Login
Quizgoat
Find your answers, solutions and more...
We made it much easier for you to find exactly what you're looking for on Quizgoat.
Loading...
Quiz a lot 5/ Computer Science & Information Technology - Networking And Telecommunications
1
Free
Which mobile device setting regulates when the device goes into hibernation mode?
in
Computer Science & Information Technology
A. auto-locate
B. root timeout
C. lock screen
D. sleep time
networking-and-telecommunications
Answer: D
2
Free
Which of the following occurs when the attacker is able to intercept or monitor transmissions meant for a different computer?
in
Computer Science & Information Technology
A. source routing
B. application-layer attack
C. man-in-the-middle attack
D. buffer attack
networking-and-telecommunications
Answer: C
3
Free
On tablets and smartphones, what feature can be used that can erase the contents of the device if lost or stolen?
in
Computer Science & Information Technology
A. encryption
B. tracking
C. remote wipe
D. lock screen
networking-and-telecommunications
Answer: C
4
Free
____________________ is a wireless data network technology that is designed to provide high-speed data connections for mobile devices.
in
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
networking-and-telecommunications
wireless fidelity
5
Free
Which of the following is used to interfere with normal access to network resources by flooding a network with useless information?
in
Computer Science & Information Technology
A. denial-of-service attack
B. buffer attack
C. Trojan horse
D. worm
networking-and-telecommunications
Answer: A
6
In an office setting, instead of using a wireless broadband router, a more sophisticated device known as a(n) ____________________ is used.
in
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
networking-and-telecommunications
7
_________________ is searching for wireless signals from an automobile or on foot using a portable computing device.
in
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
networking-and-telecommunications
8
Which of the following is a program that appears useful, but instead does harm to a user's computer?
in
Computer Science & Information Technology
A. virus
B. buffer attack
C. Trojan horse
D. worm
networking-and-telecommunications
9
A(n) ____ is a program that is relayed by a disk or a file and has the ability to replicate throughout a system, but does not create new files.
in
Computer Science & Information Technology
A. buffer attack
B. virus
C. worm
D. hoax
networking-and-telecommunications
10
From what term is war driving derived?
in
Computer Science & Information Technology
A. war walking
B. walk dialing
C. war dialing
D. chalk walking
networking-and-telecommunications
11
A proxy can enhance performance through caching and filter communications.
in
Computer Science & Information Technology
Answer the following statement true (T) or false (F)
networking-and-telecommunications
12
In terms of maintenance and support, what are several advantages of using relatively new network equipment?
in
Computer Science & Information Technology
What will be an ideal response?
networking-and-telecommunications
13
The current location of a device can be pinpointed on a map through the device's _______________.
in
Computer Science & Information Technology
Fill in the blank(s) with the appropriate word(s).
networking-and-telecommunications
14
How can you quickly determine if the physical connection on a computer is working?
in
Computer Science & Information Technology
What will be an ideal response?
networking-and-telecommunications
15
Match each item with a statement below.
in
Computer Science & Information Technology
A. A more sophisticated device used in an office setting instead of a wireless router
B. An attack that sends unsolicited messages to Bluetooth-enabled devices
C. An attack that accesses unauthorized information from a wireless device through a Bluetooth connection
D. An AP or another computer that is set up by an attacker designed to mimic the authorized Wi-Fi device
E. Removing the built-in limitations and protections on Google Android devices
F. Downloading an app from an unofficial third-party website
G. A new class of mobile technology consisting of devices that can be worn by the user instead of carried
H. A security setting that provides the optimum level of wireless security
I. The technical name for a Wi-Fi network
networking-and-telecommunications
16
When designing a home network, what guidelines should you follow for locating the desktop computer?
in
Computer Science & Information Technology
What will be an ideal response?
networking-and-telecommunications
17
What are some concerns for using a public Wi-Fi network in a coffee shop, airport, or school campus, for example?
in
Computer Science & Information Technology
What will be an ideal response?
networking-and-telecommunications
18
What is network capacity management and who performs it?
in
Computer Science & Information Technology
What will be an ideal response?
networking-and-telecommunications
19
Briefly describe the first step in securing a Wi-Fi wireless broadband router.
in
Computer Science & Information Technology
What will be an ideal response?
networking-and-telecommunications
20
What is the difference between a recursive query and an iterative query?
in
Computer Science & Information Technology
What will be an ideal response?
networking-and-telecommunications
21
What will the status of the M and O flags be in the RA-ICMP field if a combination of SLAAC and DHCPv6 are being used?
in
Computer Science & Information Technology
A. 0, 0
B. 0, 1
C. 1, 0
D. 1, 1
networking-and-telecommunications
Recent Packs
cjs238
Criminal Law
2
items
by
anonymous
Nursing - Management Pace 4 Quiz
22
items
by
lorna
Quiz Facts 3- Business Finance
21
items
by
quincyaj
no-tag
Let Quiz 3/Business - Business Communications
28
items
by
Victoria
couc 510
Theories of Counseling Quiz 2
19
items
by
Caitlin
no-tag
ccj 4660
Criminal Justice - Crime Violence and Schools QuixDoc 2
21
items
by
daisy
no-tag
Quiz Facts 8. Psychology - The Biological Perspective
25
items
by
Bama6907
no-tag
Communication - Writing Negative Messages Quiz level 3
28
items
by
kerbeline
no-tag
Quiz of Gerontology - Aging Matters
28
items
by
Dr-Doom
Exam 1 - Abnormal Psychology
17
items
by
wwdddxxzz
no-tag
Quiz Facts 8. History - U.S Government
24
items
by
Nagazaki
no-tag
Quiz Cocktail for next week
28
items
by
MindGraft
no-tag
hdfs 276
Pre Exam Quiz 5; Human Development and Family Studies
18
items
by
ledia
no-tag
Quiz Preview 10/ Psychology - Principles of Social Psychology
19
items
by
ruffles85
Quiz Facts 7' Psychology - Cognitive Functioning
28
items
by
Erbear64
no-tag
Quiz Facts 10- Psychology - No Tag
16
items
by
Michi
no-tag
psyc 305
Quiz Lot 2. Cognitive Psychology Overview of Theory
27
items
by
marzolam01
no-tag
Easy Quiz 2. Psychology - What is Psychology?
28
items
by
TriDelt
no-tag
Cognitive Psychology - Memory. Quiz Grade 2
21
items
by
Halter_Soni
Pre School Quiz 4-Biology & Microbiology - Genome,genetics,anatomy And Physiology
16
items
by
Debbie
molecular-and-microbiology
A message will be sent to your email address with instructions
Email or Username:
Join us and prepare for your exams!
Username:
Email:
Password:
Already a member?
Log in
Welcome!
Email or Username:
Password:
Remember me on this computer
I forgot my password
Not a member?
Sign up
...