
Answer: B Reference: Network Architectures Difficulty: Moderate
5. The design of the network is called the network:
A. architecture.
B. server.
C. transmission.
D. type.
Answer: A Reference: Network Architectures Difficulty: Easy
6. Data transfer rate (also called bandwidth) is the ____________ speed at which data can be transmitted between two nodes on a network.
A. average
B. minimum
C. actual
D. maximum
Answer: D Reference: Transmission Media Difficulty: Challenging
7. ____________ are the navigation devices that act as the “traffic cops” of the network and forward packets to nodes on the same network (not between two networks).
A. NICs
B. Routers
C. Switches
D. Modems
Answer: C Reference: Network Navigation Devices Difficulty: Moderate
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
12. A ____________ is a device, contained in a wireless network adapter, that translates the electronic data on a network into radio waves and broadcasts the radio waves to other nodes on the network.
A. router
B. switch
C. hub
D. transceiver
Answer: D Reference: Wireless Ethernet Networks Difficulty: Moderate
13. A switch is also known as a(n):
A. smart hub.
B. DSL modem.
C. smart router.
D. cable modem.
Answer: A Reference: Wired Ethernet Networks: Ethernet Switches Difficulty: Moderate
14. When creating a phoneline network, it is necessary to install a(n) ____________ adapter.
A. wireless
B. phone cord
C. home phoneline network
D. Digital Subscriber Line (DSL)
Answer: C Reference: Phoneline Networks Difficulty: Moderate
15. ____________ adapters, used on a power-line network, are available in either USB or Ethernet versions.
A. Power-line network
B. Peer-to-peer network
C. Phoneline network
D. Wireless network
Answer: A Reference: Power-Line Networks Difficulty: Easy
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
24. If computers in a wireless network are unable to connect to the wireless router, adding a(n) ____________ extends the range of the wireless network by providing a second point to which the nodes can connect to the network.
A. router
B. Internet portal
C. cable modem
D. wireless access point
Answer: D Reference: Wireless Ethernet Networks Difficulty: Moderate
25. In network terminology, a(n) ____________ is a wireless router that combines the capabilities of a wired router with the ability to receive wireless signals.
A. hub
B. gateway
C. adapter
D. Ethernet port
Answer: B Reference: Wireless Ethernet Networks Difficulty: Moderate
26. If you frequently need to transfer streaming video or very large files between computers, which of the following networks would be the best choice?
A. Ethernet
B. wireless
C. power-line
D. phoneline
Answer: A Reference: Wired Ethernet Networks Difficulty: Challenging
27. The ____________ operating system assists with configuring home networks with a Network Setup Wizard.
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
28. In a(n) ____________ network, any electrical outlet provides a network connection.
A. wireless
B. power-line
C. phoneline
D. Ethernet
Answer: B Reference: Power-Line Networks Difficulty: Easy
29. In a(n) ____________ network, any phone jack provides a network connection.
A. phoneline
B. power-line
C. 802.11g
D. Ethernet
Answer: A Reference: Phoneline Networks Difficulty: Easy
30. A computer virus attaches itself to and attempts to hide within the code of a(n) ____________ program.
A. zombie
B. Trojan horse
C. host
D. worm
Answer: C Reference: Computer Threats: Computer Viruses Difficulty: Moderate
31. ____________ viruses replicate themselves to the Master Boot Record whenever the computer boots up, ensuring that the virus will be loaded into memory before some virus protection programs are loaded.
A. Zombie
B. Trojan horse
C. Worm
D. Boot-sector
Answer: D Reference: Types of Viruses Difficulty: Moderate
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
32. ____________ viruses are often transmitted by a floppy disk left in the floppy disk drive.
A. Boot-sector
B. Trojan horse
C. Script
D. Logic bomb
Answer: A Reference: Types of Viruses Difficulty: Challenging
33. ____________ are viruses that are triggered when certain logical conditions are met.
A. Boot-sector viruses
B. Logic bombs
C. Macro viruses
D. Worms
Answer: B Reference: Types of Viruses Difficulty: Moderate
34. ____________viruses attach themselves to documents such as Word and Excel.
A. Boot-sector
B. Trojan horse
C. DOS
D. Macro
Answer: D Reference: Types of Viruses Difficulty: Moderate
35. A numbered communication gateway or path, used to organize requests for information, that is assigned for a commonly used network service such as SMTP or HTTP is called a:
A. protocol.
B. physical port.
C. logical port.
D. packet filter.
Answer: C Reference: How Hackers Gain Access Difficulty: Moderate
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
44. A ____________ is the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests.
A. zombie
B. worm
C. DoS
D. Trojan horse
Answer: A Reference: Denial of Service Attacks Difficulty: Easy
45. Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) use ____________ to protect data.
A. packet filtering
B. network address translation
C. encryption
D. service set identifiers
Answer: C Reference: Securing Wireless Networks Difficulty: Challenging
46. ____________ are viruses that are triggered by the passage of time or on a certain date.
A. Boot-sector viruses
B. Macro viruses
C. Time bombs
D. Worms
Answer: C Reference: Types of Viruses Difficulty: Moderate
47. Unlike other viruses, ____________ are viruses that can run independently of host file execution and are much more active in spreading themselves.
A. boot-sector viruses
B. time bombs
C. Trojan horses
D. worms
Answer: D Reference: Types of Viruses Difficulty: Moderate
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
48. ____________ viruses temporarily erase their code from the files where they reside and hide in active memory.
A. Multipartite
B. Stealth
C. Polymorphic
D. Script
Answer: B Reference: Virus Classifications Difficulty: Challenging
49. All of the following are recommended to secure a wireless network EXCEPT:
A. changing the default password on your router.
B. turning on security protocols.
C. using static IP addressing.
D. restricting access to the network to certain MAC addresses.
Answer: C Reference: Securing Wireless Networks Difficulty: Challenging
50. If a virus signature or other suspicious activity is detected by the antivirus software, it places the virus in a secure area of the hard drive so that it won’t spread infection to other files. This procedure is known as:
A. inoculation.
B. automatic updating.
C. encryption.
D. quarantining.
Answer: D Reference: Computer Safeguards: Antivirus Software Difficulty: Easy
Fill in the Blank:
51. The Internet is a good example of a(n) ____________ network.
Answer: client/server Reference: Describing Networks Based on Network Control Difficulty: Easy
52. A(n) ____________ network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network.
60. Windows Server 2003 is an example of specialized software known as ____________ software.
Answer: network operating system (NOS) Reference: Networking Software Difficulty: Easy
61. ____________ viruses, the newest form of virus, compress common data files into a file using a complex encryption key rendering your files unusable.
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
64. When setting up a network, each computer on the network needs a(n) ____________ so that the network can identify it and know which computer is requesting data and services so that the data can be delivered correctly.
Answer: unique name Reference: Configuring Software For Your Home Network Difficulty: Moderate
65. ____________ networks move data through the network using conventional phone lines.
67. Using millions of computers during their inactive periods to provide a network-based maximization of productivity is called ____________ computing.
69. A(n) ____________ is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data to use for illegal purposes.
Answer: packet sniffer Reference: What Hackers Steal Difficulty: Moderate
70. A(n) ____________ is a program that appears to be something useful or desirable (like a game or a screen saver) but actually does something malicious in the background.
71. When legitimate users are denied access to a computer system due to repeated bogus requests made by a hacker through a “zombie” computer systems, this is called a(n) ____________.
Answer: denial of service (DoS) attack Reference: Denial of Service Attacks Difficulty: Moderate
72. ____________ is characterized by someone using personal information about you to assume your identity for the purpose of defrauding others.
Answer: Identity theft Reference: What Hackers Steal Difficulty: Easy
73. ____________ are software programs or hardware devices designed to keep computers safe from hackers.
Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
75. The process firewalls use to assign internal IP addresses on a network (which are not shared with devices not on the network) so the address is safe from hackers is called ____________.
Answer: Network Address Translation (NAT) Reference: Dig Deeper: How Firewalls Work Difficulty:
Challenging
True and False:
76. Wide Area Networks (WANs) are made up of LANs connected over long distances.
Answer: True Reference: Describing Networks Based on Distance Difficulty: Easy
77. Networking standards set by organizations such as the IEEE make it easier for manufacturers to produce devices that work with a variety of computers and peripherals.
Answer: True Reference: Bits and Bytes: One Brand Equals Fewer Headaches Difficulty: Moderate
78. Throughput is the maximum speed at which data can be transferred.
Answer: False (Data transfer rate / bandwidth) Reference: Transmission Media Difficulty: Challenging
79. Public places at which you can wirelessly connect to the Internet are known as “hot spots.”
Answer: True Reference: Bits and Bytes: Wireless Hot Spots Difficulty: Easy
80. A Trojan horse program can install backdoor programs that allow hackers to take almost complete control of your computer without your knowledge.
81. If a firewall is configured to ignore all incoming packets on a particular logical port, this is known as packet filtering.
Answer: False (logical port blocking) Reference: Dig Deeper: How Firewalls Work Difficulty: Challenging
82. Static addressing means retaining the same IP address for a period of time.
Answer: True Reference: Dig Deeper: How Firewalls Work Difficulty: Easy
83. Dynamic addressing makes broadband users more vulnerable to hackers because the hackers have a more permanent IP address with which to locate the computer.
Answer: False (Static) Reference: Dig Deeper: How Firewalls Work Difficulty: Moderate
84. Some popular software firewalls are BlackICE PC Protection and ZoneAlarm.
Answer: True Reference: Types of Firewalls Difficulty: Easy