Computer Networking and Security Quiz
Modules 8 and 9: Networking and Security
Multiple Choice:
1. A basic computer network can be described as:
- A. A minimum of five computers linked together.
- B. Computer and cables that link the network together.
- C. Two or more computers that are linked together.
- D. The use of satellites linking computers together.
2. LAN stands for:
- A. Local area nodes.
- B. Logical arrangement of networks.
- C. Local area network.
- D. Linked-area network.
3. The primary difference between a LAN and a WAN is:
- A. The number of software programs available.
- B. Distance.
- C. The variety of hardware devices.
- D. The number of hardware devices.
4. Each individual computer and component attached to a network is a:
- A. Node.
- B. Connection point.
- C. Switch.
- D. Hub.
5. In a traditional LAN, each node on the network is connected through:
- A. Cables.
- B. Satellites.
- C. Microwaves.
- D. Wireless transmission.
6. MAN stands for:
- A. Metropolitan area network.
- B. Marked area network.
- C. Metropolitan arranged network.
- D. Manufactured arrangement of networks.
7. The hardware device or software program that sends messages between networks is known as a:
- A. Bridge.
- B. Router.
- C. Backbone.
- D. Gateway.
8. NIC stands for:
- A. Network internal card.
- B. Newer industrial computer.
- C. Networking Internet connection.
- D. Network interface card.
9. Computer bits must be ___________ to travel over phone lines.
- A. Analog signals
- B. Digital signals
- C. Modem signals
- D. Converted to bytes
10. Modem speed is measured in:
- A. Bits per second.
- B. Bytes per second.
- C. Bits per millisecond.
- D. Bytes per minute.
11. What is the term for the amount of information transmitted through a communication medium in a certain amount of time?
- A. DPI
- B. BPS
- C. Bandwidth
- D. Baud rate
12. What type of cable uses light waves to carry information at high speed?
- A. Cable modems
- B. Fiber-optic cables
- C. Wireless cables
- D. Phone lines
13. What helps block unauthorized access and data transfer?
- A. A bridge
- B. A VPN
- C. A WEP
- D. A firewall
14. A program that performs a useful task while simultaneously allowing destructive acts is a:
- A. Worm.
- B. Trojan horse.
- C. Virus.
- D. Macro virus.
15. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
- A. Trojan horse.
- B. Virus.
- C. Time bomb.
- D. Time-related bomb sequence.
16. What type of virus uses computer hosts to reproduce itself?
- A. Time bomb
- B. Worm
- C. Melissa virus
- D. Macro virus
17. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
- A. A virus.
- B. A Trojan horse.
- C. Cracking.
- D. A denial of service attack.
18. The scrambling of code is known as:
- A. Encryption.
- B. A firewall.
- C. Scrambling.
- D. Password-proofing.
True/False Questions
- Information security is the practice of defending information from unauthorized access. True
- A computer worm is a standalone malware computer program that replicates itself in order to spread to other computers. True
- Hoax viruses flood a targeted computer with so many requests that it cripples functionality. False
- The most complex type of firewall is the application proxy firewall. True
- A router is a hardware component used to interconnect networks. True