Computers in a P2P network belong to a homegroup - correct answer ✔✔false
Computers running Windows 7 or later can belong to a workgroup - correct answer ✔✔true
In a client-server network- users log in to the network instead of their local computers and are granted
access to resources based on that login - correct answer ✔✔true
Servers range from very small to massive enterprise-level systems that serve hundreds of thousands of
clients - correct answer ✔✔true
Devices on a local area network are connected by using nodes - correct answer ✔✔false
A switch connects multiple devices on a local area network - correct answer ✔✔true
A wireless LAN has a very limited range of only about 10 to 100 meters roughly 30 to 300 feet - correct
answer ✔✔false
A home LAN uses the same network standards and equipment as those used in larger business networks
- correct answer ✔✔true
The physical of a LAN is called its topology - correct answer ✔✔true
Cellular networks use encryption to ensure the data is secure as it travels through the public network -
correct answer ✔✔false
Each device that connects to a network must have some type of network adapter - correct answer
✔✔true
, Wi-fi networks found in homes and public hotspots use the IEEE 201.88 standards - correct answer
✔✔false
Routers make up the backbone of the Internet - correct answer ✔✔true
A wireless access point resembles a switch - correct answer ✔✔true
Network hardware is what enables devices to connect to each other but the domain controller enables
them to communicate - correct answer ✔✔false
TCP/IP is the default protocol stack installed on Windows-Mac- and Linux computers - correct answer
✔✔true
Devices on a network must have an IP address - correct answer ✔✔true
Wi-fi protected setup adds security to a wireless network by encrypting transmitted data - correct
answer ✔✔true
To prevent your network from being seen on other devices- disable the service set identifier - correct
answer ✔✔true
Cybercrime is any criminal activity on the internet - correct answer ✔✔true
Phishing redirects you to a phony website - correct answer ✔✔false
Black-hat hackers are also known as sneakers - correct answer ✔✔false
Identity theft is when someone poses as you-using your name-social security number-or other personal
information - correct answer ✔✔true