Deck 45: Network Security
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/14
Play
Full screen (f)
Deck 45: Network Security
1
The primary challenge of network security is faster throughput.
False
2
To protect your wireless devices and the information they hold,you should set up encryption such as ____.
A) SSID
B) SkyDrive
C) MAC
D) WPA2
A) SSID
B) SkyDrive
C) MAC
D) WPA2
D
3
By default,the personal files and folders on Windows and Mac computers are open to others on the same network.
False
4
Wi-Fi piracy is the act of driving through neighborhoods with a wireless notebook or handheld computer looking for unsecured Wi-Fi networks.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
5
A Guest account is for someone who does not have a permanent account and needs to temporarily access computer or network resources.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
6
To avoid viruses,most organizations allow users to install their own software on their corporate PC.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
7
When using a public Wi-Fi network,when is it safe to send private information over the network?
A) only if the access point requires a password
B) whenever you recognize the login screen
C) never
D) only when you autoconnect
A) only if the access point requires a password
B) whenever you recognize the login screen
C) never
D) only when you autoconnect
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
8
By default,wireless access points are set to broadcast their presence so others can easily catch a wireless signal.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
9
Employers are legally allowed to monitor employee email or web activity without first notifying the employee of this practice through network usage policies.
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
10
The job of the ____ administrator is to control who has access to various network resources such as files and folders.
A) multiuser
B) network
C) software
D) technology
A) multiuser
B) network
C) software
D) technology
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
11
When you enter the wrong GPS position for the start point on a trip you are about to take,this is an example of ____.
A) a data-entry error
B) improper setup of a computer system
C) an error in computer programming
D) mishandling of computer output
A) a data-entry error
B) improper setup of a computer system
C) an error in computer programming
D) mishandling of computer output
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
12
When starting a new job,you may need to sign a(n)____ that defines acceptable and unacceptable uses of computer and network resources.
A) network usage policy
B) request for proposal
C) password agreement
D) Internet notification policy
A) network usage policy
B) request for proposal
C) password agreement
D) Internet notification policy
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
13
____ threats are network security threats that originate from within a network.
A) Interior
B) Accuracy
C) Denial of service
D) Retaliation
A) Interior
B) Accuracy
C) Denial of service
D) Retaliation
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck
14
____ permissions provide registered users with access to the files they need,while restricting access to private resources.
A) Server
B) Client
C) Protocol
D) User
A) Server
B) Client
C) Protocol
D) User
Unlock Deck
Unlock for access to all 14 flashcards in this deck.
Unlock Deck
k this deck