Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses
Chapter 7:
networking and security:
connecting computers and keeping thEm safe from hackers and viruses
Multiple Choice:
1.Which of the following is NOT an example of a network node?
- printer
- computer
- NOS
- modem
Answer: CReference: Networking FundamentalsDifficulty: Moderate
2.The network architecture used in most home networks is:
- client-server LAN.
- peer-to-peer LAN.
- client-server WAN.
- peer-to-peer WAN.
Answer: BReference: Network ArchitecturesDifficulty: Moderate
3.You must install a(n) ______on a network if you want to share a broadband Internet connection.
- router
- modem
- node
- cable
Answer: AReference: Network Navigation DevicesDifficulty: Moderate
4.Which of the following statements concerning peer-to-peer networks is FALSE?
- A peer-to-peer network is the most common example of a locally controlled network.
- Peer-to-peer networks cost more than client/server networks and are more difficult to maintain.
- Each node on a peer-to-peer network can communicate directly with every other node on the network.
- Peer-to-peer networks are the most common type of home network.
Answer: BReference: Network ArchitecturesDifficulty: Moderate
5.The design of the network is called the network:
- architecture.
- server.
- transmission.
- type.
Answer: AReference: Network ArchitecturesDifficulty: Easy
6.Data transfer rate (also called bandwidth) is the ______speed at which data can be transmitted between two nodes on a network.
- average
- minimum
- actual
- maximum
Answer: DReference: Transmission MediaDifficulty: Challenging
7.______are the navigation devices that act as the “traffic cops” of the network and forward packets to nodes on the same network (not between two networks).
- NICs
- Routers
- Switches
- Modems
Answer: CReference: Network Navigation DevicesDifficulty: Moderate
8.Which of the following statements is FALSE concerning Ethernet networks?
- Cat 5e UTP cable is recommended for Ethernet networks.
- Cat 5 UTP supports a data transmission rate of 1 Gbps.
- Ethernet typically uses an RJ-45 connector.
- When using UTP, a cable run cannot exceed 328 feet.
Answer: BReference: Wired Ethernet NetworksDifficulty: Challenging
9.Devices installed on long cable runs to amplify the signal are called:
- repeaters.
- adapters.
- switches.
- routers.
Answer: AReference: Wired Ethernet NetworksDifficulty: Challenging
10.A network navigation device that merely retransmits a signal to all other nodes attached to it is a(n):
- router.
- NIC.
- hub.
- adapter.
Answer: CReference: Ethernet SwitchesDifficulty: Moderate
11.The network navigation device known as a “smart hub” that transmits a signal only to the node to which it should be sent is a(n):
- router.
- switch.
- NIC.
- adapter.
Answer: BReference: Ethernet SwitchesDifficulty: Moderate
12.A ______is a device, contained in a wireless network adapter, that translates the electronic data on a network into radio waves and broadcasts the radio waves to other nodes on the network.
- router
- switch
- hub
- transceiver
Answer: DReference: Wireless Ethernet NetworksDifficulty: Moderate
13.A switch is also known as a(n):
- smart hub.
- DSL modem.
- smart router.
- cable modem.
Answer: AReference: Wired Ethernet Networks: Ethernet SwitchesDifficulty: Moderate
14.When creating a phoneline network, it is necessary to install a(n) ______adapter.
- wireless
- phone cord
- home phoneline network
- Digital Subscriber Line (DSL)
Answer: CReference: Phoneline NetworksDifficulty: Moderate
15.______adapters, used on a power-line network, are available in either USB or Ethernet versions.
- Power-line network
- Peer-to-peer network
- Phoneline network
- Wireless network
Answer: AReference: Power-Line NetworksDifficulty: Easy
16.All of the following statements concerning client/server networks are true EXCEPT:
- one computer on a client/server network must act as a server.
- there is no centralized security or administration on a client/server network.
- most networks that have 10 or more nodes are client/server networks.
- the Internet is an example of a client/server network.
Answer: BReference: Describing Networks Based on Network ControlDifficulty: Moderate
17.Which of the following types of network adapter card is most likely to be preinstalled in a typical home computer?
- Ethernet
- power-line adapter
- wireless adapter
- HPNA adapter
Answer: AReference: Wired Ethernet NetworksDifficulty: Moderate
18.If a home network is connected to the Internet a ______is required to send data between the two networks.
- router
- repeater
- switch
- network operating system
Answer: AReference: Network Navigation DevicesDifficulty: Moderate
19.CAT 5, CAT 5E, and CAT 6 are all types of:
- network adapters.
- Ethernet ports.
- UTP cables.
- connector jacks.
Answer: CReference: WiredEthernet NetworksDifficulty: Moderate
20.A wireless network uses ______as its transmission media.
- cables
- radio waves
- twisted pair
- fiber optics
Answer: BReference: Wireless Ethernet NetworksDifficulty: Easy
21.The main difference between the various 802.11 standards is the:
- data transfer rate.
- maximum allowable cable length.
- simplicity of installation.
- collision detection rate.
Answer: AReference: Wireless Ethernet NetworksDifficulty: Challenging
22.The transceiver is the device that converts electronic data into ______for broadcast to other network nodes.
- packets
- radio waves
- WAPs
- 802.11 standards
Answer: BReference: Wireless Ethernet NetworksDifficulty: Moderate
23.If you wish to extend the length of the network without having the signal degrade, you would use a:
- repeater.
- router.
- gateway.
- switch.
Answer: AReference: Wired Ethernet NetworksDifficulty: Moderate
24.If computers in a wireless network are unable to connect to the wireless router, adding a(n) ______extends the range of the wireless network by providing a second point to which the nodes can connect to the network.
- router
- Internet portal
- cable modem
- wireless access point
Answer: DReference: Wireless Ethernet NetworksDifficulty: Moderate
25.In network terminology, a(n) ______is a wireless router that combines the capabilities of a wired router with the ability to receive wireless signals.
- hub
- gateway
- adapter
- Ethernet port
Answer: BReference: Wireless Ethernet NetworksDifficulty: Moderate
26.If you frequently need to transfer streaming video or very large files between computers, which of the following networks would be the best choice?
- Ethernet
- wireless
- power-line
- phoneline
Answer: AReference: Wired Ethernet NetworksDifficulty: Challenging
27.The ______operating system assists with configuring home networks with a Network Setup Wizard.
- Windows 98
- Windows ME
- Windows XP
- DOS
Answer: CReference: Configuring Software for Your Home NetworkDifficulty: Easy
28.In a(n) ______network, any electrical outlet provides a network connection.
- wireless
- power-line
- phoneline
- Ethernet
Answer: BReference: Power-Line NetworksDifficulty: Easy
29.In a(n) ______network, any phone jack provides a network connection.
- phoneline
- power-line
- 802.11g
- Ethernet
Answer: AReference: Phoneline NetworksDifficulty: Easy
30.A computer virus attaches itself to and attempts to hide within the code of a(n) ______program.
- zombie
- Trojan horse
- host
- worm
Answer: CReference: Computer Threats: Computer VirusesDifficulty: Moderate
31.______viruses replicate themselves to the Master Boot Record whenever the computer boots up, ensuring that the virus will be loaded into memory before some virus protection programs are loaded.
- Zombie
- Trojan horse
- Worm
- Boot-sector
Answer: DReference: Types of VirusesDifficulty: Moderate
32.______viruses are often transmitted by a floppy disk left in the floppy disk drive.
- Boot-sector
- Trojan horse
- Script
- Logic bomb
Answer: AReference: Types of VirusesDifficulty: Challenging
33.______are viruses that are triggered when certain logical conditions are met.
- Boot-sector viruses
- Logic bombs
- Macro viruses
- Worms
Answer: BReference: Types of VirusesDifficulty: Moderate
34.______viruses attach themselves to documents such as Word and Excel.
- Boot-sector
- Trojan horse
- DOS
- Macro
Answer: DReference: Types of VirusesDifficulty: Moderate
35.A numbered communication gateway or path, used to organize requests for information, that is assigned for a commonly used network service such as SMTP or HTTP is called a:
- protocol.
- physical port.
- logical port.
- packet filter.
Answer: CReference: How Hackers Gain AccessDifficulty: Moderate
36.Which of the following would most likely NOT be a symptom of a virus?
- Existing program files and icons disappear.
- The CD-ROM stops functioning.
- The Web browser opens to an unusual home page.
- Odd messages or images are displayed on the screen.
Answer: BReference: Bits and Bytes: Virus SymptomsDifficulty: Challenging
37.Blocking access to logical ports is a common method used by ______for maximizing computer security.
- switches
- Web browsers
- firewalls
- access points
Answer: CReference: Dig Deeper: How Firewalls WorkDifficulty: Moderate
38.______are a series of commands, actually mini programs that are executed without your knowledge.
- Scripts
- Trojan horses
- Worms
- Boot-sector viruses
Answer: AReference: Scripts and Macro VirusesDifficulty: Moderate
39.A firewall’s ability to examine incoming and outgoing information and prevent the use of unauthorized logical ports is known as:
- packet filtering.
- logical port blocking.
- Network Address Translation.
- network key distribution.
Answer: AReference: Dig Deeper: How Firewalls WorkDifficulty: Challenging
40.Classifications of viruses by the methods they take to avoid detection by antivirus software include all of the following EXCEPT:
- polymorphic.
- multipartite.
- encryption.
- stealth.
Answer: CReference: Virus ClassificationsDifficulty: Challenging
41.The purpose of Network Address Translation is to:
- translate an IP address to a text-based URL.
- hide user IP addresses from the Internet.
- convert logical ports to physical port configurations.
- dynamically assign IP addresses via an ISP.
Answer: BReference: Dig Deeper: How Firewalls WorkDifficulty: Challenging
42.When you set up a router for a wireless network, the router uses a default network name known as the:
- service set identifier (SSID).
- router address.
- MAC address.
- IP identifier.
Answer: AReference: Securing Wireless NetworksDifficulty: Challenging
43.Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are examples of:
- packet filtering services.
- network address translation protocols.
- security protocols.
- service set identifiers.
Answer: CReference: Securing Wireless NetworksDifficulty: Challenging
44.A ______is the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests.
- zombie
- worm
- DoS
- Trojan horse
Answer: AReference: Denial of Service AttacksDifficulty: Easy
45.Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) use ______to protect data.
- packet filtering
- network address translation
- encryption
- service set identifiers
Answer: CReference: Securing Wireless NetworksDifficulty: Challenging
46.______are viruses that are triggered by the passage of time or on a certain date.
- Boot-sector viruses
- Macro viruses
- Time bombs
- Worms
Answer: CReference: Types of VirusesDifficulty: Moderate
47.Unlike other viruses, ______are viruses that can run independently of host file execution and are much more active in spreading themselves.
- boot-sector viruses
- time bombs
- Trojan horses
- worms
Answer: DReference: Types of VirusesDifficulty: Moderate
48.______viruses temporarily erase their code from the files where they reside and hide in active memory.
- Multipartite
- Stealth
- Polymorphic
- Script
Answer: BReference: Virus ClassificationsDifficulty: Challenging
49.All of the following are recommended to secure a wireless network EXCEPT:
- changing the default password on your router.
- turning on security protocols.
- using static IP addressing.
- restricting access to the network to certain MAC addresses.
Answer: CReference: Securing Wireless NetworksDifficulty: Challenging
50.If a virus signature or other suspicious activity is detected by the antivirus software, it places the virus in a secure area of the hard drive so that it won’t spread infection to other files. This procedure is known as:
- inoculation.
- automatic updating.
- encryption.
- quarantining.
Answer: DReference: Computer Safeguards: Antivirus SoftwareDifficulty: Easy
Fill in the Blank:
51.The Internet is a good example of a(n) ______network.
Answer: client/serverReference: DescribingNetworks Based on Network ControlDifficulty: Easy
52.A(n) ______network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network.
Answer: peer-to-peer (P2P) Reference: DescribingNetworks Based on Network ControlDifficulty: Easy
53.A(n) ______network is one in which the nodes are located within a small geographical area.
Answer: local area network (LAN)Reference: DescribingNetworks Based on DistanceDifficulty: Easy
54.______cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.
Answer: CoaxialReference: Transmission MediaDifficulty: Moderate
55.Normal telephone wire is composed of ______cable, which consists of copper wires wrapped around each other and covered in a plastic jacket.
Answer: twisted pair Reference: Transmission MediaDifficulty: Easy
56.All network nodes (computers and peripherals) are connected to each other and to the network by ______.
Answer: transmission media Reference: Transmission MediaDifficulty: Easy
57.______transfer packets of data between two or more networks.
Answer: RoutersReference: Network Navigation DevicesDifficulty: Moderate
58.Bundles of data sent over transmission media are called ______.
Answer: packets Reference: Network Navigation DevicesDifficulty: Moderate
59.The 802.11 wireless standard is also known as ______.
Answer: WiFi (Wireless Fidelity)Reference: Wireless Ethernet NetworksDifficulty: Challenging
60.Windows Server 2003 is an example of specialized software known as ______software.
Answer: network operating system (NOS) Reference: Networking SoftwareDifficulty: Easy
61.______viruses, the newest form of virus, compress common data files into a file using a complex encryption key rendering your files unusable.
Answer: Encryption Reference: Encryption VirusesDifficulty: Easy
62.A(n) ______is required for each node on a wireless network .
Answer: wireless network adapterReference: Wireless Ethernet NetworksDifficulty: Moderate
63.The best defense against viruses is to install ______, which is software specifically designed to detect viruses and protect your computer.
Answer: antivirus software Reference: Computer Safeguards: Antivirus SoftwareDifficulty: Easy
64.When setting up a network, each computer on the network needs a(n) ______so that the network can identify it and know which computer is requesting data and services so that the data can be delivered correctly.
Answer: unique name Reference: Configuring Software For Your Home NetworkDifficulty: Moderate
65.______networks move data through the network using conventional phone lines.
Answer: Phoneline Reference: Phoneline NetworksDifficulty: Easy
66.When setting up a wireless network, using Windows XP, the ______encryption is recommended for the best security.
Answer: WPA Reference: Securing Wireless NetworksDifficulty: Challenging
67.Using millions of computers during their inactive periods to provide a network-based maximization of productivity is called ______computing.
Answer: grid Reference: Trends in IT: Emerging Technologies: Grid ComputingDifficulty: Moderate
68.Anyone who breaks into a computer system (an individual computer or a network) is generally referred to as a(n) ______.
Answer: hacker Reference: Computer Threats: Hackers Difficulty: Easy
69.A(n) ______is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data to use for illegal purposes.
Answer: packet snifferReference: What Hackers StealDifficulty: Moderate
70.A(n) ______is a program that appears to be something useful or desirable (like a game or a screen saver) but actually does something malicious in the background.
Answer: Trojan horseReference: Trojan HorsesDifficulty: Moderate
71.When legitimate users are denied access to a computer system due to repeated bogus requests made by a hacker through a “zombie” computer systems, this is called a(n) ______.
Answer: denial of service (DoS) attackReference: Denial of Service AttacksDifficulty: Moderate
72.______is characterized by someone using personal information about you to assume your identity for the purpose of defrauding others.
Answer: Identity theftReference: What Hackers StealDifficulty: Easy
73.______are software programs or hardware devices designed to keep computers safe from hackers.
Answer: FirewallsReference: Computer Safeguards: FirewallsDifficulty: Moderate
74.128.15.9.21 is an example of a(n) ______.
Answer: Internet Protocol (IP) addressReference: Dig Deeper: How Firewalls WorkDifficulty: Easy
75.The process firewalls use to assign internal IP addresses on a network (which are not shared with devices not on the network) so the address is safe from hackers is called ______.
Answer: Network Address Translation (NAT)Reference: Dig Deeper: How Firewalls Work Difficulty: Challenging
True and False:
76.Wide Area Networks (WANs) are made up of LANs connected over long distances.
Answer: TrueReference: Describing Networks Based on DistanceDifficulty: Easy
77.Networking standards set by organizations such as the IEEE make it easier for manufacturers to produce devices that work with a variety of computers and peripherals.
Answer: TrueReference: Bits and Bytes: One Brand Equals Fewer HeadachesDifficulty: Moderate
78. Throughput is the maximum speed at which data can be transferred.
Answer: False (Data transfer rate / bandwidth)Reference: Transmission MediaDifficulty: Challenging
79.Public places at which you can wirelessly connect to the Internet are known as “hot spots.”
Answer: TrueReference: Bits and Bytes: Wireless Hot SpotsDifficulty: Easy
80.A Trojan horse program can install backdoor programs that allow hackers to take almost complete control of your computer without your knowledge.
Answer: TrueReference: Trojan HorsesDifficulty: Easy
81.If a firewall is configured to ignore all incoming packets on a particular logical port, this is known as packet filtering.
Answer: False (logical port blocking)Reference: Dig Deeper: How Firewalls WorkDifficulty: Challenging
82.Static addressing means retaining the same IP address for a period of time.
Answer: TrueReference: Dig Deeper: How Firewalls WorkDifficulty: Easy
83.Dynamic addressing makes broadband users more vulnerable to hackers because the hackers have a more permanent IP address with which to locate the computer.
Answer: False (Static)Reference: Dig Deeper: How Firewalls WorkDifficulty: Moderate
84.Some popular software firewalls are BlackICE PC Protection and ZoneAlarm.
Answer: TrueReference: Types of Firewalls Difficulty: Easy
85.Mac OS X does not support peer-to-peer networking.
Answer: False (it does)Reference: Networking SoftwareDifficulty: Easy
86.LANs are made up of WANs connected over long distances.
Answer: False (WANs are made up of LANs)Reference: Describing Networks Based on Distance Difficulty: Moderate
87.A computer virus’s main purpose is to replicate itself and copy its code to as many other files as possible.
Answer: TrueReference: Computer Threats: Computer VirusesDifficulty: Easy
88.Time bombs are viruses that are triggered when certain logical conditions are met.
Answer: False (logic bombs)Reference: Computer Threats: Computer VirusesDifficulty: Challenging