ITN Modules 1-3

ITN Modules 1-3

Professional Development

30 Qs

quiz-placeholder

Similar activities

Ritu Jaglan-Assign 1

Ritu Jaglan-Assign 1

University - Professional Development

25 Qs

Komputer Jaringan Dasar

Komputer Jaringan Dasar

1st Grade - Professional Development

30 Qs

Unit 5 CH 3 and 4

Unit 5 CH 3 and 4

Professional Development

35 Qs

CCNA ENSA

CCNA ENSA

Professional Development

30 Qs

Cyber Networking

Cyber Networking

Professional Development

25 Qs

Internet Technologies Quiz 2

Internet Technologies Quiz 2

Professional Development

25 Qs

PTS AIJ KELAS XI

PTS AIJ KELAS XI

Professional Development

26 Qs

IoT Quiz - 1

IoT Quiz - 1

University - Professional Development

25 Qs

ITN Modules 1-3

ITN Modules 1-3

Assessment

Quiz

Computers

Professional Development

Medium

Created by

Bruce (BCollier)

Used 17+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

45 sec • 1 pt

During a routine inspection, a technician discovered that software that was installed on a computer was secretly collecting data about websites that were visited by users of the computer. Which type of threat is affecting this computer?

DoS attack​

identity theft

spyware

zero-day attack

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which term refers to a network that provides secure access to the corporate offices by suppliers, customers and collaborators?

Internet

extranet

intranet

extendednet

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A large corporation has modified its network to allow users to access network resources from their personal laptops and smart phones. Which networking trend does this describe?

cloud computing

online collaboration

video conferencing

bring your own device

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an ISP?

It is an organization that enables individuals and businesses to connect to the Internet.

It is a protocol that establishes how computers within a local network communicate.

It is a standards body that develops cabling and wiring standards for networking.

It is a networking device that combines the functionality of several different networking devices in one.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to access confidential pricing information from internal servers at the Head Office. What type of network would the employee access?

a local area network

an extranet

the Internet

an intranet

Answer explanation

Intranet is a term used to refer to a private connection of LANs and WANs that belongs to an organization. An intranet is designed to be accessible only by the organization’s members, employees, or others with authorization.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the use of powerline networking technology?

New “smart” electrical cabling is used to extend an existing home LAN.

A device connects to an existing home LAN using an adapter and an existing electrical outlet.

A home LAN is installed without the use of physical cabling.

Wireless access points use powerline adapters to distribute data through the home LAN.

Answer explanation

Powerline networking adds the ability to connect a device to the network using an adapter wherever there is an electrical outlet.​ The network uses existing electrical wiring to send data. It is not a replacement for physical cabling, but it can add functionality in places where wireless access points cannot be used or cannot reach devices.​

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?

fault tolerance

scalability

security

Quality of Service (QoS)

reliability

Answer explanation

Network security includes protecting the confidentiality of data that is on the network. In this case, because confidential data has been made available to unauthorized users, the security characteristic of the network has failed.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?