Bold the correct response to each question.
l. (True or False) Networks allow computers to 8. (True or False) Two types of firewalls include
share resources, such as hardware, software, hardware firewalls and software firewalls.
data, and information.
9. Which of the following is an advisable
2. (True or False) A switch is a communications practice for securing data stored on a
device that connects a communications channel network?
such as the Internet to a sending or receiving a. Store all data on network attached storage.
device such as a computer.
b. Allow all network users access to all data.
3. (True or False) A DSL modem uses existing c. Only grant access to data to those with a
standard copper telephone wiring to send and legitimate need.
receive digital data. d. Store data on a separate storage device
4. Which of the following is not a common instead of one that is connected to the
network topology? network.
a. bus network 10. (True or False) Encryption converts
b. star network unrecognizable data into recognizable data.
c. client/server network
ll. Which government agency is responsible for
d. mesh network
releasing the rules surrounding Internet
5. Which of the following is a private network
access?
used by organizations to communicate
internally? a. Federal Communications Commission (FCC)
a. intranet b. Internet Advisory Board (IAB)
b. Internet c. Internet Access Commission (IAC)
c. extranet d. None of the above
d. virtual network 12. (True or False) The Ethernet standard controls
6. (True or False) Adware tracks and transmits how network interface cards (NICs), routers,
personal information from your computer or and modems share access to cables and phone
device without your knowledge. lines, as well as dictates how to transmit data.
13. Which of the following is not a safety
7. Which of the following describes a normal-
precaution for securing a wireless network?
looking, yet fraudulent Wi-Fi network?
a. Regularly change the wireless network key.
a. virtual private network
b. Change the administrative password from
b. trojan
the factory-provided default.
c. spoof
d. evil twin c. Disable WPA2.
d. Regularly check for and perform updates to
your router's software.