Chapter 7: Networking and Security: Connecting Computers and Keeping Them Safe From Hackers and Viruses

Chapter 7:
networking and security:
connecting computers and keeping thEm safe from hackers and viruses

Multiple Choice:

1.Which of the following is NOT an example of a network node?

  1. printer
  2. computer
  3. NOS
  4. modem

Answer: CReference: Networking FundamentalsDifficulty: Moderate

2.The network architecture used in most home networks is:

  1. client-server LAN.
  2. peer-to-peer LAN.
  3. client-server WAN.
  4. peer-to-peer WAN.

Answer: BReference: Network ArchitecturesDifficulty: Moderate

3.You must install a(n) ______on a network if you want to share a broadband Internet connection.

  1. router
  2. modem
  3. node
  4. cable

Answer: AReference: Network Navigation DevicesDifficulty: Moderate

4.Which of the following statements concerning peer-to-peer networks is FALSE?

  1. A peer-to-peer network is the most common example of a locally controlled network.
  2. Peer-to-peer networks cost more than client/server networks and are more difficult to maintain.
  3. Each node on a peer-to-peer network can communicate directly with every other node on the network.
  4. Peer-to-peer networks are the most common type of home network.

Answer: BReference: Network ArchitecturesDifficulty: Moderate

5.The design of the network is called the network:

  1. architecture.
  2. server.
  3. transmission.
  4. type.

Answer: AReference: Network ArchitecturesDifficulty: Easy

6.Data transfer rate (also called bandwidth) is the ______speed at which data can be transmitted between two nodes on a network.

  1. average
  2. minimum
  3. actual
  4. maximum

Answer: DReference: Transmission MediaDifficulty: Challenging

7.______are the navigation devices that act as the “traffic cops” of the network and forward packets to nodes on the same network (not between two networks).

  1. NICs
  2. Routers
  3. Switches
  4. Modems

Answer: CReference: Network Navigation DevicesDifficulty: Moderate

8.Which of the following statements is FALSE concerning Ethernet networks?

  1. Cat 5e UTP cable is recommended for Ethernet networks.
  2. Cat 5 UTP supports a data transmission rate of 1 Gbps.
  3. Ethernet typically uses an RJ-45 connector.
  4. When using UTP, a cable run cannot exceed 328 feet.

Answer: BReference: Wired Ethernet NetworksDifficulty: Challenging

9.Devices installed on long cable runs to amplify the signal are called:

  1. repeaters.
  2. adapters.
  3. switches.
  4. routers.

Answer: AReference: Wired Ethernet NetworksDifficulty: Challenging

10.A network navigation device that merely retransmits a signal to all other nodes attached to it is a(n):

  1. router.
  2. NIC.
  3. hub.
  4. adapter.

Answer: CReference: Ethernet SwitchesDifficulty: Moderate

11.The network navigation device known as a “smart hub” that transmits a signal only to the node to which it should be sent is a(n):

  1. router.
  2. switch.
  3. NIC.
  4. adapter.

Answer: BReference: Ethernet SwitchesDifficulty: Moderate

12.A ______is a device, contained in a wireless network adapter, that translates the electronic data on a network into radio waves and broadcasts the radio waves to other nodes on the network.

  1. router
  2. switch
  3. hub
  4. transceiver

Answer: DReference: Wireless Ethernet NetworksDifficulty: Moderate

13.A switch is also known as a(n):

  1. smart hub.
  2. DSL modem.
  3. smart router.
  4. cable modem.

Answer: AReference: Wired Ethernet Networks: Ethernet SwitchesDifficulty: Moderate

14.When creating a phoneline network, it is necessary to install a(n) ______adapter.

  1. wireless
  2. phone cord
  3. home phoneline network
  4. Digital Subscriber Line (DSL)

Answer: CReference: Phoneline NetworksDifficulty: Moderate

15.______adapters, used on a power-line network, are available in either USB or Ethernet versions.

  1. Power-line network
  2. Peer-to-peer network
  3. Phoneline network
  4. Wireless network

Answer: AReference: Power-Line NetworksDifficulty: Easy

16.All of the following statements concerning client/server networks are true EXCEPT:

  1. one computer on a client/server network must act as a server.
  2. there is no centralized security or administration on a client/server network.
  3. most networks that have 10 or more nodes are client/server networks.
  4. the Internet is an example of a client/server network.

Answer: BReference: Describing Networks Based on Network ControlDifficulty: Moderate

17.Which of the following types of network adapter card is most likely to be preinstalled in a typical home computer?

  1. Ethernet
  2. power-line adapter
  3. wireless adapter
  4. HPNA adapter

Answer: AReference: Wired Ethernet NetworksDifficulty: Moderate

18.If a home network is connected to the Internet a ______is required to send data between the two networks.

  1. router
  2. repeater
  3. switch
  4. network operating system

Answer: AReference: Network Navigation DevicesDifficulty: Moderate

19.CAT 5, CAT 5E, and CAT 6 are all types of:

  1. network adapters.
  2. Ethernet ports.
  3. UTP cables.
  4. connector jacks.

Answer: CReference: WiredEthernet NetworksDifficulty: Moderate

20.A wireless network uses ______as its transmission media.

  1. cables
  2. radio waves
  3. twisted pair
  4. fiber optics

Answer: BReference: Wireless Ethernet NetworksDifficulty: Easy

21.The main difference between the various 802.11 standards is the:

  1. data transfer rate.
  2. maximum allowable cable length.
  3. simplicity of installation.
  4. collision detection rate.

Answer: AReference: Wireless Ethernet NetworksDifficulty: Challenging

22.The transceiver is the device that converts electronic data into ______for broadcast to other network nodes.

  1. packets
  2. radio waves
  3. WAPs
  4. 802.11 standards

Answer: BReference: Wireless Ethernet NetworksDifficulty: Moderate

23.If you wish to extend the length of the network without having the signal degrade, you would use a:

  1. repeater.
  2. router.
  3. gateway.
  4. switch.

Answer: AReference: Wired Ethernet NetworksDifficulty: Moderate

24.If computers in a wireless network are unable to connect to the wireless router, adding a(n) ______extends the range of the wireless network by providing a second point to which the nodes can connect to the network.

  1. router
  2. Internet portal
  3. cable modem
  4. wireless access point

Answer: DReference: Wireless Ethernet NetworksDifficulty: Moderate

25.In network terminology, a(n) ______is a wireless router that combines the capabilities of a wired router with the ability to receive wireless signals.

  1. hub
  2. gateway
  3. adapter
  4. Ethernet port

Answer: BReference: Wireless Ethernet NetworksDifficulty: Moderate

26.If you frequently need to transfer streaming video or very large files between computers, which of the following networks would be the best choice?

  1. Ethernet
  2. wireless
  3. power-line
  4. phoneline

Answer: AReference: Wired Ethernet NetworksDifficulty: Challenging

27.The ______operating system assists with configuring home networks with a Network Setup Wizard.

  1. Windows 98
  2. Windows ME
  3. Windows XP
  4. DOS

Answer: CReference: Configuring Software for Your Home NetworkDifficulty: Easy

28.In a(n) ______network, any electrical outlet provides a network connection.

  1. wireless
  2. power-line
  3. phoneline
  4. Ethernet

Answer: BReference: Power-Line NetworksDifficulty: Easy

29.In a(n) ______network, any phone jack provides a network connection.

  1. phoneline
  2. power-line
  3. 802.11g
  4. Ethernet

Answer: AReference: Phoneline NetworksDifficulty: Easy

30.A computer virus attaches itself to and attempts to hide within the code of a(n) ______program.

  1. zombie
  2. Trojan horse
  3. host
  4. worm

Answer: CReference: Computer Threats: Computer VirusesDifficulty: Moderate

31.______viruses replicate themselves to the Master Boot Record whenever the computer boots up, ensuring that the virus will be loaded into memory before some virus protection programs are loaded.

  1. Zombie
  2. Trojan horse
  3. Worm
  4. Boot-sector

Answer: DReference: Types of VirusesDifficulty: Moderate

32.______viruses are often transmitted by a floppy disk left in the floppy disk drive.

  1. Boot-sector
  2. Trojan horse
  3. Script
  4. Logic bomb

Answer: AReference: Types of VirusesDifficulty: Challenging

33.______are viruses that are triggered when certain logical conditions are met.

  1. Boot-sector viruses
  2. Logic bombs
  3. Macro viruses
  4. Worms

Answer: BReference: Types of VirusesDifficulty: Moderate

34.______viruses attach themselves to documents such as Word and Excel.

  1. Boot-sector
  2. Trojan horse
  3. DOS
  4. Macro

Answer: DReference: Types of VirusesDifficulty: Moderate

35.A numbered communication gateway or path, used to organize requests for information, that is assigned for a commonly used network service such as SMTP or HTTP is called a:

  1. protocol.
  2. physical port.
  3. logical port.
  4. packet filter.

Answer: CReference: How Hackers Gain AccessDifficulty: Moderate

36.Which of the following would most likely NOT be a symptom of a virus?

  1. Existing program files and icons disappear.
  2. The CD-ROM stops functioning.
  3. The Web browser opens to an unusual home page.
  4. Odd messages or images are displayed on the screen.

Answer: BReference: Bits and Bytes: Virus SymptomsDifficulty: Challenging

37.Blocking access to logical ports is a common method used by ______for maximizing computer security.

  1. switches
  2. Web browsers
  3. firewalls
  4. access points

Answer: CReference: Dig Deeper: How Firewalls WorkDifficulty: Moderate

38.______are a series of commands, actually mini programs that are executed without your knowledge.

  1. Scripts
  2. Trojan horses
  3. Worms
  4. Boot-sector viruses

Answer: AReference: Scripts and Macro VirusesDifficulty: Moderate

39.A firewall’s ability to examine incoming and outgoing information and prevent the use of unauthorized logical ports is known as:

  1. packet filtering.
  2. logical port blocking.
  3. Network Address Translation.
  4. network key distribution.

Answer: AReference: Dig Deeper: How Firewalls WorkDifficulty: Challenging

40.Classifications of viruses by the methods they take to avoid detection by antivirus software include all of the following EXCEPT:

  1. polymorphic.
  2. multipartite.
  3. encryption.
  4. stealth.

Answer: CReference: Virus ClassificationsDifficulty: Challenging

41.The purpose of Network Address Translation is to:

  1. translate an IP address to a text-based URL.
  2. hide user IP addresses from the Internet.
  3. convert logical ports to physical port configurations.
  4. dynamically assign IP addresses via an ISP.

Answer: BReference: Dig Deeper: How Firewalls WorkDifficulty: Challenging

42.When you set up a router for a wireless network, the router uses a default network name known as the:

  1. service set identifier (SSID).
  2. router address.
  3. MAC address.
  4. IP identifier.

Answer: AReference: Securing Wireless NetworksDifficulty: Challenging

43.Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) are examples of:

  1. packet filtering services.
  2. network address translation protocols.
  3. security protocols.
  4. service set identifiers.

Answer: CReference: Securing Wireless NetworksDifficulty: Challenging

44.A ______is the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests.

  1. zombie
  2. worm
  3. DoS
  4. Trojan horse

Answer: AReference: Denial of Service AttacksDifficulty: Easy

45.Wired Equivalent Privacy (WEP) and Wi-Fi Protected Access (WPA) use ______to protect data.

  1. packet filtering
  2. network address translation
  3. encryption
  4. service set identifiers

Answer: CReference: Securing Wireless NetworksDifficulty: Challenging

46.______are viruses that are triggered by the passage of time or on a certain date.

  1. Boot-sector viruses
  2. Macro viruses
  3. Time bombs
  4. Worms

Answer: CReference: Types of VirusesDifficulty: Moderate

47.Unlike other viruses, ______are viruses that can run independently of host file execution and are much more active in spreading themselves.

  1. boot-sector viruses
  2. time bombs
  3. Trojan horses
  4. worms

Answer: DReference: Types of VirusesDifficulty: Moderate

48.______viruses temporarily erase their code from the files where they reside and hide in active memory.

  1. Multipartite
  2. Stealth
  3. Polymorphic
  4. Script

Answer: BReference: Virus ClassificationsDifficulty: Challenging

49.All of the following are recommended to secure a wireless network EXCEPT:

  1. changing the default password on your router.
  2. turning on security protocols.
  3. using static IP addressing.
  4. restricting access to the network to certain MAC addresses.

Answer: CReference: Securing Wireless NetworksDifficulty: Challenging

50.If a virus signature or other suspicious activity is detected by the antivirus software, it places the virus in a secure area of the hard drive so that it won’t spread infection to other files. This procedure is known as:

  1. inoculation.
  2. automatic updating.
  3. encryption.
  4. quarantining.

Answer: DReference: Computer Safeguards: Antivirus SoftwareDifficulty: Easy

Fill in the Blank:

51.The Internet is a good example of a(n) ______network.

Answer: client/serverReference: DescribingNetworks Based on Network ControlDifficulty: Easy

52.A(n) ______network is one in which each computer can communicate directly with each other, instead of having a separate device exercise central control over the entire network.

Answer: peer-to-peer (P2P) Reference: DescribingNetworks Based on Network ControlDifficulty: Easy

53.A(n) ______network is one in which the nodes are located within a small geographical area.

Answer: local area network (LAN)Reference: DescribingNetworks Based on DistanceDifficulty: Easy

54.______cable consists of a single copper wire surrounded by layers of plastic and is used to connect cable TV.

Answer: CoaxialReference: Transmission MediaDifficulty: Moderate

55.Normal telephone wire is composed of ______cable, which consists of copper wires wrapped around each other and covered in a plastic jacket.

Answer: twisted pair Reference: Transmission MediaDifficulty: Easy

56.All network nodes (computers and peripherals) are connected to each other and to the network by ______.

Answer: transmission media Reference: Transmission MediaDifficulty: Easy

57.______transfer packets of data between two or more networks.

Answer: RoutersReference: Network Navigation DevicesDifficulty: Moderate

58.Bundles of data sent over transmission media are called ______.

Answer: packets Reference: Network Navigation DevicesDifficulty: Moderate

59.The 802.11 wireless standard is also known as ______.

Answer: WiFi (Wireless Fidelity)Reference: Wireless Ethernet NetworksDifficulty: Challenging

60.Windows Server 2003 is an example of specialized software known as ______software.

Answer: network operating system (NOS) Reference: Networking SoftwareDifficulty: Easy

61.______viruses, the newest form of virus, compress common data files into a file using a complex encryption key rendering your files unusable.

Answer: Encryption Reference: Encryption VirusesDifficulty: Easy

62.A(n) ______is required for each node on a wireless network .

Answer: wireless network adapterReference: Wireless Ethernet NetworksDifficulty: Moderate

63.The best defense against viruses is to install ______, which is software specifically designed to detect viruses and protect your computer.

Answer: antivirus software Reference: Computer Safeguards: Antivirus SoftwareDifficulty: Easy

64.When setting up a network, each computer on the network needs a(n) ______so that the network can identify it and know which computer is requesting data and services so that the data can be delivered correctly.

Answer: unique name Reference: Configuring Software For Your Home NetworkDifficulty: Moderate

65.______networks move data through the network using conventional phone lines.

Answer: Phoneline Reference: Phoneline NetworksDifficulty: Easy

66.When setting up a wireless network, using Windows XP, the ______encryption is recommended for the best security.

Answer: WPA Reference: Securing Wireless NetworksDifficulty: Challenging

67.Using millions of computers during their inactive periods to provide a network-based maximization of productivity is called ______computing.

Answer: grid Reference: Trends in IT: Emerging Technologies: Grid ComputingDifficulty: Moderate

68.Anyone who breaks into a computer system (an individual computer or a network) is generally referred to as a(n) ______.

Answer: hacker Reference: Computer Threats: Hackers Difficulty: Easy

69.A(n) ______is a computer program that investigates data packets as they travel through the network and is often used by hackers to capture sensitive or private data to use for illegal purposes.

Answer: packet snifferReference: What Hackers StealDifficulty: Moderate

70.A(n) ______is a program that appears to be something useful or desirable (like a game or a screen saver) but actually does something malicious in the background.

Answer: Trojan horseReference: Trojan HorsesDifficulty: Moderate

71.When legitimate users are denied access to a computer system due to repeated bogus requests made by a hacker through a “zombie” computer systems, this is called a(n) ______.

Answer: denial of service (DoS) attackReference: Denial of Service AttacksDifficulty: Moderate

72.______is characterized by someone using personal information about you to assume your identity for the purpose of defrauding others.

Answer: Identity theftReference: What Hackers StealDifficulty: Easy

73.______are software programs or hardware devices designed to keep computers safe from hackers.

Answer: FirewallsReference: Computer Safeguards: FirewallsDifficulty: Moderate

74.128.15.9.21 is an example of a(n) ______.

Answer: Internet Protocol (IP) addressReference: Dig Deeper: How Firewalls WorkDifficulty: Easy

75.The process firewalls use to assign internal IP addresses on a network (which are not shared with devices not on the network) so the address is safe from hackers is called ______.

Answer: Network Address Translation (NAT)Reference: Dig Deeper: How Firewalls Work Difficulty: Challenging

True and False:

76.Wide Area Networks (WANs) are made up of LANs connected over long distances.

Answer: TrueReference: Describing Networks Based on DistanceDifficulty: Easy

77.Networking standards set by organizations such as the IEEE make it easier for manufacturers to produce devices that work with a variety of computers and peripherals.

Answer: TrueReference: Bits and Bytes: One Brand Equals Fewer HeadachesDifficulty: Moderate

78. Throughput is the maximum speed at which data can be transferred.

Answer: False (Data transfer rate / bandwidth)Reference: Transmission MediaDifficulty: Challenging

79.Public places at which you can wirelessly connect to the Internet are known as “hot spots.”

Answer: TrueReference: Bits and Bytes: Wireless Hot SpotsDifficulty: Easy

80.A Trojan horse program can install backdoor programs that allow hackers to take almost complete control of your computer without your knowledge.

Answer: TrueReference: Trojan HorsesDifficulty: Easy

81.If a firewall is configured to ignore all incoming packets on a particular logical port, this is known as packet filtering.

Answer: False (logical port blocking)Reference: Dig Deeper: How Firewalls WorkDifficulty: Challenging

82.Static addressing means retaining the same IP address for a period of time.

Answer: TrueReference: Dig Deeper: How Firewalls WorkDifficulty: Easy

83.Dynamic addressing makes broadband users more vulnerable to hackers because the hackers have a more permanent IP address with which to locate the computer.

Answer: False (Static)Reference: Dig Deeper: How Firewalls WorkDifficulty: Moderate

84.Some popular software firewalls are BlackICE PC Protection and ZoneAlarm.

Answer: TrueReference: Types of Firewalls Difficulty: Easy

85.Mac OS X does not support peer-to-peer networking.

Answer: False (it does)Reference: Networking SoftwareDifficulty: Easy

86.LANs are made up of WANs connected over long distances.

Answer: False (WANs are made up of LANs)Reference: Describing Networks Based on Distance Difficulty: Moderate

87.A computer virus’s main purpose is to replicate itself and copy its code to as many other files as possible.

Answer: TrueReference: Computer Threats: Computer VirusesDifficulty: Easy

88.Time bombs are viruses that are triggered when certain logical conditions are met.

Answer: False (logic bombs)Reference: Computer Threats: Computer VirusesDifficulty: Challenging