A modem can also function as what other piece of hardware?
A. A hub
B. A switch
C. A router
D. A network interface card - correct answer ✔✔A. A hub
A network administrator is usually not required on a _____ network.
A. peer-to-peer
B. client/server
C. intranet
D. metropolitan area - correct answer ✔✔A. peer-to-peer
Alex received an email from what appeared to be his bank.What would indicate the message was
actually a phishing attempt?
A. It did not include a promotional offer.
B. It was written in an overly formal tone.
C. The signature was consistent with other emails from his bank.
D. It contained typos and other grammatical errors. - correct answer ✔✔D. It contained typos and other
grammatical errors.
As chief financial officer, you want to send the fourth quarter profit/loss spreadsheets to the president of
the company. How can you send the report without worrying about someone else accessing it?
A. Store the report on a flash drive that you have password-protected with the president's name.
B. Encrypt the data in the report.
C. Send the email without attaching the report and ask the president to call you.
D. Transfer the report to the cloud. - correct answer ✔✔B. Encrypt the data in the report.
, As the new manager at your local grocery store, you want to create a more efficient inventory process by
allowing outside vendors and suppliers to review current inventory records and adjust recurring
shipment orders to reduce product waste. What type of network should you use?
A. VPN
B. Extranet
C. Wi-Fi
D. Intranet - correct answer ✔✔B. Extranet
Computers communicating on a network must follow a _____, a common set of rules for exchanging
information.
A. standard
B. protocol
C. syntax
D. topology - correct answer ✔✔B. protocol
Devices on a _____ area network are connected via Bluetooth.
A. local
B. wide
C. metropolitan
D. personal - correct answer ✔✔D. personal
How does a wireless network key work with an encrypted wireless network?
A. The wireless key is the encryption code needed by the receiver to decode the file.
B. The sending and receiving devices must know the wireless network key to communicate.
C. The wireless network needs the key to decode the data before sending.
D. The wireless network key is your password for logging onto an Internet email system to receive files. -
correct answer ✔✔B. The sending and receiving devices must know the wireless network key to
communicate.
If you want to share information with individuals who are internal to your organization, which type of
network would you want to use?