Search Header Logo

TEST BANK: NETWORKS AND DIGITAL SECURITY

Authored by Michael Johnson

Information Technology (IT)

9th - 12th Grade

TEST BANK: NETWORKS AND DIGITAL SECURITY
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 3 pts

Media Image

Evelyn is responsible for managing her company's IT infrastructure. She decides to host the company's intranet on the same servers that are used to host its public webpages.

True

False

2.

MULTIPLE CHOICE QUESTION

3 mins • 3 pts

Media Image

Mason is trying to find out where a website visitor is located by checking their IP address. In many cases, can Mason determine the visitor's location from the IP address?

True

False

3.

MULTIPLE CHOICE QUESTION

3 mins • 3 pts

Media Image

Noah is setting up a home office and wants to connect his computer to the internet. He learns that a communications device connects the sending device to transmission media. Is this statement true or false?

True

False

4.

MULTIPLE CHOICE QUESTION

3 mins • 3 pts

Media Image

Liam manages the company server while Zoe and Daniel use client computers. On this client/server network, Zoe and Daniel often do not have equal permissions as Liam.

True

False

5.

MULTIPLE CHOICE QUESTION

3 mins • 3 pts

Media Image

Lily connects her laptop and smartphone using a Wi-Fi router at home. Is this setup considered a network, which is a system of two or more devices linked by wires, cables or a telecommunications system?

True

False

6.

MULTIPLE CHOICE QUESTION

3 mins • 3 pts

Media Image

Benjamin is considering whether to keep his Internet connection open, even when he's not using it, so that he doesn't miss any updates or patches to his apps. Should he do this?

Yes

No

7.

MULTIPLE CHOICE QUESTION

3 mins • 3 pts

Media Image

Emma downloads a seemingly harmless app on her computer. Unknown to her, the app installs a rootkit that hides itself and allows someone from a remote location to take full control of her device. Is it true that a rootkit is a program that hides in a computer or mobile device and allows someone from a remote location to take full control?

True

False

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?