Computer Networking and Security Quiz

Modules 8 and 9: Networking and Security

Multiple Choice:

1. A basic computer network can be described as:

  • A. A minimum of five computers linked together.
  • B. Computer and cables that link the network together.
  • C. Two or more computers that are linked together.
  • D. The use of satellites linking computers together.

2. LAN stands for:

  • A. Local area nodes.
  • B. Logical arrangement of networks.
  • C. Local area network.
  • D. Linked-area network.

3. The primary difference between a LAN and a WAN is:

  • A. The number of software programs available.
  • B. Distance.
  • C. The variety of hardware devices.
  • D. The number of hardware devices.

4. Each individual computer and component attached to a network is a:

  • A. Node.
  • B. Connection point.
  • C. Switch.
  • D. Hub.

5. In a traditional LAN, each node on the network is connected through:

  • A. Cables.
  • B. Satellites.
  • C. Microwaves.
  • D. Wireless transmission.

6. MAN stands for:

  • A. Metropolitan area network.
  • B. Marked area network.
  • C. Metropolitan arranged network.
  • D. Manufactured arrangement of networks.

7. The hardware device or software program that sends messages between networks is known as a:

  • A. Bridge.
  • B. Router.
  • C. Backbone.
  • D. Gateway.

8. NIC stands for:

  • A. Network internal card.
  • B. Newer industrial computer.
  • C. Networking Internet connection.
  • D. Network interface card.

9. Computer bits must be ___________ to travel over phone lines.

  • A. Analog signals
  • B. Digital signals
  • C. Modem signals
  • D. Converted to bytes

10. Modem speed is measured in:

  • A. Bits per second.
  • B. Bytes per second.
  • C. Bits per millisecond.
  • D. Bytes per minute.

11. What is the term for the amount of information transmitted through a communication medium in a certain amount of time?

  • A. DPI
  • B. BPS
  • C. Bandwidth
  • D. Baud rate

12. What type of cable uses light waves to carry information at high speed?

  • A. Cable modems
  • B. Fiber-optic cables
  • C. Wireless cables
  • D. Phone lines

13. What helps block unauthorized access and data transfer?

  • A. A bridge
  • B. A VPN
  • C. A WEP
  • D. A firewall

14. A program that performs a useful task while simultaneously allowing destructive acts is a:

  • A. Worm.
  • B. Trojan horse.
  • C. Virus.
  • D. Macro virus.

15. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:

  • A. Trojan horse.
  • B. Virus.
  • C. Time bomb.
  • D. Time-related bomb sequence.

16. What type of virus uses computer hosts to reproduce itself?

  • A. Time bomb
  • B. Worm
  • C. Melissa virus
  • D. Macro virus

17. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:

  • A. A virus.
  • B. A Trojan horse.
  • C. Cracking.
  • D. A denial of service attack.

18. The scrambling of code is known as:

  • A. Encryption.
  • B. A firewall.
  • C. Scrambling.
  • D. Password-proofing.

True/False Questions

  1. Information security is the practice of defending information from unauthorized access. True
  2. A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. True
  3. Hoax viruses flood a targeted computer with so many requests that it cripples functionality. False
  4. The most complex type of firewall is the application proxy firewall. True
  5. A router is a hardware component used to interconnect networks. True