Services
Discover
Homeschooling
Ask a Question
Log in
Sign up
Filters
Done
Question type:
Essay
Multiple Choice
Short Answer
True False
Matching
Topic
Computing
Study Set
Technology In Action Complete Study Set 1
Quiz 12: Behind the Scenes: Networking and Security in the Business World
Path 4
Access For Free
Share
All types
Filters
Study Flashcards
Practice Exam
Learn
Question 61
True/False
A facial-recognition scanner is an example of a biometric authentication device.
Question 62
True/False
MAC addresses and IP addresses are the same thing.
Question 63
True/False
Crosstalk interference is the tendency of signals on one twisted-pair wire to interfere with signals on the wire next to it.
Question 64
True/False
Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
Question 65
True/False
Wireless access points can provide coverage wherever employees are working with portable devices, such as in conference rooms.
Question 66
True/False
A bridge sends information between two networks.
Question 67
True/False
MAC addresses are restricted to Macintosh computers.
Question 68
True/False
Transmission media comprise the physical system that data take to flow between devices on the network.
Question 69
True/False
Worms often try to disguise from where they are sending data by using a bogus IP addresses instead of using an authorized IP address belonging to the network.
Question 70
True/False
A phishing attack is an attempt to access an account by repeatedly trying different passwords.
Question 71
Matching
Match each of the following terms to its definition:
Premises:
Responses:
packet
sends data between different collision domains
firewall
data broken into a small segment with an address to which it is sent
switch
software or hardware that prevents unauthorized entry
Premises:
packet
firewall
switch
Responses:
sends data between different collision domains
data broken into a small segment with an address to which it is sent
software or hardware that prevents unauthorized entry