Computer Concepts Module 10 Exam
Computer Concepts Module 10 Exam When it comes to secure data storage on a network, which of the following statements is true? Roles can be granted to individuals to view files and make changes to files on a network. Which network protocol allows devices to communicate with each other over a short range, usually less than 30 feet/9 meters? Bluetooth Which of the following could indicate a DoS attack on your company server? Customers cannot view the website on their device because the page will not load. Which of the following describes an evil twin? A normal looking yet fraudulent Wi-Fi network that allows hackers to capture personal information users transmit using it. Which of the following is a disadvantage of using cloud computing to share files? The inability to access your files if you lose your Internet connection. Which of the following is an authentication method to keep your data safe? NOT encryption Which of the following is an example of a personal area network? smartwatch and phone connected via Bluetooth Which of the following is true about broadband connections? Broadband connections are "always-on" with devices connected to them. Which of the following network standards applies to cellular networks? LTE Which of the following statements do opponents of net neutrality agree with? ISPs should charge more for high-bandwidth connections. Which of the following statements is NOT true about a local firewall? A firewall is a protective barrier between a computer or network and others on the Internet that inspects data being transmitted to or from a network to prevent unsolicited data exchanges. There are two types of firewalls: hardware firewalls and software firewalls. Hardware firewalls are physical devices, often used on larger, corporate networks, that block unauthorized traffic and intruders from accessing the network. Software firewalls, also called local firewalls, are installed on your computer or device and block unauthorized communication to or from the network. Software firewalls often are built into the computer's operating system Which of the following statements is true about public networks? Many public networks are not secure
École, étude et sujet
- Établissement
- Computer Concepts Module 10
- Cours
- Computer Concepts Module 10
Infos sur le Document
- Publié le
- 13 juillet 2023
- Nombre de pages
- 5
- Écrit en
- 2022/2023
- Type
- Examen
- Contient
- Questions et réponses
Sujets
- computer concepts
-
computer concepts module 10 exam
-
computer concepts module 10
Document également disponible en groupe