Deck 45: Network Security

ملء الشاشة (f)
exit full mode
سؤال
The primary challenge of network security is faster throughput.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
To protect your wireless devices and the information they hold,you should set up encryption such as ____.

A) SSID
B) SkyDrive
C) MAC
D) WPA2
سؤال
By default,the personal files and folders on Windows and Mac computers are open to others on the same network.
سؤال
Wi-Fi piracy is the act of driving through neighborhoods with a wireless notebook or handheld computer looking for unsecured Wi-Fi networks.
سؤال
A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.
سؤال
To avoid viruses,most organizations allow users to install their own software on their corporate PC.
سؤال
When using a public Wi-Fi network,when is it safe to send private information over the network?

A) only if the access point requires a password
B) whenever you recognize the login screen
C) never
D) only when you autoconnect
سؤال
By default,wireless access points are set to broadcast their presence so others can easily catch a wireless signal.
سؤال
Employers are legally allowed to monitor employee email or web activity without first notifying the employee of this practice through network usage policies.
سؤال
The job of the ____ administrator is to control who has access to various network resources such as files and folders.

A) multiuser
B) network
C) software
D) technology
سؤال
When you enter the wrong GPS position for the start point on a trip you are about to take,this is an example of ____.

A) a data-entry error
B) improper setup of a computer system
C) an error in computer programming
D) mishandling of computer output
سؤال
When starting a new job,you may need to sign a(n)____ that defines acceptable and unacceptable uses of computer and network resources.

A) network usage policy
B) request for proposal
C) password agreement
D) Internet notification policy
سؤال
____ threats are network security threats that originate from within a network.

A) Interior
B) Accuracy
C) Denial of service
D) Retaliation
سؤال
____ permissions provide registered users with access to the files they need,while restricting access to private resources.

A) Server
B) Client
C) Protocol
D) User
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/14
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 45: Network Security
1
The primary challenge of network security is faster throughput.
False
2
To protect your wireless devices and the information they hold,you should set up encryption such as ____.

A) SSID
B) SkyDrive
C) MAC
D) WPA2
D
3
By default,the personal files and folders on Windows and Mac computers are open to others on the same network.
False
4
Wi-Fi piracy is the act of driving through neighborhoods with a wireless notebook or handheld computer looking for unsecured Wi-Fi networks.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
5
A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
6
To avoid viruses,most organizations allow users to install their own software on their corporate PC.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
7
When using a public Wi-Fi network,when is it safe to send private information over the network?

A) only if the access point requires a password
B) whenever you recognize the login screen
C) never
D) only when you autoconnect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
8
By default,wireless access points are set to broadcast their presence so others can easily catch a wireless signal.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
9
Employers are legally allowed to monitor employee email or web activity without first notifying the employee of this practice through network usage policies.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
10
The job of the ____ administrator is to control who has access to various network resources such as files and folders.

A) multiuser
B) network
C) software
D) technology
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
11
When you enter the wrong GPS position for the start point on a trip you are about to take,this is an example of ____.

A) a data-entry error
B) improper setup of a computer system
C) an error in computer programming
D) mishandling of computer output
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
12
When starting a new job,you may need to sign a(n)____ that defines acceptable and unacceptable uses of computer and network resources.

A) network usage policy
B) request for proposal
C) password agreement
D) Internet notification policy
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
13
____ threats are network security threats that originate from within a network.

A) Interior
B) Accuracy
C) Denial of service
D) Retaliation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
14
____ permissions provide registered users with access to the files they need,while restricting access to private resources.

A) Server
B) Client
C) Protocol
D) User
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 14 في هذه المجموعة.