Deck 10: Data Analysis With Power Tools and Creating Macros

ملء الشاشة (f)
exit full mode
سؤال
Which of the following devices is most likely owned and provided by the ISP?

A) Router
B) Modem
C) Switch
D) Hub
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Kabir just bought a new wireless router and wants to make sure his network will be secure from other people using it without his permission.He's working on configuring security settings for the wireless network and is trying to think through all the settings that will help protect his network.What should Kabir configure so no one can change his network's settings?

A) WPA2 encryption
B) A router password
C) Network firewall
D) A wireless network key
سؤال
Which of these devices would least likely be found on a modern network?

A) Hub
B) Router
C) Modem
D) Switch
سؤال
Which of the following items is NOT required to have a functioning network?

A) Software
B) Data
C) Hardware
D) Internet
سؤال
Which network type is often used for vendor access?

A) Intranet
B) Intranet
C) Extranet
D) Wireless network
سؤال
Tori is traveling for a business conference and needs to order a computer part so it will arrive at her hotel before her presentation at the end of the week.To do this,she'll need to enter her credit card number over the hotel's wireless network.How can Tori protect her financial information?

A) Choose a wireless network that uses the hotel's name
B) Make sure the website she orders from is secure
C) Use a VPN connection
D) Use a coffee shop's wireless network instead
سؤال
Which network topology is most likely to continue to function well even if one device fails?

A) Star network
B) Ring network
C) Bus network
D) Mesh network
سؤال
Aisha's boss asked her to order a new NAS device to provide network storage for their office.She knows she needs multiple hard drives for the device.What other feature is important to ensure high performance for this device?

A) High performance CPU
B) High bandwidth NIC
C) Extra RAM
D) An extra UPS
سؤال
Rachelle is an office manager for an active real estate agency.She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff.What technology can she use to solve this problem?

A) VPN
B) PAN
C) NAS
D) WAN
سؤال
Sonia works from home and uses the Internet often throughout the day.When they're home,Sonia's husband and children also use her network for gaming,social media,and streaming videos or music.What kind of network best describes Sonia's network?

A) ISP network
B) Business network
C) Internet
D) Home network
سؤال
Tyler recently discovered that his neighbors have been using his wireless network to stream movies in the evening.This has caused slower network performance for Tyler,who likes to play Internet games after work.What can Tyler do to protect his wireless network from his neighbors?

A) Configure network authentication
B) Add a firewall to the network
C) Change the key on his door
D) Use a VPN
سؤال
Mick's computer has been having trouble connecting to his wireless network.Sometimes it will connect and then loses the connection within a few minutes.Sometimes he can't get it to connect at all,even when the wireless router is just a few feet away from the computer.Mick's smartphone connects to the network fine,though.What network device most likely needs to be replaced?

A) NIC
B) Router
C) Ethernet cable
D) Modem
سؤال
When an ISP throttles,or slows down,one customer's very busy Internet activity so that other customers don't experience slower Internet service,what concept is being challenged?

A) Social engineering
B) Freedom of choice
C) Net neutrality
D) Network security
سؤال
Zeke is settling in at a coffee shop for some study time before his next class.He notices the coffee shop's wireless network is secured and not open.What information does he need to ask from the barista so he can access the wireless network and get onto the Internet?

A) User password
B) Rootkit
C) Firewall password
D) Security key
سؤال
Sandhya is installing a security camera at the entrance to her office.The camera needs power and network access,but there's no power outlet near the door.What technology can Sandhya use to get power to the security camera?

A) Wi-Fi
B) PoE
C) TCP/IP
D) LTE
سؤال
Liesel is working on a research paper on a computer at her school's library.She saves it to the cloud,then signs off and packs her bookbag so she can get to class on time.On what device is her filed stored?

A) Her USB flash drive
B) The library's computer
C) A remote server
D) Her smartphone
سؤال
What kind of cable is connected to a DSL modem on the ISP's side of the device?

A) TV cable
B) Ethernet cable
C) Telephone cable
D) Power cable
سؤال
Quincy's password was recently stolen by a hacker who used a keylogger to capture Quincy's password as he entered it on his computer.What kind of malware is a keylogger?

A) Worm
B) Spyware
C) Trojan
D) Ransomware
سؤال
When your computer accesses a webpage,what network architecture role is your computer filling?

A) Peer
B) Server
C) Client
D) Administrator
سؤال
Nancy receives a call from someone claiming to work for the local Sheriff's Department.The caller says Nancy hasn't paid her speeding ticket,and she's about to be arrested unless she pays the fine with a credit card over the phone.What kind of attack is this?

A) Social engineering
B) Denial of service
C) Phishing
D) Trojan
سؤال
Which of the following is the most secure SSID for a wireless network at a family residence?

A) Yellow door
B) Linksys
C) GoVols
D) Thompson family Wi-Fi
سؤال
Donna is setting up her own web server to provide information to her clients.How will her web server be uniquely identified on the Internet?

A) IP address
B) User name and password
C) Email address
D) Connecting to different types of networks
سؤال
Shipping services often add tags to shipped packages that can be scanned and monitored through wireless communication.Which network protocol is the best fit for this purpose?

A) Ethernet
B) Wi-Fi
C) Cellular
D) RFID
سؤال
Which of the following terms would a café or coffee shop most likely require of customers before allowing them to use the restaurant's Wi-Fi hotspot? Choose all that apply.

A) Don't perform financial activities online.
B) Don't open email from an unknown sender.
C) Don't conduct illegal activities.
D) Don't hold the restaurant responsible for problems.
سؤال
Marley just bought a new wireless router for her apartment.When she gets home,she connects the router to the modem,her printer,her laptop,and her smartphone.Which of these devices provides a connection for her network to the Internet?

A) Smartphone
B) Printer
C) Modem
D) Laptop
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/25
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 10: Data Analysis With Power Tools and Creating Macros
1
Which of the following devices is most likely owned and provided by the ISP?

A) Router
B) Modem
C) Switch
D) Hub
B
2
Kabir just bought a new wireless router and wants to make sure his network will be secure from other people using it without his permission.He's working on configuring security settings for the wireless network and is trying to think through all the settings that will help protect his network.What should Kabir configure so no one can change his network's settings?

A) WPA2 encryption
B) A router password
C) Network firewall
D) A wireless network key
B
3
Which of these devices would least likely be found on a modern network?

A) Hub
B) Router
C) Modem
D) Switch
A
4
Which of the following items is NOT required to have a functioning network?

A) Software
B) Data
C) Hardware
D) Internet
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which network type is often used for vendor access?

A) Intranet
B) Intranet
C) Extranet
D) Wireless network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
6
Tori is traveling for a business conference and needs to order a computer part so it will arrive at her hotel before her presentation at the end of the week.To do this,she'll need to enter her credit card number over the hotel's wireless network.How can Tori protect her financial information?

A) Choose a wireless network that uses the hotel's name
B) Make sure the website she orders from is secure
C) Use a VPN connection
D) Use a coffee shop's wireless network instead
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which network topology is most likely to continue to function well even if one device fails?

A) Star network
B) Ring network
C) Bus network
D) Mesh network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
8
Aisha's boss asked her to order a new NAS device to provide network storage for their office.She knows she needs multiple hard drives for the device.What other feature is important to ensure high performance for this device?

A) High performance CPU
B) High bandwidth NIC
C) Extra RAM
D) An extra UPS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
9
Rachelle is an office manager for an active real estate agency.She's overseeing a transition to a more complete reliance on electronic documents and needs a way to make dozens of files readily available to all office staff.What technology can she use to solve this problem?

A) VPN
B) PAN
C) NAS
D) WAN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
10
Sonia works from home and uses the Internet often throughout the day.When they're home,Sonia's husband and children also use her network for gaming,social media,and streaming videos or music.What kind of network best describes Sonia's network?

A) ISP network
B) Business network
C) Internet
D) Home network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
11
Tyler recently discovered that his neighbors have been using his wireless network to stream movies in the evening.This has caused slower network performance for Tyler,who likes to play Internet games after work.What can Tyler do to protect his wireless network from his neighbors?

A) Configure network authentication
B) Add a firewall to the network
C) Change the key on his door
D) Use a VPN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
12
Mick's computer has been having trouble connecting to his wireless network.Sometimes it will connect and then loses the connection within a few minutes.Sometimes he can't get it to connect at all,even when the wireless router is just a few feet away from the computer.Mick's smartphone connects to the network fine,though.What network device most likely needs to be replaced?

A) NIC
B) Router
C) Ethernet cable
D) Modem
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
13
When an ISP throttles,or slows down,one customer's very busy Internet activity so that other customers don't experience slower Internet service,what concept is being challenged?

A) Social engineering
B) Freedom of choice
C) Net neutrality
D) Network security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
14
Zeke is settling in at a coffee shop for some study time before his next class.He notices the coffee shop's wireless network is secured and not open.What information does he need to ask from the barista so he can access the wireless network and get onto the Internet?

A) User password
B) Rootkit
C) Firewall password
D) Security key
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
15
Sandhya is installing a security camera at the entrance to her office.The camera needs power and network access,but there's no power outlet near the door.What technology can Sandhya use to get power to the security camera?

A) Wi-Fi
B) PoE
C) TCP/IP
D) LTE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
16
Liesel is working on a research paper on a computer at her school's library.She saves it to the cloud,then signs off and packs her bookbag so she can get to class on time.On what device is her filed stored?

A) Her USB flash drive
B) The library's computer
C) A remote server
D) Her smartphone
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
17
What kind of cable is connected to a DSL modem on the ISP's side of the device?

A) TV cable
B) Ethernet cable
C) Telephone cable
D) Power cable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
18
Quincy's password was recently stolen by a hacker who used a keylogger to capture Quincy's password as he entered it on his computer.What kind of malware is a keylogger?

A) Worm
B) Spyware
C) Trojan
D) Ransomware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
19
When your computer accesses a webpage,what network architecture role is your computer filling?

A) Peer
B) Server
C) Client
D) Administrator
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
20
Nancy receives a call from someone claiming to work for the local Sheriff's Department.The caller says Nancy hasn't paid her speeding ticket,and she's about to be arrested unless she pays the fine with a credit card over the phone.What kind of attack is this?

A) Social engineering
B) Denial of service
C) Phishing
D) Trojan
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
21
Which of the following is the most secure SSID for a wireless network at a family residence?

A) Yellow door
B) Linksys
C) GoVols
D) Thompson family Wi-Fi
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
22
Donna is setting up her own web server to provide information to her clients.How will her web server be uniquely identified on the Internet?

A) IP address
B) User name and password
C) Email address
D) Connecting to different types of networks
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
23
Shipping services often add tags to shipped packages that can be scanned and monitored through wireless communication.Which network protocol is the best fit for this purpose?

A) Ethernet
B) Wi-Fi
C) Cellular
D) RFID
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following terms would a café or coffee shop most likely require of customers before allowing them to use the restaurant's Wi-Fi hotspot? Choose all that apply.

A) Don't perform financial activities online.
B) Don't open email from an unknown sender.
C) Don't conduct illegal activities.
D) Don't hold the restaurant responsible for problems.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
25
Marley just bought a new wireless router for her apartment.When she gets home,she connects the router to the modem,her printer,her laptop,and her smartphone.Which of these devices provides a connection for her network to the Internet?

A) Smartphone
B) Printer
C) Modem
D) Laptop
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 25 في هذه المجموعة.