Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Discovering the Internet Complete
Quiz 6: Understanding Internet Technologies and Security
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 21
True/False
A security audit may result in a revision of security policies and procedures, improved employee training, and making necessary updates to the network's hardware and software.
Question 22
Multiple Choice
A ____ topology connects each node to a central device, such as a hub or switch.
Question 23
Multiple Choice
The two most common network access methods are ____ and token ring.
Question 24
Multiple Choice
A network's ____ is the arrangement of computers and mobile devices, printers, and other devices.
Question 25
Multiple Choice
A client/server LAN, as shown in the accompanying figure, uses a network ____ to manage data storage, printer access, communications, Internet connections, security, and network administration.
Question 26
True/False
Cloud computing involves using devices to measure biological data to identify a user. ________________________
Question 27
True/False
Data restore procedures should be tested periodically to ensure that the backed up data is correct and complete, and that the storage media or cloud-based storage service works properly.
Question 28
Multiple Choice
A network supporting users in a small geographical area, such as a home, an office, a single building, or several buildings, is called a ____.
Question 29
Multiple Choice
A(n) ____ cannot determine how to direct a packet; it simply sends the same signal to all of its connected nodes or segments.
Question 30
True/False
Personal VPNs exist wherein mobile or wireless users can establish a private, secure network connection.
Question 31
True/False
External network security threats can include management failure to support organization-wide security awareness, inadequate security policies, and unenforced security procedures. _______________________
Question 32
True/False
The primary tools used to provide transaction authentication, integrity, nonrepudiation, and confidentiality are encryption and dynamic routing.
Question 33
Multiple Choice
A hardware device or software connecting two or more networks or network segments that use different packet formatting, different communication protocols, and different access methods is called a ____.