Deck 45: Network Security

Full screen (f)
exit full mode
Question
The primary challenge of network security is faster throughput.
Use Space or
up arrow
down arrow
to flip the card.
Question
To protect your wireless devices and the information they hold,you should set up encryption such as ____.

A) SSID
B) SkyDrive
C) MAC
D) WPA2
Question
By default,the personal files and folders on Windows and Mac computers are open to others on the same network.
Question
Wi-Fi piracy is the act of driving through neighborhoods with a wireless notebook or handheld computer looking for unsecured Wi-Fi networks.
Question
A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.
Question
To avoid viruses,most organizations allow users to install their own software on their corporate PC.
Question
When using a public Wi-Fi network,when is it safe to send private information over the network?

A) only if the access point requires a password
B) whenever you recognize the login screen
C) never
D) only when you autoconnect
Question
By default,wireless access points are set to broadcast their presence so others can easily catch a wireless signal.
Question
Employers are legally allowed to monitor employee email or web activity without first notifying the employee of this practice through network usage policies.
Question
The job of the ____ administrator is to control who has access to various network resources such as files and folders.

A) multiuser
B) network
C) software
D) technology
Question
When you enter the wrong GPS position for the start point on a trip you are about to take,this is an example of ____.

A) a data-entry error
B) improper setup of a computer system
C) an error in computer programming
D) mishandling of computer output
Question
When starting a new job,you may need to sign a(n)____ that defines acceptable and unacceptable uses of computer and network resources.

A) network usage policy
B) request for proposal
C) password agreement
D) Internet notification policy
Question
____ threats are network security threats that originate from within a network.

A) Interior
B) Accuracy
C) Denial of service
D) Retaliation
Question
____ permissions provide registered users with access to the files they need,while restricting access to private resources.

A) Server
B) Client
C) Protocol
D) User
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/14
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 45: Network Security
1
The primary challenge of network security is faster throughput.
False
2
To protect your wireless devices and the information they hold,you should set up encryption such as ____.

A) SSID
B) SkyDrive
C) MAC
D) WPA2
D
3
By default,the personal files and folders on Windows and Mac computers are open to others on the same network.
False
4
Wi-Fi piracy is the act of driving through neighborhoods with a wireless notebook or handheld computer looking for unsecured Wi-Fi networks.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
5
A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
6
To avoid viruses,most organizations allow users to install their own software on their corporate PC.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
7
When using a public Wi-Fi network,when is it safe to send private information over the network?

A) only if the access point requires a password
B) whenever you recognize the login screen
C) never
D) only when you autoconnect
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
8
By default,wireless access points are set to broadcast their presence so others can easily catch a wireless signal.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
9
Employers are legally allowed to monitor employee email or web activity without first notifying the employee of this practice through network usage policies.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
10
The job of the ____ administrator is to control who has access to various network resources such as files and folders.

A) multiuser
B) network
C) software
D) technology
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
11
When you enter the wrong GPS position for the start point on a trip you are about to take,this is an example of ____.

A) a data-entry error
B) improper setup of a computer system
C) an error in computer programming
D) mishandling of computer output
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
12
When starting a new job,you may need to sign a(n)____ that defines acceptable and unacceptable uses of computer and network resources.

A) network usage policy
B) request for proposal
C) password agreement
D) Internet notification policy
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
13
____ threats are network security threats that originate from within a network.

A) Interior
B) Accuracy
C) Denial of service
D) Retaliation
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
14
____ permissions provide registered users with access to the files they need,while restricting access to private resources.

A) Server
B) Client
C) Protocol
D) User
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 14 flashcards in this deck.